Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
YUoxuUri8M.dll

Overview

General Information

Sample Name:YUoxuUri8M.dll
Original Sample Name:c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40.dll
Analysis ID:1344807
MD5:88bb86494cb9411a9692f9c8e67ed32c
SHA1:82f8060575de96dc4edc4f7b02ec31ba7637fa03
SHA256:c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40
Tags:dllransomware
Infos:

Detection

Qilin
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Qilin Ransomware
Antivirus / Scanner detection for submitted sample
Found Tor onion address
Contains functionalty to change the wallpaper
Found PSEXEC tool (often used for remote process execution)
Deletes shadow drive data (may be related to ransomware)
Contains functionality to clear event logs
May use bcdedit to modify the Windows boot settings
Uses 32bit PE files
Yara signature match
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Yara detected PsExec sysinternal tool
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 4108 cmdline: loaddll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6020 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 732 cmdline: rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6604 cmdline: rundll32.exe C:\Users\user\Desktop\YUoxuUri8M.dll,DllMain MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
YUoxuUri8M.dllJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
    YUoxuUri8M.dllINDICATOR_SUSPICOUS_EXE_References_VEEAMDetects executables containing many references to VEEAM. Observed in ransomwareunknown
    • 0x15c37f:$s1: veeamnfssvc
    • 0x15c681:$s1: veeamnfssvc
    • 0x15c38f:$s9: veeamtransportsvc
    • 0x15c6ac:$s9: veeamtransportsvc
    • 0x15c691:$s10: veeamdeploymentservice
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
      00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
        00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
          Process Memory Space: loaddll32.exe PID: 4108JoeSecurity_QilinYara detected Qilin RansomwareJoe Security
            Process Memory Space: loaddll32.exe PID: 4108JoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
              Click to see the 4 entries
              SourceRuleDescriptionAuthorStrings
              3.2.rundll32.exe.6cc0f946.2.unpackJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
                0.2.loaddll32.exe.6ced8bbe.1.raw.unpackJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
                  3.2.rundll32.exe.6cc48bbe.1.raw.unpackJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
                    4.2.rundll32.exe.6cc0f946.1.unpackJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
                      0.2.loaddll32.exe.6ce9f946.2.unpackJoeSecurity_PsExecYara detected PsExec sysinternal toolJoe Security
                        Click to see the 10 entries
                        No Sigma rule has matched
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: YUoxuUri8M.dllReversingLabs: Detection: 68%
                        Source: YUoxuUri8M.dllVirustotal: Detection: 69%Perma Link
                        Source: YUoxuUri8M.dllAvira: detected
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD22640 BCryptGenRandom,0_2_6CD22640
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1B03B BCryptGenRandom,memcpy,BCryptGenRandom,BCryptGenRandom,memcpy,memcpy,memcpy,0_2_6CD1B03B
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD3190 SetLastError,GetFullPathNameW,GetCurrentProcessId,BCryptGenRandom,0_2_6CDD3190
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD3F130 BCryptGenRandom,BCryptGenRandom,GetProcessHeap,HeapAlloc,0_2_6CD3F130
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8B03B BCryptGenRandom,memcpy,BCryptGenRandom,BCryptGenRandom,memcpy,memcpy,memcpy,3_2_6CA8B03B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB43190 SetLastError,GetFullPathNameW,GetCurrentProcessId,BCryptGenRandom,3_2_6CB43190
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAAF130 BCryptGenRandom,BCryptGenRandom,GetProcessHeap,HeapAlloc,3_2_6CAAF130
                        Source: loaddll32.exeBinary or memory string: { "public_rsa_pem": "-----BEGIN PUBLIC KEY-----\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAy5Bq0JhzTUuX8U9S66N4\nwb/vrE0ZPJDps80bF9R2n2875dWVToGkl8+GUTApoz1Mhaf+YF1OBd4h3cB53ZRB\ntbiOgt3onHpDXxf4ZJ+6RXZGJs7dSQ5nI2Kxtbw2TyhTcjcosBROYaDaZxOK6xJ/\ni5qW+n0/d2va
                        Source: YUoxuUri8M.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                        Source: YUoxuUri8M.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: D:\a\1\s\psexec\exe\Win32\Release\psexec.pdb source: loaddll32.exe, loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dll
                        Source: Binary string: D:\a\1\s\psexec\svc\Win32\Release\psexesvc.pdb source: loaddll32.exe, loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dll

                        Spreading

                        barindex
                        Source: loaddll32.exeString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: rundll32.exeString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: YUoxuUri8M.dllString found in binary or memory: PsExec executes a program on a remote system, where remotely executed console
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD1390 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,HeapFree,0_2_6CDD1390
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB41390 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,HeapFree,3_2_6CB41390
                        Source: C:\Windows\System32\loaddll32.exeCode function: 4x nop then push ebp0_2_6CD02FA0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then push ebp3_2_6CA72FA0

                        Networking

                        barindex
                        Source: loaddll32.exe, 00000000.00000002.1685944141.0000000000B7D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: rundll32.exe, 00000003.00000002.1656357725.00000000007DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: rundll32.exe, 00000004.00000002.1656388663.000000000314A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: YUoxuUri8M.dllString found in binary or memory: "note": "-- Qilin \r\r\n\r\r\nYour network/system was encrypted. \r\r\nEncrypted files have new extension. \r\r\n\r\r\n-- Compromising and sensitive data \r\r\n\r\r\nWe have downloaded compromising and sensitive data from you system/network \r\r\nIf you refuse to communicate with us and we do not come to an agreement, your data will be published. \r\r\nData includes: \r\r\n- Employees personal data, CVs, DL , SSN. \r\r\n- Complete network map including credentials for local and remote services. \r\r\n- Financial information including clients data, bills, budgets, annual reports, bank statements. \r\r\n- Complete datagrams/schemas/drawings for manufacturing in solidworks format \r\r\n- And more... \r\r\n\r\r\n-- Warning \r\r\n\r\r\n1) If you modify files - our decrypt software won't able to recover data \r\r\n2) If you use third party software - you can damage/modify files (see item 1) \r\r\n3) You need cipher key / our decrypt software to restore you files. \r\r\n4) The police or authorities will not be able to help you get the cipher key. We encourage you to consider your decisions. \r\r\n\r\r\n-- Recovery \r\r\n\r\r\n1) Download tor browser: https://www.torproject.org/download/ \r\r\n2) Go to domain \r\r\n3) Enter credentials-- Credentials \r\n\r\nExtension: feGDg5BHWw \r\nDomain: e3v6tjarcltwc4hdkn6fxnpkzq42ul7swf5cfqw6jzvic4577vxsxhid.onion \r\nlogin: _RgxgvCfv_3rQI5oinfr9gj5JS6_AGP7 \r\npassword:",
                        Source: Yara matchFile source: YUoxuUri8M.dll, type: SAMPLE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc0f946.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ced8bbe.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc48bbe.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc0f946.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ce9f946.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ce9f946.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc0f946.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc48bbe.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc0f946.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6cce0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 4108, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6604, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 732, type: MEMORYSTR
                        Source: loaddll32.exe, rundll32.exeString found in binary or memory: http://www.microsoft.co
                        Source: YUoxuUri8M.dllString found in binary or memory: https://github.com/swsnr/gethostname.rs/issues
                        Source: loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dllString found in binary or memory: https://www.sysinternals.com0
                        Source: rundll32.exe, 00000004.00000002.1656388663.000000000314A000.00000004.00000020.00020000.00000000.sdmp, YUoxuUri8M.dllString found in binary or memory: https://www.torproject.org/download/

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 4108, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6604, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 732, type: MEMORYSTR
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE28390 CloseHandle,CloseHandle,GetProcessHeap,HeapAlloc,SystemParametersInfoW,HeapFree,GetLastError,HeapFree,HeapFree,0_2_6CE28390
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB98390 CloseHandle,CloseHandle,GetProcessHeap,HeapAlloc,SystemParametersInfoW,HeapFree,GetLastError,HeapFree,HeapFree,3_2_6CB98390
                        Source: loaddll32.exeBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: l"cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: rundll32.exeBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: l"cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: l"cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: YUoxuUri8M.dllBinary or memory string: cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: YUoxuUri8M.dllBinary or memory string: "cmdvssadmin.exe delete shadows /all /quiet/C[INFO] WOW64 redirection reverted
                        Source: C:\Windows\System32\loaddll32.exeCode function: for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"[WARNING] Cannot clean event logs[INFO] Event logs purger process spawned.0_2_6CE1F560
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"[WARNING] Cannot clean event logs[INFO] Event logs purger process spawned.3_2_6CB8F560

                        System Summary

                        barindex
                        Source: YUoxuUri8M.dll, type: SAMPLEMatched rule: Detects executables containing many references to VEEAM. Observed in ransomware Author: unknown
                        Source: 3.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing many references to VEEAM. Observed in ransomware Author: unknown
                        Source: 0.2.loaddll32.exe.6cce0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing many references to VEEAM. Observed in ransomware Author: unknown
                        Source: 4.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing many references to VEEAM. Observed in ransomware Author: unknown
                        Source: YUoxuUri8M.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                        Source: YUoxuUri8M.dll, type: SAMPLEMatched rule: INDICATOR_SUSPICOUS_EXE_References_VEEAM description = Detects executables containing many references to VEEAM. Observed in ransomware
                        Source: 3.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICOUS_EXE_References_VEEAM description = Detects executables containing many references to VEEAM. Observed in ransomware
                        Source: 0.2.loaddll32.exe.6cce0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICOUS_EXE_References_VEEAM description = Detects executables containing many references to VEEAM. Observed in ransomware
                        Source: 4.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICOUS_EXE_References_VEEAM description = Detects executables containing many references to VEEAM. Observed in ransomware
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCEFCD00_2_6CCEFCD0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1288B0_2_6CD1288B
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCFCC900_2_6CCFCC90
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDFDCA00_2_6CDFDCA0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD20C400_2_6CD20C40
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE1C300_2_6CCE1C30
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD06DBB0_2_6CD06DBB
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD13DAF0_2_6CD13DAF
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE3D700_2_6CCE3D70
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD3AED00_2_6CD3AED0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF3EC00_2_6CCF3EC0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD3FE900_2_6CD3FE90
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA0E910_2_6CDA0E91
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCFDE840_2_6CCFDE84
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA1EB00_2_6CDA1EB0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD36EA00_2_6CD36EA0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD0CE700_2_6CD0CE70
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE2DE500_2_6CE2DE50
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCECFF00_2_6CCECFF0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE3FB00_2_6CCE3FB0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA4F400_2_6CDA4F40
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD00F3E0_2_6CD00F3E
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE38800_2_6CCE3880
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD0A8A00_2_6CD0A8A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1A8A00_2_6CD1A8A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDE58100_2_6CDE5810
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD208010_2_6CD20801
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF58210_2_6CCF5821
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD3B9A00_2_6CD3B9A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD089100_2_6CD08910
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD18AD00_2_6CD18AD0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDE7AD00_2_6CDE7AD0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE3AC00_2_6CCE3AC0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1FAB00_2_6CD1FAB0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCEBA400_2_6CCEBA40
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD38A600_2_6CD38A60
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE2BB100_2_6CE2BB10
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDE5B200_2_6CDE5B20
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA14FE0_2_6CDA14FE
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF64A00_2_6CCF64A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCFF4400_2_6CCFF440
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA55B00_2_6CDA55B0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1F6F00_2_6CD1F6F0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDEB6400_2_6CDEB640
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD216700_2_6CD21670
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF57F00_2_6CCF57F0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD047900_2_6CD04790
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDCA0C00_2_6CDCA0C0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCFD0E00_2_6CCFD0E0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDC20900_2_6CDC2090
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD220800_2_6CD22080
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1F0A00_2_6CD1F0A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD2C0A00_2_6CD2C0A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE50B00_2_6CCE50B0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF70400_2_6CCF7040
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1B03B0_2_6CD1B03B
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD950200_2_6CD95020
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD131540_2_6CD13154
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD181300_2_6CD18130
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDA21300_2_6CDA2130
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD1D1250_2_6CD1D125
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD3F2600_2_6CD3F260
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD383E00_2_6CD383E0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDF53E00_2_6CDF53E0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDF23A00_2_6CDF23A0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD083100_2_6CD08310
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD393000_2_6CD39300
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCF83100_2_6CCF8310
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8288B3_2_6CA8288B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB6DCA03_2_6CB6DCA0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA6CC903_2_6CA6CC90
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA5FCD03_2_6CA5FCD0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA51C303_2_6CA51C30
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA90C403_2_6CA90C40
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA83DAF3_2_6CA83DAF
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA76DBB3_2_6CA76DBB
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA53D703_2_6CA53D70
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB11EB03_2_6CB11EB0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAA6EA03_2_6CAA6EA0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB10E913_2_6CB10E91
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA6DE843_2_6CA6DE84
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAAFE903_2_6CAAFE90
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA63EC03_2_6CA63EC0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAAAED03_2_6CAAAED0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA7CE703_2_6CA7CE70
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9DE503_2_6CB9DE50
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA53FB03_2_6CA53FB0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA5CFF03_2_6CA5CFF0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA70F3E3_2_6CA70F3E
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB14F403_2_6CB14F40
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA7A8A03_2_6CA7A8A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8A8A03_2_6CA8A8A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA538803_2_6CA53880
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB558103_2_6CB55810
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA908013_2_6CA90801
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA6581B3_2_6CA6581B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAAB9A03_2_6CAAB9A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA789103_2_6CA78910
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8FAB03_2_6CA8FAB0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB57AD03_2_6CB57AD0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA53AC03_2_6CA53AC0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAA8A603_2_6CAA8A60
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA5BA403_2_6CA5BA40
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB55B203_2_6CB55B20
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9BB103_2_6CB9BB10
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA664A03_2_6CA664A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB114FE3_2_6CB114FE
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA6F4403_2_6CA6F440
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB155B03_2_6CB155B0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB105703_2_6CB10570
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8F6F03_2_6CA8F6F0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA916703_2_6CA91670
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB5B6403_2_6CB5B640
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA747903_2_6CA74790
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA657F03_2_6CA657F0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8F0A03_2_6CA8F0A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA9C0A03_2_6CA9C0A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA550B03_2_6CA550B0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB320903_2_6CB32090
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA6D0E03_2_6CA6D0E0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB3A0C03_2_6CB3A0C0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB050203_2_6CB05020
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8B03B3_2_6CA8B03B
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA670403_2_6CA67040
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB121303_2_6CB12130
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA8D1253_2_6CA8D125
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA881303_2_6CA88130
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA831543_2_6CA83154
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAAF2603_2_6CAAF260
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB623A03_2_6CB623A0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAA83E03_2_6CAA83E0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB653E03_2_6CB653E0
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CAA93003_2_6CAA9300
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA683103_2_6CA68310
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA783103_2_6CA78310
                        Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CCF9A00 appears 74 times
                        Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CCF9900 appears 98 times
                        Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CD21390 appears 40 times
                        Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CCF9C20 appears 85 times
                        Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CCFB140 appears 39 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CA69C20 appears 88 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CA91390 appears 40 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CA6B140 appears 34 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CA69A00 appears 69 times
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CA69900 appears 92 times
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD1950 NtReadFile,WaitForSingleObject,RtlNtStatusToDosError,NtWriteFile,WaitForSingleObject,0_2_6CDD1950
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD0E50: DeviceIoControl,GetLastError,CloseHandle,GetProcessHeap,HeapAlloc,memcpy,HeapFree,0_2_6CDD0E50
                        Source: YUoxuUri8M.dllBinary or memory string: OriginalFilenamepsexec.cH vs YUoxuUri8M.dll
                        Source: YUoxuUri8M.dllBinary or memory string: OriginalFilenamepsexesvc.exeH vs YUoxuUri8M.dll
                        Source: YUoxuUri8M.dllReversingLabs: Detection: 68%
                        Source: YUoxuUri8M.dllVirustotal: Detection: 69%
                        Source: YUoxuUri8M.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll"
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\YUoxuUri8M.dll,DllMain
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\YUoxuUri8M.dll,DllMainJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE28210 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,GetLastError,CloseHandle,0_2_6CE28210
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB98210 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,GetLastError,CloseHandle,3_2_6CB98210
                        Source: YUoxuUri8M.dllBinary string: Sysinternals RocksRtlNtStatusToDosErrorntdll.dllRtlInitUnicodeStringNtOpenFileNtFsControlFile\Device\Srv2\Device\LanmanServerSeTcbPrivilege"%s" %sNetIsServiceAccountnetapi32.dll_SA_{262E99C9-6160-4871-ACEC-4E61736B6F21}NT AUTHORITYNT SERVICECreateRestrictedTokenwinsta0Winlogondefaultwinsta0\winlogonwinsta0\defaultWow64DisableWow64FsRedirectionKernel32.dll%s.exe%%systemroot%%\PSEXEC-%s-%08X.key%systemroot%failed to readsecure: %d
                        Source: YUoxuUri8M.dllBinary string: Sysinternals RocksRtlNtStatusToDosErrorntdll.dllRtlInitUnicodeStringNtOpenFileNtFsControlFile\Device\LanmanRedirector\%s\ipc$Use PsKill to terminate the remotely running program.
                        Source: classification engineClassification label: mal92.rans.spre.evad.winDLL@8/0@0/0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDEACE0 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,0_2_6CDEACE0
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD05D04 GlobalMemoryStatusEx,GetPerformanceInfo,GetDiskFreeSpaceExW,0_2_6CD05D04
                        Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\YUoxuUri8M.dll,DllMain
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6728:120:WilError_03
                        Source: loaddll32.exeString found in binary or memory: /usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/num-bigint-dig-0.8.1/src/algorithms/add.rs
                        Source: loaddll32.exeString found in binary or memory: %s -install to install the service
                        Source: rundll32.exeString found in binary or memory: /usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/num-bigint-dig-0.8.1/src/algorithms/add.rs
                        Source: rundll32.exeString found in binary or memory: %s -install to install the service
                        Source: YUoxuUri8M.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: YUoxuUri8M.dllStatic file information: File size 2845184 > 1048576
                        Source: YUoxuUri8M.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x159400
                        Source: YUoxuUri8M.dllStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x127800
                        Source: YUoxuUri8M.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                        Source: Binary string: D:\a\1\s\psexec\exe\Win32\Release\psexec.pdb source: loaddll32.exe, loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dll
                        Source: Binary string: D:\a\1\s\psexec\svc\Win32\Release\psexesvc.pdb source: loaddll32.exe, loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dll
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE2F980 push dword ptr [eax+04h]; ret 0_2_6CE2F9AF
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD00A63 push 016CE41Ch; iretd 0_2_6CD00A6C
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB9F980 push dword ptr [eax+04h]; ret 3_2_6CB9F9AF
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CA70A63 push 016CBB1Ch; iretd 3_2_6CA70A6C
                        Source: YUoxuUri8M.dllStatic PE information: section name: .eh_fram
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE1400 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_6CCE1400
                        Source: YUoxuUri8M.dllBinary or memory string: /set {current} safeboot networkrunasBCDEdit.exeerror creating cstringsaferunner-main/src/tools.rs
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\loaddll32.exeAPI coverage: 0.7 %
                        Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 0.5 %
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD0DDE7 HeapAlloc,GetProcessHeap,HeapAlloc,memcpy,HeapFree,HeapFree,GetSystemInfo,memcmp,HeapFree,memcpy,GetProcessHeap,HeapAlloc,AcquireSRWLockExclusive,HeapAlloc,memcpy,memcpy,0_2_6CD0DDE7
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CDD1390 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,HeapFree,0_2_6CDD1390
                        Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CB41390 CloseHandle,memset,FindFirstFileW,FindClose,HeapFree,HeapFree,HeapFree,HeapFree,3_2_6CB41390
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCE1400 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_6CCE1400
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CCEFCD0 GetProcessHeap,HeapAlloc,RtlAllocateHeap,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,memcpy,memcpy,memcpy,HeapFree,memcpy,HeapFree,memcpy,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,0_2_6CCEFCD0
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1Jump to behavior
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CD40C90 cpuid 0_2_6CD40C90
                        Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CE16B20 GetUserNameW,GetLastError,GetProcessHeap,HeapAlloc,GetUserNameW,GetLastError,GetProcessHeap,HeapAlloc,memcpy,HeapFree,HeapFree,0_2_6CE16B20
                        Source: Yara matchFile source: YUoxuUri8M.dll, type: SAMPLE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc0f946.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ced8bbe.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc48bbe.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc0f946.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ce9f946.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6ce9f946.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6cc0f946.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc48bbe.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6cc0f946.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.loaddll32.exe.6cce0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.6ca50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 4108, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6604, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 732, type: MEMORYSTR
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                        Valid Accounts2
                        Command and Scripting Interpreter
                        1
                        Bootkit
                        1
                        Access Token Manipulation
                        1
                        Access Token Manipulation
                        OS Credential Dumping1
                        Security Software Discovery
                        Remote Services11
                        Archive Collected Data
                        Exfiltration Over Other Network Medium2
                        Encrypted Channel
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
                        Defacement
                        Acquire InfrastructureGather Victim Identity Information
                        Default Accounts1
                        Service Execution
                        Boot or Logon Initialization Scripts11
                        Process Injection
                        11
                        Process Injection
                        LSASS Memory1
                        Account Discovery
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                        Proxy
                        SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                        Domain Accounts1
                        Native API
                        Logon Script (Windows)Logon Script (Windows)1
                        Deobfuscate/Decode Files or Information
                        Security Account Manager1
                        System Owner/User Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
                        Local AccountsCronLogin HookLogin Hook3
                        Obfuscated Files or Information
                        NTDS1
                        File and Directory Discovery
                        Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
                        Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Bootkit
                        LSA Secrets13
                        System Information Discovery
                        SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                        Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Rundll32
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                        External Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Indicator Removal
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
                        Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        File Deletion
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        YUoxuUri8M.dll68%ReversingLabsWin32.Trojan.Generic
                        YUoxuUri8M.dll100%AviraTR/Ransom.xmbad
                        YUoxuUri8M.dll69%VirustotalBrowse
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://www.microsoft.co0%Avira URL Cloudsafe
                        https://www.sysinternals.com00%Avira URL Cloudsafe
                        http://www.microsoft.co1%VirustotalBrowse
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.torproject.org/download/rundll32.exe, 00000004.00000002.1656388663.000000000314A000.00000004.00000020.00020000.00000000.sdmp, YUoxuUri8M.dllfalse
                          high
                          https://www.sysinternals.com0loaddll32.exe, 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, YUoxuUri8M.dllfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.microsoft.coloaddll32.exe, rundll32.exefalse
                          • 1%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/swsnr/gethostname.rs/issuesYUoxuUri8M.dllfalse
                            high
                            No contacted IP infos
                            Joe Sandbox Version:38.0.0 Ammolite
                            Analysis ID:1344807
                            Start date and time:2023-11-19 19:11:05 +01:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 4m 4s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:YUoxuUri8M.dll
                            renamed because original name is a hash value
                            Original Sample Name:c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40.dll
                            Detection:MAL
                            Classification:mal92.rans.spre.evad.winDLL@8/0@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 81%
                            • Number of executed functions: 17
                            • Number of non-executed functions: 203
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Stop behavior analysis, all processes terminated
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
                            Entropy (8bit):6.815416502528244
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                            • Generic Win/DOS Executable (2004/3) 0.20%
                            • DOS Executable Generic (2002/1) 0.20%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:YUoxuUri8M.dll
                            File size:2'845'184 bytes
                            MD5:88bb86494cb9411a9692f9c8e67ed32c
                            SHA1:82f8060575de96dc4edc4f7b02ec31ba7637fa03
                            SHA256:c26ce932f3609ecd710a3a1ca7f7b96f1b103a11b49a86e9423e03664eaabd40
                            SHA512:670acd30005be75bbced78a505b4f0ded7f39cb4f4d55f9b09f31964d20bebb62908d40da4c9a103c87e83f4b31e0435ffd9ec78ee7a585c216e5551e0c67ebb
                            SSDEEP:49152:MxmXXxQjiQspGXtwB0pnkF7TosNjLSq6Pq3Ecv9dsiPTg3pg:DQeQVmB0pni7TosNKq6adsi
                            TLSH:36D5BF06FD439A79C5BF1470247EB379AD399C240525CEA7D7C88DB0BA2E7412D8872E
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...".Vd...........#...#.....f+...............................................+.......+...@... .......................*.L..
                            Icon Hash:7ae282899bbab082
                            Entrypoint:0x100013b0
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x10000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x6456B622 [Sat May 6 20:18:42 2023 UTC]
                            TLS Callbacks:0x100f9450, 0x1014ee30, 0x1014ede0
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f846e17badb830abe49083e4c5bb1447
                            Instruction
                            sub esp, 0Ch
                            mov dword ptr [102AB18Ch], 00000000h
                            mov ecx, dword ptr [esp+18h]
                            mov edx, dword ptr [esp+14h]
                            mov eax, dword ptr [esp+10h]
                            call 00007F8264CDFD67h
                            add esp, 0Ch
                            retn 000Ch
                            lea esi, dword ptr [esi+00000000h]
                            lea esi, dword ptr [esi+00h]
                            nop
                            sub esp, 1Ch
                            mov eax, dword ptr [esp+20h]
                            mov dword ptr [esp], 102AB000h
                            mov dword ptr [esp+04h], eax
                            call 00007F8264E2D6DEh
                            add esp, 1Ch
                            ret
                            nop
                            nop
                            nop
                            nop
                            nop
                            push ebp
                            mov ebp, esp
                            push edi
                            push esi
                            push ebx
                            sub esp, 1Ch
                            mov dword ptr [esp], 1015C000h
                            call dword ptr [102AD6C4h]
                            sub esp, 04h
                            test eax, eax
                            je 00007F8264CDFF85h
                            mov ebx, eax
                            mov dword ptr [esp], 1015C000h
                            call dword ptr [102AD720h]
                            mov edi, dword ptr [102AD6D0h]
                            sub esp, 04h
                            mov dword ptr [102AB010h], eax
                            mov dword ptr [esp+04h], 1015C013h
                            mov dword ptr [esp], ebx
                            call edi
                            sub esp, 08h
                            mov esi, eax
                            mov dword ptr [esp+04h], 1015C029h
                            mov dword ptr [esp], ebx
                            call edi
                            mov dword ptr [1015B000h], eax
                            sub esp, 08h
                            test esi, esi
                            je 00007F8264CDFF23h
                            mov dword ptr [esp+04h], 102AB014h
                            mov dword ptr [esp], 10284000h
                            call esi
                            mov dword ptr [eax+eax], 00000000h
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x2ac0000x4c.edata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2ad0000x1bc8.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b10000xd30c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x2836180x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2ad5100x380.idata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x15932c0x159400False0.5236807566980449data6.51300791744888IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0x15b0000x1180x200False0.208984375data1.5302315334928558IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rdata0x15c0000x1277440x127800False0.5858267898688664data6.897829471292023IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .eh_fram0x2840000x261180x26200False0.3621734118852459data5.130901619963026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .bss0x2ab0000x1bc0x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .edata0x2ac0000x4c0x200False0.140625data0.8918205656738996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .idata0x2ad0000x1bc80x1c00False0.35044642857142855data5.149053093278306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .CRT0x2af0000x340x200False0.076171875data0.3320250245953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x2b00000x80x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .reloc0x2b10000xd30c0xd400False0.6353368219339622data6.597160861109742IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            DLLImport
                            IPHLPAPI.DLLFreeMibTable, GetAdaptersAddresses, GetIfEntry2, GetIfTable2
                            KERNEL32.dllCreateSemaphoreW, DeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, LeaveCriticalSection, ReleaseSemaphore, VirtualProtect, VirtualQuery
                            msvcrt.dll_amsg_exit, _initterm, _iob, _lock, _unlock, abort, calloc, free, fwrite, malloc, memcmp, memcpy, memmove, memset, realloc, strlen, strncmp, vfprintf
                            ntdll.dllNtReadFile, NtWriteFile
                            PSAPI.DLLEnumProcesses, GetModuleFileNameExW, GetPerformanceInfo, GetProcessImageFileNameW
                            advapi32.dllAdjustTokenPrivileges, ChangeServiceConfigW, ControlService, CopySid, EnumDependentServicesW, EnumServicesStatusW, GetLengthSid, GetTokenInformation, GetUserNameW, IsValidSid, LookupAccountSidW, LookupPrivilegeValueA, OpenProcessToken, OpenSCManagerW, OpenServiceW, QueryServiceStatusEx, RegCloseKey, RegOpenKeyExA, RegOpenKeyExW, RegSetValueExA, RegSetValueExW, SystemFunction036
                            bcrypt.dllBCryptGenRandom
                            kernel32.dllAcquireSRWLockExclusive, AcquireSRWLockShared, CancelIo, CloseHandle, CompareStringOrdinal, CreateDirectoryW, CreateEventW, CreateFileMappingA, CreateFileW, CreateMutexA, CreateNamedPipeW, CreateProcessW, CreateThread, CreateToolhelp32Snapshot, DeleteFileW, DeviceIoControl, DuplicateHandle, ExitProcess, FindClose, FindFirstFileW, FindNextFileW, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, GetCommandLineW, GetComputerNameExW, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetDiskFreeSpaceExW, GetDriveTypeW, GetEnvironmentStringsW, GetEnvironmentVariableW, GetExitCodeProcess, GetFileAttributesW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFullPathNameW, GetLastError, GetLogicalDrives, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetProcessIoCounters, GetProcessTimes, GetStdHandle, GetSystemDirectoryW, GetSystemInfo, GetSystemTimeAsFileTime, GetSystemTimes, GetTempPathW, GetTickCount64, GetVolumeInformationW, GetWindowsDirectoryW, GlobalMemoryStatusEx, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, IsWow64Process, LoadLibraryA, MapViewOfFile, Module32FirstW, Module32NextW, MoveFileExW, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, QueryPerformanceFrequency, ReadFile, ReadFileEx, ReleaseMutex, ReleaseSRWLockExclusive, ReleaseSRWLockShared, RtlCaptureContext, SetFileAttributesW, SetFileInformationByHandle, SetLastError, SetThreadStackGuarantee, Sleep, SleepConditionVariableSRW, SleepEx, SwitchToThread, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnmapViewOfFile, WaitForMultipleObjects, WaitForSingleObject, WaitForSingleObjectEx, WakeAllConditionVariable, WakeConditionVariable, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, WriteConsoleW, WriteFileEx
                            netapi32.dllNetApiBufferFree, NetShareEnum, NetUserEnum, NetUserGetInfo, NetUserGetLocalGroups, NetUserSetInfo
                            ntdll.dllNtCreateFile, NtQuerySystemInformation, RtlNtStatusToDosError
                            ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoUninitialize
                            oleaut32.dllGetErrorInfo, SysAllocString, SysFreeString, SysStringLen, VariantClear
                            pdh.dllPdhAddEnglishCounterW, PdhCloseQuery, PdhCollectQueryData, PdhGetFormattedCounterValue, PdhOpenQueryA, PdhRemoveCounter
                            powrprof.dllCallNtPowerInformation
                            rstrtmgr.dllRmEndSession, RmGetList, RmRegisterResources, RmStartSession
                            secur32.dllLsaEnumerateLogonSessions, LsaFreeReturnBuffer, LsaGetLogonSessionData
                            shell32.dllShellExecuteA
                            user32.dllExitWindowsEx, SystemParametersInfoW
                            ws2_32.dllWSACleanup, WSAGetLastError, WSAStartup, freeaddrinfo, getaddrinfo
                            NameOrdinalAddress
                            DllMain10x10032630
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to jump to process

                            Target ID:0
                            Start time:19:11:54
                            Start date:19/11/2023
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll"
                            Imagebase:0x560000
                            File size:126'464 bytes
                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PsExec, Description: Yara detected PsExec sysinternal tool, Source: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:true

                            Target ID:1
                            Start time:19:11:54
                            Start date:19/11/2023
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:19:11:54
                            Start date:19/11/2023
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:19:11:54
                            Start date:19/11/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\YUoxuUri8M.dll,DllMain
                            Imagebase:0xb90000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PsExec, Description: Yara detected PsExec sysinternal tool, Source: 00000003.00000002.1656593913.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:19:11:54
                            Start date:19/11/2023
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\YUoxuUri8M.dll",#1
                            Imagebase:0xb90000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_PsExec, Description: Yara detected PsExec sysinternal tool, Source: 00000004.00000002.1656581433.000000006CBAC000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:1%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:18.2%
                              Total number of Nodes:901
                              Total number of Limit Nodes:23
                              execution_graph 52894 6cce12bc 52901 6cce1020 52894->52901 52896 6cce12c1 52897 6cce12f3 52896->52897 52900 6cce1288 52896->52900 52918 6ce2edc0 52896->52918 52899 6cce1020 9 API calls 52897->52899 52897->52900 52899->52900 52902 6cce102e 52901->52902 52905 6cce108f 52901->52905 52902->52905 52906 6cce1050 Sleep 52902->52906 52907 6cce1070 52902->52907 52903 6cce1150 52903->52896 52904 6cce10e2 52912 6cce10f2 52904->52912 52913 6cce1200 _amsg_exit 52904->52913 52905->52896 52905->52903 52905->52904 52908 6cce10c8 Sleep 52905->52908 52906->52902 52909 6cce107e _amsg_exit 52907->52909 52910 6cce1160 52907->52910 52908->52905 52909->52905 52923 6ce2ec80 _lock _unlock free 52910->52923 52914 6cce10ff 52912->52914 52915 6cce11b0 _initterm 52912->52915 52913->52896 52916 6cce11d8 _initterm 52914->52916 52917 6cce110d 52914->52917 52915->52914 52916->52917 52917->52896 52919 6ce2edc9 52918->52919 52921 6ce2ed60 52918->52921 52919->52897 52924 6cce13e0 _lock _unlock realloc calloc _unlock 52921->52924 52922 6ce2ed90 52922->52897 52923->52905 52924->52922 52925 6ccf023a memcmp 52926 6ccf0252 52925->52926 53043 6cceff1a 52925->53043 52930 6ccf225b 52926->52930 53070 6ccedcc0 52926->53070 52927 6ccedcc0 51 API calls 52927->53043 52929 6ccf0269 52931 6ccef810 77 API calls 52929->52931 52987 6ccf0bc4 52929->52987 52931->53043 52933 6ccf0c0d HeapFree 52996 6ccf0c1d 52933->52996 52934 6ccf0c39 HeapFree 52939 6ccf0c49 52934->52939 52935 6ccf0ed1 52936 6ccf0eee 52935->52936 52940 6ccf0edf HeapFree 52935->52940 52937 6ccf0f39 52936->52937 52945 6ccf0f56 52936->52945 52950 6ccf0f2b HeapFree 52936->52950 52942 6ccf0f47 HeapFree 52937->52942 52937->52945 52938 6ccf21d7 53093 6ccecd00 51 API calls 52938->53093 52939->52935 52939->52936 52947 6ccf0c9f HeapFree 52939->52947 52940->52936 52941 6ccf0ba9 53076 6ccecd00 51 API calls 52941->53076 52942->52945 52944 6ccf0fa9 52951 6ccf0fb7 HeapFree 52944->52951 52953 6ccf0fc6 52944->52953 52945->52944 52945->52953 52955 6ccf0f9b HeapFree 52945->52955 52947->52939 52949 6ccf1102 52954 6ccf1132 52949->52954 52966 6ccf1122 HeapFree 52949->52966 52950->52936 52951->52953 52952 6ccf1019 52956 6ccf1027 HeapFree 52952->52956 52958 6ccf1036 52952->52958 52953->52952 52953->52958 52963 6ccf100b HeapFree 52953->52963 52971 6ccf114e HeapFree 52954->52971 52976 6ccf115e 52954->52976 52955->52945 52956->52958 52957 6ccf1089 52960 6ccf1093 HeapFree 52957->52960 52962 6ccf10a5 52957->52962 52958->52957 52958->52962 52968 6ccf107b HeapFree 52958->52968 52959 6ccf1d9e 53087 6ccecd00 51 API calls 52959->53087 52960->52962 52961 6ccf10e9 52961->52949 52965 6ccf10f0 HeapFree 52961->52965 52962->52949 52962->52961 52970 6ccf10db HeapFree 52962->52970 52963->52953 52964 6ccf1c24 52973 6ccf1c4c 52964->52973 52974 6ccf1c2c 52964->52974 52965->52949 52966->52954 52968->52958 52970->52962 52971->52976 52972 6ccf1331 53078 6ccecd00 51 API calls 52972->53078 53085 6ccecd00 51 API calls 52973->53085 53084 6ccecd00 51 API calls 52974->53084 52976->52972 52980 6ccf1601 52976->52980 52979 6ccf1b59 52979->52987 52988 6ccf2534 HeapFree 52979->52988 52982 6ccf167f 52980->52982 52983 6ccf1606 memcpy 52980->52983 52981 6ccf1367 memcpy 52989 6ccf145e 52981->52989 52990 6ccf139b 52981->52990 53082 6ccecd00 51 API calls 52982->53082 52991 6ccf163d memcpy 52983->52991 53061 6ccefe0b 52983->53061 52984 6ccf0867 52984->53061 53088 6ccecd00 51 API calls 52984->53088 52986 6ccf1bba 52986->52979 52995 6ccf250d HeapFree 52986->52995 52987->52933 52987->52996 52988->52987 53081 6ccee550 HeapFree HeapFree 52989->53081 53079 6ccee670 16 API calls 52990->53079 52998 6ccf14ce memcpy 52991->52998 52991->53061 52993 6ccf1c6c 53000 6ccf24d7 52993->53000 53010 6ccf24c9 HeapFree 52993->53010 52995->52979 52996->52934 52996->52939 53004 6ccf1558 memcpy 52998->53004 52998->53061 52999 6ccf169a 52999->52981 53000->52986 53005 6ccf24e1 HeapFree 53000->53005 53001 6ccf146c HeapFree 53001->52998 53001->53061 53002 6ccf1d68 53003 6ccf2475 53002->53003 53017 6ccf2467 HeapFree 53002->53017 53003->52993 53008 6ccf247f HeapFree 53003->53008 53011 6ccf158e memcpy 53004->53011 53012 6ccf157c HeapFree 53004->53012 53005->52986 53006 6ccf1de3 53015 6ccf2413 53006->53015 53025 6ccf2405 HeapFree 53006->53025 53007 6ccf1e24 53021 6ccf23b1 53007->53021 53033 6ccf23a3 HeapFree 53007->53033 53008->52993 53009 6ccf08ce 53086 6ccecd00 51 API calls 53009->53086 53010->52993 53022 6ccf15e9 53011->53022 53023 6ccf15d4 HeapFree 53011->53023 53012->53011 53014 6ccf095b 53083 6ccecd00 51 API calls 53014->53083 53015->53002 53016 6ccf241d HeapFree 53015->53016 53016->53002 53017->53002 53019 6ccf0878 53019->53061 53091 6ccecd00 51 API calls 53019->53091 53021->53006 53029 6ccf23bb HeapFree 53021->53029 53023->53022 53024 6ccf1f4f 53028 6ccf234f 53024->53028 53036 6ccf2341 HeapFree 53024->53036 53025->53006 53027 6ccf1f32 53089 6ccecd00 51 API calls 53027->53089 53028->53007 53031 6ccf2359 HeapFree 53028->53031 53029->53006 53030 6ccefe14 HeapFree 53030->53061 53031->53007 53033->53007 53035 6ccf22ed 53035->53024 53037 6ccf22f7 HeapFree 53035->53037 53036->53024 53037->53024 53039 6ccf1745 53039->52976 53039->52979 53039->52986 53039->52987 53039->52993 53039->53002 53039->53006 53039->53007 53039->53024 53042 6ccf1ff5 53039->53042 53044 6ccf26b0 HeapFree 53039->53044 53040 6ccf2a60 HeapFree 53040->53061 53041 6ccf22df HeapFree 53041->53042 53042->53035 53042->53041 53043->52927 53043->52938 53043->52941 53043->52959 53043->52964 53043->52984 53043->52987 53043->53009 53043->53014 53043->53019 53043->53027 53043->53039 53047 6ccf1f95 53043->53047 53052 6ccf2180 53043->53052 53072 6cda14f0 53043->53072 53074 6cced330 53 API calls 53043->53074 53075 6cda0e80 54 API calls 53043->53075 53044->53042 53045 6ccf29d8 HeapFree 53045->53061 53090 6ccecd00 51 API calls 53047->53090 53048 6ccf29bc HeapFree 53048->53061 53051 6ccf2679 HeapFree 53051->53061 53092 6ccecd00 51 API calls 53052->53092 53053 6ccf2618 HeapFree 53053->53061 53055 6ccf1488 memcpy 53055->52998 53055->53061 53057 6ccf21ae HeapFree 53057->53061 53058 6ccee670 16 API calls 53058->53061 53059 6ccf1444 HeapFree 53059->53061 53060 6ccf212c HeapFree 53060->53061 53061->52998 53061->53004 53061->53030 53061->53040 53061->53045 53061->53048 53061->53051 53061->53053 53061->53055 53061->53057 53061->53058 53061->53060 53062 6ccf1f7e HeapFree 53061->53062 53063 6ccf1ee9 HeapFree 53061->53063 53064 6ccf1dcc HeapFree 53061->53064 53065 6ccf1d3a HeapFree 53061->53065 53066 6ccf1ba2 HeapFree 53061->53066 53067 6ccf1b4b HeapFree 53061->53067 53068 6ccf1c0d HeapFree 53061->53068 53069 6ccf141c HeapFree 53061->53069 53077 6ccee090 51 API calls 53061->53077 53080 6ccee550 HeapFree HeapFree 53061->53080 53094 6ccecd00 51 API calls 53061->53094 53095 6ccee250 54 API calls 53061->53095 53096 6ccef250 53061->53096 53062->53061 53063->53061 53064->53061 53065->53061 53066->53061 53067->53061 53068->53061 53069->53061 53098 6ccedcd4 51 API calls 53070->53098 53099 6cda14fe 56 API calls 53072->53099 53074->53043 53076->52987 53078->52981 53079->53061 53080->53059 53081->53001 53082->52999 53083->52987 53084->52987 53085->52987 53086->52987 53087->52987 53088->52987 53089->52987 53090->52987 53091->52987 53092->52987 53093->52987 53094->53061 53095->53061 53100 6ccef266 63 API calls 53096->53100 53101 6ccef2f9 53103 6ccef302 53101->53103 53102 6ccef375 53125 6ccecd00 51 API calls 53102->53125 53103->53102 53104 6ccef30a 53103->53104 53108 6ccef6d0 53104->53108 53107 6ccef315 53109 6ccef6e8 53108->53109 53110 6ccef723 53108->53110 53109->53110 53112 6ccef7e6 53109->53112 53115 6ccef736 53109->53115 53126 6ccecd00 51 API calls 53110->53126 53127 6cced750 60 API calls 53112->53127 53113 6ccef734 53113->53107 53115->53112 53117 6ccef73f 53115->53117 53119 6cda14f0 56 API calls 53117->53119 53124 6ccef757 53119->53124 53120 6ccef7c8 memcpy 53120->53113 53121 6ccef7bc 53121->53120 53122 6ccef78f GetProcessHeap 53122->53124 53123 6ccef79a HeapAlloc 53123->53120 53123->53124 53124->53113 53124->53121 53124->53122 53124->53123 53125->53107 53126->53113 53128 6cd125f8 53129 6cd125fd 53128->53129 53140 6cd0a790 53129->53140 53131 6cd1260a 53143 6ce2cac0 53131->53143 53133 6cd1261d 53134 6cd127ff HeapFree 53133->53134 53135 6cd12814 53133->53135 53134->53135 53157 6cd0a040 16 API calls 53135->53157 53141 6cd0a79c HeapFree 53140->53141 53142 6cd0a7ad 53140->53142 53141->53142 53142->53131 53158 6ce2c170 53143->53158 53146 6ce2cb02 53177 6ce2c370 35 API calls 53146->53177 53147 6ce2cb4e 53178 6ce2c490 35 API calls 53147->53178 53150 6ce2cb07 53151 6ce2fa56 abort abort abort 53150->53151 53152 6ce2cb16 53150->53152 53153 6ce2fa68 abort 53151->53153 53171 6ce2a720 53152->53171 53156 6ce2fa90 53153->53156 53155 6ce2cb1d 53155->53133 53156->53156 53179 6ce2bb10 53158->53179 53160 6ce2fa38 abort 53161 6ce2fa68 abort 53160->53161 53164 6ce2fa90 53161->53164 53162 6ce2c1c7 53162->53160 53165 6ce2c1d4 53162->53165 53163 6ce2c1a7 53163->53160 53163->53162 53166 6ce2c2c6 53163->53166 53164->53164 53203 6ce2b040 53165->53203 53168 6ce2c2d0 Sleep 53166->53168 53168->53168 53170 6ce2c2e5 53168->53170 53169 6ce2c215 53169->53146 53169->53147 53170->53162 53175 6ce2a739 53171->53175 53172 6ce2fa10 abort 53173 6ce2fa68 abort 53172->53173 53174 6ce2fa90 53173->53174 53174->53174 53175->53172 53176 6ce2a82d 53175->53176 53176->53155 53177->53150 53178->53150 53180 6ce2be79 53179->53180 53181 6ce2bb3f 53179->53181 53180->53163 53218 6ce2e850 21 API calls 53181->53218 53183 6ce2bb58 53184 6ce2bb64 strlen 53183->53184 53185 6ce2bd8b 53183->53185 53190 6ce2bb9a 53184->53190 53185->53163 53185->53180 53186 6ce2bdc0 53221 6ce2a8b0 abort abort 53186->53221 53187 6ce2bd49 53202 6ce2bd75 53187->53202 53223 6ce2a8b0 abort abort 53187->53223 53190->53185 53190->53186 53192 6ce2bcda 53190->53192 53191 6ce2be14 53191->53185 53195 6ce2fa33 abort 53191->53195 53192->53185 53192->53187 53219 6ce2b350 abort abort abort abort 53192->53219 53194 6ce2bcf8 53194->53185 53194->53191 53194->53195 53196 6ce2bd28 53194->53196 53198 6ce2fa68 abort 53195->53198 53196->53187 53199 6ce2be90 53196->53199 53201 6ce2fa90 53198->53201 53199->53202 53222 6ce2a8b0 abort abort 53199->53222 53201->53201 53220 6ce2b350 abort abort abort abort 53202->53220 53207 6ce2b06e 53203->53207 53204 6ce2fa24 abort 53205 6ce2fa68 abort 53204->53205 53208 6ce2fa90 53205->53208 53206 6ce2b328 53207->53206 53212 6ce2b0ac 53207->53212 53216 6ce2b300 53207->53216 53224 6ce2a91e abort abort 53207->53224 53208->53208 53210 6ce2b1bf 53210->53169 53212->53204 53212->53210 53214 6ce2aa50 abort abort 53212->53214 53215 6ce2b380 53212->53215 53212->53216 53213 6ce2b3e4 53213->53169 53214->53212 53215->53213 53217 6ce2fa2e abort 53215->53217 53225 6ce2a8b0 abort abort 53215->53225 53216->53204 53216->53206 53217->53205 53218->53183 53219->53194 53220->53185 53221->53191 53222->53202 53223->53202 53224->53212 53225->53215 53226 6ccf02b6 53227 6ccf02e5 53226->53227 53338 6cceff1a 53226->53338 53229 6ccedcc0 51 API calls 53227->53229 53231 6ccf224c 53227->53231 53228 6ccedcc0 51 API calls 53228->53338 53230 6ccf02fc 53229->53230 53289 6ccf0bc4 53230->53289 53371 6ccef810 53230->53371 53234 6ccf0c0d HeapFree 53236 6ccf0c1d 53234->53236 53235 6ccf0c49 53237 6ccf0eee 53235->53237 53240 6ccf0ed1 53235->53240 53250 6ccf0c9f HeapFree 53235->53250 53236->53235 53238 6ccf0c39 HeapFree 53236->53238 53239 6ccf0f56 53237->53239 53241 6ccf0f39 53237->53241 53253 6ccf0f2b HeapFree 53237->53253 53238->53235 53245 6ccf0fc6 53239->53245 53248 6ccf0fa9 53239->53248 53257 6ccf0f9b HeapFree 53239->53257 53240->53237 53243 6ccf0edf HeapFree 53240->53243 53241->53239 53246 6ccf0f47 HeapFree 53241->53246 53242 6ccf21d7 53420 6ccecd00 51 API calls 53242->53420 53243->53237 53244 6ccf0ba9 53403 6ccecd00 51 API calls 53244->53403 53255 6ccf1019 53245->53255 53264 6ccf100b HeapFree 53245->53264 53265 6ccf1036 53245->53265 53246->53239 53248->53245 53254 6ccf0fb7 HeapFree 53248->53254 53250->53235 53252 6ccf1102 53256 6ccf1132 53252->53256 53268 6ccf1122 HeapFree 53252->53268 53253->53237 53254->53245 53258 6ccf1027 HeapFree 53255->53258 53255->53265 53273 6ccf114e HeapFree 53256->53273 53278 6ccf115e 53256->53278 53257->53239 53258->53265 53259 6ccf1089 53261 6ccf1093 HeapFree 53259->53261 53263 6ccf10a5 53259->53263 53260 6ccf1d9e 53414 6ccecd00 51 API calls 53260->53414 53261->53263 53262 6ccf10e9 53262->53252 53267 6ccf10f0 HeapFree 53262->53267 53263->53252 53263->53262 53272 6ccf10db HeapFree 53263->53272 53264->53245 53265->53259 53265->53263 53270 6ccf107b HeapFree 53265->53270 53266 6ccf1c24 53275 6ccf1c4c 53266->53275 53276 6ccf1c2c 53266->53276 53267->53252 53268->53256 53270->53265 53271 6cda14f0 56 API calls 53271->53338 53272->53263 53273->53278 53274 6ccf1331 53405 6ccecd00 51 API calls 53274->53405 53412 6ccecd00 51 API calls 53275->53412 53411 6ccecd00 51 API calls 53276->53411 53278->53274 53282 6ccf1601 53278->53282 53281 6ccf1b59 53281->53289 53290 6ccf2534 HeapFree 53281->53290 53284 6ccf167f 53282->53284 53285 6ccf1606 memcpy 53282->53285 53283 6ccf1367 memcpy 53291 6ccf145e 53283->53291 53292 6ccf139b 53283->53292 53409 6ccecd00 51 API calls 53284->53409 53293 6ccf163d memcpy 53285->53293 53362 6ccefe0b 53285->53362 53286 6ccf0867 53286->53362 53415 6ccecd00 51 API calls 53286->53415 53288 6ccf1bba 53288->53281 53297 6ccf250d HeapFree 53288->53297 53289->53234 53289->53236 53290->53289 53408 6ccee550 HeapFree HeapFree 53291->53408 53406 6ccee670 16 API calls 53292->53406 53299 6ccf14ce memcpy 53293->53299 53293->53362 53295 6ccf1c6c 53301 6ccf24d7 53295->53301 53311 6ccf24c9 HeapFree 53295->53311 53297->53281 53305 6ccf1558 memcpy 53299->53305 53299->53362 53300 6ccf169a 53300->53283 53301->53288 53306 6ccf24e1 HeapFree 53301->53306 53302 6ccf146c HeapFree 53302->53299 53302->53362 53303 6ccf1d68 53304 6ccf2475 53303->53304 53318 6ccf2467 HeapFree 53303->53318 53304->53295 53309 6ccf247f HeapFree 53304->53309 53312 6ccf158e memcpy 53305->53312 53313 6ccf157c HeapFree 53305->53313 53306->53288 53307 6ccf1de3 53316 6ccf2413 53307->53316 53326 6ccf2405 HeapFree 53307->53326 53308 6ccf1e24 53322 6ccf23b1 53308->53322 53334 6ccf23a3 HeapFree 53308->53334 53309->53295 53310 6ccf08ce 53413 6ccecd00 51 API calls 53310->53413 53311->53295 53323 6ccf15e9 53312->53323 53324 6ccf15d4 HeapFree 53312->53324 53313->53312 53315 6ccf095b 53410 6ccecd00 51 API calls 53315->53410 53316->53303 53317 6ccf241d HeapFree 53316->53317 53317->53303 53318->53303 53320 6ccf0878 53320->53362 53418 6ccecd00 51 API calls 53320->53418 53322->53307 53330 6ccf23bb HeapFree 53322->53330 53324->53323 53325 6ccf1f4f 53329 6ccf234f 53325->53329 53337 6ccf2341 HeapFree 53325->53337 53326->53307 53328 6ccf1f32 53416 6ccecd00 51 API calls 53328->53416 53329->53308 53332 6ccf2359 HeapFree 53329->53332 53330->53307 53331 6ccefe14 HeapFree 53331->53362 53332->53308 53334->53308 53335 6ccef250 63 API calls 53335->53362 53336 6ccf22ed 53336->53325 53339 6ccf22f7 HeapFree 53336->53339 53337->53325 53338->53228 53338->53242 53338->53244 53338->53260 53338->53266 53338->53271 53338->53286 53338->53289 53338->53310 53338->53315 53338->53320 53338->53328 53341 6ccf1745 53338->53341 53348 6ccf1f95 53338->53348 53353 6ccf2180 53338->53353 53401 6cced330 53 API calls 53338->53401 53402 6cda0e80 54 API calls 53338->53402 53339->53325 53341->53278 53341->53281 53341->53288 53341->53289 53341->53295 53341->53303 53341->53307 53341->53308 53341->53325 53344 6ccf1ff5 53341->53344 53345 6ccf26b0 HeapFree 53341->53345 53342 6ccf2a60 HeapFree 53342->53362 53343 6ccf22df HeapFree 53343->53344 53344->53336 53344->53343 53345->53344 53346 6ccf29d8 HeapFree 53346->53362 53417 6ccecd00 51 API calls 53348->53417 53349 6ccf29bc HeapFree 53349->53362 53352 6ccf2679 HeapFree 53352->53362 53419 6ccecd00 51 API calls 53353->53419 53354 6ccf2618 HeapFree 53354->53362 53356 6ccf1488 memcpy 53356->53299 53356->53362 53358 6ccf21ae HeapFree 53358->53362 53359 6ccee670 16 API calls 53359->53362 53360 6ccf1444 HeapFree 53360->53362 53361 6ccf212c HeapFree 53361->53362 53362->53299 53362->53305 53362->53331 53362->53335 53362->53342 53362->53346 53362->53349 53362->53352 53362->53354 53362->53356 53362->53358 53362->53359 53362->53361 53363 6ccf1f7e HeapFree 53362->53363 53364 6ccf1ee9 HeapFree 53362->53364 53365 6ccf1dcc HeapFree 53362->53365 53366 6ccf1d3a HeapFree 53362->53366 53367 6ccf1ba2 HeapFree 53362->53367 53368 6ccf1b4b HeapFree 53362->53368 53369 6ccf1c0d HeapFree 53362->53369 53370 6ccf141c HeapFree 53362->53370 53404 6ccee090 51 API calls 53362->53404 53407 6ccee550 HeapFree HeapFree 53362->53407 53421 6ccecd00 51 API calls 53362->53421 53422 6ccee250 54 API calls 53362->53422 53363->53362 53364->53362 53365->53362 53366->53362 53367->53362 53368->53362 53369->53362 53370->53362 53372 6ccef82b 53371->53372 53373 6ccef867 53371->53373 53372->53373 53376 6ccef87d 53372->53376 53431 6ccecd00 51 API calls 53373->53431 53375 6ccef878 53375->53338 53377 6ccef9a9 53376->53377 53378 6ccef886 53376->53378 53433 6cced750 60 API calls 53377->53433 53380 6ccef9bf 53378->53380 53389 6ccef891 53378->53389 53434 6ccecd00 51 API calls 53380->53434 53383 6ccef250 63 API calls 53383->53389 53385 6ccef91a 53386 6ccef94e 53385->53386 53390 6ccef93b HeapFree 53385->53390 53387 6ccef965 53386->53387 53388 6ccef954 HeapFree 53386->53388 53432 6ccee090 51 API calls 53387->53432 53388->53387 53389->53383 53389->53385 53389->53387 53423 6cceed10 53389->53423 53390->53385 53401->53338 53403->53289 53405->53283 53406->53362 53407->53360 53408->53302 53409->53300 53410->53289 53411->53289 53412->53289 53413->53289 53414->53289 53415->53289 53416->53289 53417->53289 53418->53289 53419->53289 53420->53289 53421->53362 53422->53362 53424 6cceed1c 53423->53424 53428 6cceed92 53423->53428 53435 6cceeba0 53424->53435 53426 6cceed7b 53427 6cceeba0 9 API calls 53426->53427 53426->53428 53429 6cceee13 53427->53429 53428->53389 53429->53428 53430 6cceeba0 9 API calls 53429->53430 53430->53428 53431->53375 53434->53375 53436 6cceebb4 53435->53436 53439 6cceebe3 53435->53439 53437 6cceebef 53436->53437 53438 6cceebc8 53436->53438 53436->53439 53437->53439 53442 6cceecb5 GetProcessHeap 53437->53442 53443 6cceec03 53437->53443 53440 6cceebcf HeapReAlloc RtlReAllocateHeap 53438->53440 53441 6cceec43 53438->53441 53439->53426 53440->53439 53444 6cceec6d HeapAlloc 53441->53444 53445 6cceec54 GetProcessHeap 53441->53445 53442->53439 53442->53443 53446 6cceeccc HeapAlloc 53443->53446 53447 6cceec0c HeapAlloc 53443->53447 53444->53439 53449 6cceec80 memcpy HeapFree 53444->53449 53445->53439 53448 6cceec65 53445->53448 53446->53439 53450 6cceec17 53446->53450 53447->53450 53448->53444 53449->53439 53450->53439 53451 6cd141ab 53465 6cd12c2a 53451->53465 53453 6cd12c62 HeapFree 53453->53465 53454 6cd14535 53458 6cd1456a memcpy 53454->53458 53455 6cd12d40 HeapFree 53455->53465 53457 6cd13890 HeapFree 53457->53465 53460 6cd14593 53458->53460 53461 6cd14584 HeapFree 53458->53461 53459 6cd12d99 HeapFree 53459->53465 53464 6cd145dd memset 53460->53464 53470 6cd145f4 53460->53470 53461->53460 53462 6cd12d71 HeapFree 53462->53465 53463 6cd12db9 53532 6cdc51c0 53463->53532 53464->53470 53465->53453 53465->53455 53465->53457 53465->53459 53465->53462 53465->53463 53467 6cd13e07 HeapFree 53465->53467 53476 6cd138cd 53465->53476 53549 6cdc52f0 61 API calls 53465->53549 53467->53465 53551 6cd0c9c0 8 API calls 53470->53551 53472 6cd13980 memcpy 53474 6cdc51c0 86 API calls 53472->53474 53473 6cd12e07 53570 6cd0a040 16 API calls 53473->53570 53474->53476 53476->53454 53476->53465 53476->53472 53478 6ccec4b0 GetProcessHeap HeapAlloc memcpy 53476->53478 53550 6cd20c40 70 API calls 53476->53550 53478->53476 53481 6cd149f7 53482 6cd14b7c HeapFree 53481->53482 53483 6cd14bb0 53481->53483 53492 6cd14a4d 53481->53492 53482->53481 53482->53483 53486 6cdc51c0 86 API calls 53483->53486 53484 6cd148b1 memcpy 53489 6cd1474a 53484->53489 53488 6cd14bf4 53486->53488 53491 6cdc9ae0 59 API calls 53488->53491 53489->53481 53489->53484 53552 6cd0c7e0 8 API calls 53489->53552 53553 6cd0c9c0 8 API calls 53489->53553 53490 6cdc51c0 86 API calls 53490->53492 53491->53473 53492->53482 53492->53490 53494 6cd14c06 53492->53494 53554 6ce28210 95 API calls 53492->53554 53495 6cdc51c0 86 API calls 53494->53495 53496 6cd14c4a 53495->53496 53555 6cd0b490 16 API calls 53496->53555 53498 6cd14f65 53556 6cd0bb40 7 API calls 53498->53556 53500 6cd14f71 memcpy 53502 6cd14fce 53500->53502 53557 6ccf3ec0 53 API calls 53502->53557 53504 6cd15021 53558 6cd0b490 16 API calls 53504->53558 53506 6cd153f9 53559 6cd0bb40 7 API calls 53506->53559 53508 6cd15400 memcpy 53510 6cd15479 53508->53510 53511 6cdc51c0 86 API calls 53510->53511 53512 6cd154bd 53511->53512 53560 6cd0b490 16 API calls 53512->53560 53514 6cd15759 53561 6cd0bb40 7 API calls 53514->53561 53516 6cd15760 53562 6cd0b490 16 API calls 53516->53562 53518 6cd15d3a 53563 6cd0bb40 7 API calls 53518->53563 53520 6cd15d41 53564 6ccf3ec0 53 API calls 53520->53564 53523 6cd15fbf HeapFree 53525 6cd15d73 53523->53525 53525->53523 53527 6cd15fcb 53525->53527 53565 6cd0b490 16 API calls 53525->53565 53566 6cd0bb40 7 API calls 53525->53566 53567 6cce1540 HeapAlloc GetProcessHeap HeapAlloc 53525->53567 53568 6cdf6ad0 114 API calls 53527->53568 53529 6cd16019 53569 6cd0cba0 53 API calls 53529->53569 53531 6cd16038 53531->53473 53571 6cdc5060 53532->53571 53534 6cdc521e 53535 6cd12dfd 53534->53535 53536 6cdc522c 53534->53536 53628 6cdca070 58 API calls 53534->53628 53544 6cdc9ae0 53535->53544 53582 6cdc4a60 53536->53582 53539 6cdc5267 53539->53535 53629 6cda9410 HeapFree HeapFree 53539->53629 53541 6cdc52da 53542 6ce2cac0 46 API calls 53541->53542 53543 6cdc52e3 53542->53543 53642 6cdc1b30 53544->53642 53546 6cdc9aec 53647 6cdd2500 ExitProcess 53546->53647 53549->53465 53550->53476 53551->53489 53552->53489 53553->53489 53554->53492 53555->53498 53556->53500 53557->53504 53558->53506 53559->53508 53560->53514 53561->53516 53562->53518 53563->53520 53564->53525 53565->53525 53566->53525 53567->53525 53568->53529 53569->53531 53572 6cdc5074 53571->53572 53578 6cdc50b5 53571->53578 53573 6cdc5091 AcquireSRWLockExclusive 53572->53573 53572->53578 53574 6cdc50a9 53573->53574 53630 6cdc5e00 HeapFree HeapFree 53574->53630 53576 6cdc5128 ReleaseSRWLockExclusive 53576->53578 53577 6cdc5122 53577->53576 53578->53534 53579 6cdc50da 53579->53577 53580 6cdc5114 HeapFree 53579->53580 53581 6cdc5106 HeapFree 53579->53581 53580->53577 53581->53580 53583 6cdc4a74 53582->53583 53584 6cdc4a94 AcquireSRWLockExclusive 53583->53584 53585 6cdc4a85 53583->53585 53586 6cdc4b88 53583->53586 53593 6cdc4a8f 53584->53593 53585->53586 53585->53593 53631 6cdaf190 53586->53631 53588 6cdc4af0 53591 6cdc4b6c 53588->53591 53592 6cdc4b5c ReleaseSRWLockExclusive 53588->53592 53591->53539 53592->53591 53593->53588 53595 6cdc4b44 HeapFree 53593->53595 53596 6cdc4b36 HeapFree 53593->53596 53594 6cdc4bda 53636 6cda8f00 53594->53636 53595->53588 53596->53595 53598 6cdc4bef 53599 6ce2cac0 46 API calls 53598->53599 53600 6cdc4bf5 53599->53600 53601 6cdc4c5a 53600->53601 53605 6cdc4e09 53600->53605 53602 6cdc4c71 memcpy 53601->53602 53603 6cdc4d17 53601->53603 53604 6cdc4cca 53601->53604 53602->53603 53609 6cdc4cf5 53603->53609 53639 6cdc3ff0 54 API calls 53603->53639 53608 6cdc4daa memcpy 53604->53608 53604->53609 53607 6ce2cac0 46 API calls 53605->53607 53610 6cdc4e2e 53607->53610 53608->53609 53609->53539 53611 6cdc4e74 AcquireSRWLockExclusive 53610->53611 53612 6cdc4e65 53610->53612 53613 6cdc4f62 53610->53613 53621 6cdc4e6f 53611->53621 53612->53613 53612->53621 53614 6cdaf190 HeapFree 53613->53614 53616 6cdc4fa9 53614->53616 53615 6cdc4ecd 53617 6cdc4f39 ReleaseSRWLockExclusive 53615->53617 53618 6cdc4f46 53615->53618 53640 6cdaf170 HeapFree 53616->53640 53617->53618 53618->53539 53620 6cdc4fb4 53641 6cda9530 ReleaseSRWLockExclusive 53620->53641 53621->53615 53622 6cdc4f21 HeapFree 53621->53622 53623 6cdc4f13 HeapFree 53621->53623 53622->53615 53623->53622 53625 6cdc4fc9 53626 6ce2cac0 46 API calls 53625->53626 53627 6cdc4fcf 53626->53627 53628->53536 53629->53541 53630->53579 53632 6cdaf1af 53631->53632 53633 6cdaf194 HeapFree 53631->53633 53635 6cdaf170 HeapFree 53632->53635 53633->53632 53635->53594 53637 6cda8f0a ReleaseSRWLockExclusive 53636->53637 53638 6cda8f08 53636->53638 53637->53598 53638->53598 53640->53620 53641->53625 53643 6cdc1b45 53642->53643 53644 6cdc1b40 53642->53644 53648 6cddaa40 58 API calls 53643->53648 53644->53546 53646 6cdc1b69 53646->53546 53648->53646 53649 6cd12f9c 53650 6cd12fb0 53649->53650 53651 6cd12fbf HeapFree 53650->53651 53652 6cd12966 53650->53652 53651->53650 53654 6cd12814 53651->53654 53653 6cd12970 HeapFree 53652->53653 53656 6cd12985 53652->53656 53653->53656 53811 6cd0a040 16 API calls 53654->53811 53656->53654 53781 6cd21390 53656->53781 53661 6cd21390 6 API calls 53663 6cd12a08 53661->53663 53664 6cd21390 6 API calls 53663->53664 53665 6cd12a25 53664->53665 53666 6cd21390 6 API calls 53665->53666 53667 6cd12a3f 53666->53667 53668 6cd21390 6 API calls 53667->53668 53669 6cd12a5c 53668->53669 53670 6cd21390 6 API calls 53669->53670 53671 6cd12a76 53670->53671 53672 6cd21390 6 API calls 53671->53672 53673 6cd12a90 53672->53673 53674 6cd21390 6 API calls 53673->53674 53675 6cd12aaa 53674->53675 53676 6cd21390 6 API calls 53675->53676 53677 6cd12ac4 53676->53677 53678 6cd21390 6 API calls 53677->53678 53679 6cd12ade 53678->53679 53680 6cd21390 6 API calls 53679->53680 53681 6cd12af8 53680->53681 53682 6cd21390 6 API calls 53681->53682 53683 6cd12b12 53682->53683 53684 6cd21390 6 API calls 53683->53684 53685 6cd12b2c 53684->53685 53686 6cd21390 6 API calls 53685->53686 53687 6cd12b46 53686->53687 53688 6cd21390 6 API calls 53687->53688 53689 6cd12b60 53688->53689 53690 6cd21390 6 API calls 53689->53690 53691 6cd12b7a 53690->53691 53692 6cd21390 6 API calls 53691->53692 53693 6cd12b94 53692->53693 53694 6cd21390 6 API calls 53693->53694 53695 6cd12bb1 53694->53695 53696 6cd21390 6 API calls 53695->53696 53697 6cd12bcb 53696->53697 53698 6cd21390 6 API calls 53697->53698 53699 6cd12be5 53698->53699 53700 6cd21390 6 API calls 53699->53700 53701 6cd12bff 53700->53701 53702 6cd21390 6 API calls 53701->53702 53703 6cd12c19 53702->53703 53704 6cd1301f 53703->53704 53714 6cd12c2a 53703->53714 53790 6cd20c40 70 API calls 53704->53790 53705 6cd12c62 HeapFree 53705->53714 53707 6cd12d40 HeapFree 53707->53714 53709 6cd13890 HeapFree 53709->53714 53710 6cd12d99 HeapFree 53710->53714 53711 6cd12d71 HeapFree 53711->53714 53712 6cd12db9 53715 6cdc51c0 86 API calls 53712->53715 53714->53705 53714->53707 53714->53709 53714->53710 53714->53711 53714->53712 53716 6cd13e07 HeapFree 53714->53716 53719 6cd130cc 53714->53719 53789 6cdc52f0 61 API calls 53714->53789 53717 6cd12dfd 53715->53717 53716->53714 53718 6cdc9ae0 59 API calls 53717->53718 53718->53654 53719->53714 53720 6cd14535 53719->53720 53721 6cd13980 memcpy 53719->53721 53727 6ccec4b0 GetProcessHeap HeapAlloc memcpy 53719->53727 53791 6cd20c40 70 API calls 53719->53791 53722 6cd1456a memcpy 53720->53722 53725 6cdc51c0 86 API calls 53721->53725 53723 6cd14593 53722->53723 53724 6cd14584 HeapFree 53722->53724 53726 6cd145dd memset 53723->53726 53728 6cd145f4 53723->53728 53724->53723 53725->53719 53726->53728 53727->53719 53792 6cd0c9c0 8 API calls 53728->53792 53731 6cd149f7 53732 6cd14b7c HeapFree 53731->53732 53733 6cd14bb0 53731->53733 53741 6cd14a4d 53731->53741 53732->53731 53732->53733 53735 6cdc51c0 86 API calls 53733->53735 53734 6cd148b1 memcpy 53738 6cd1474a 53734->53738 53737 6cd14bf4 53735->53737 53740 6cdc9ae0 59 API calls 53737->53740 53738->53731 53738->53734 53793 6cd0c7e0 8 API calls 53738->53793 53794 6cd0c9c0 8 API calls 53738->53794 53739 6cdc51c0 86 API calls 53739->53741 53740->53654 53741->53732 53741->53739 53743 6cd14c06 53741->53743 53795 6ce28210 95 API calls 53741->53795 53744 6cdc51c0 86 API calls 53743->53744 53745 6cd14c4a 53744->53745 53796 6cd0b490 16 API calls 53745->53796 53747 6cd14f65 53797 6cd0bb40 7 API calls 53747->53797 53749 6cd14f71 memcpy 53751 6cd14fce 53749->53751 53798 6ccf3ec0 53 API calls 53751->53798 53753 6cd15021 53799 6cd0b490 16 API calls 53753->53799 53755 6cd153f9 53800 6cd0bb40 7 API calls 53755->53800 53757 6cd15400 memcpy 53759 6cd15479 53757->53759 53760 6cdc51c0 86 API calls 53759->53760 53761 6cd154bd 53760->53761 53801 6cd0b490 16 API calls 53761->53801 53763 6cd15759 53802 6cd0bb40 7 API calls 53763->53802 53765 6cd15760 53803 6cd0b490 16 API calls 53765->53803 53767 6cd15d3a 53804 6cd0bb40 7 API calls 53767->53804 53769 6cd15d41 53805 6ccf3ec0 53 API calls 53769->53805 53772 6cd15fbf HeapFree 53774 6cd15d73 53772->53774 53774->53772 53776 6cd15fcb 53774->53776 53806 6cd0b490 16 API calls 53774->53806 53807 6cd0bb40 7 API calls 53774->53807 53808 6cce1540 HeapAlloc GetProcessHeap HeapAlloc 53774->53808 53809 6cdf6ad0 114 API calls 53776->53809 53778 6cd16019 53810 6cd0cba0 53 API calls 53778->53810 53780 6cd16038 53780->53654 53782 6cd213ca 53781->53782 53783 6cd214a8 memcmp 53782->53783 53784 6cd214c2 53782->53784 53783->53782 53783->53784 53785 6cd129ee 53784->53785 53786 6cd215dd 53784->53786 53785->53661 53812 6cd1fab0 memmove GetProcessHeap HeapAlloc memset HeapFree 53786->53812 53788 6cd215ec 53788->53785 53789->53714 53790->53719 53791->53719 53792->53738 53793->53738 53794->53738 53795->53741 53796->53747 53797->53749 53798->53753 53799->53755 53800->53757 53801->53763 53802->53765 53803->53767 53804->53769 53805->53774 53806->53774 53807->53774 53808->53774 53809->53778 53810->53780 53812->53788 53813 6ccefcd0 53814 6ccefcfd 53813->53814 53815 6ccefd44 53813->53815 53817 6ccefd1d HeapAlloc 53814->53817 53818 6ccefd12 GetProcessHeap 53814->53818 53942 6ccefd2f 53814->53942 53816 6ccefd49 memcpy 53815->53816 53819 6ccefd75 53816->53819 53824 6ccefd8b 53816->53824 53817->53816 53817->53942 53820 6ccefd1b 53818->53820 53818->53942 53821 6ccefd7c HeapFree 53819->53821 53819->53824 53820->53817 53821->53824 53822 6ccefdf0 53996 6ccecd00 51 API calls 53822->53996 53824->53822 53825 6ccefe53 53824->53825 53827 6ccf0cad 53825->53827 53828 6ccefe5c 53825->53828 53826 6ccefe14 HeapFree 53826->53942 53829 6ccef250 63 API calls 53827->53829 53830 6ccf28f6 53828->53830 53980 6ccefe65 53828->53980 53832 6ccf0cd3 53829->53832 54019 6cced750 60 API calls 53830->54019 53831 6ccef250 63 API calls 53831->53942 53837 6ccef250 63 API calls 53832->53837 53832->53942 53834 6ccf0ba9 53999 6ccecd00 51 API calls 53834->53999 53836 6ccf2a60 HeapFree 53836->53942 53839 6ccf13fc 53837->53839 53839->53942 54006 6ccef440 77 API calls 53839->54006 53840 6ccf29d8 HeapFree 53840->53942 53842 6ccf1d9e 54011 6ccecd00 51 API calls 53842->54011 53843 6ccf29bc HeapFree 53843->53942 53844 6ccf0c1d 53858 6ccf0c39 HeapFree 53844->53858 53866 6ccf0c49 53844->53866 53846 6ccf1c24 53855 6ccf1c4c 53846->53855 53856 6ccf1c2c 53846->53856 53847 6ccf0c0d HeapFree 53847->53844 53848 6ccf2679 HeapFree 53848->53942 53850 6cda14f0 56 API calls 53850->53980 53851 6ccf2618 HeapFree 53851->53942 53852 6ccf141c HeapFree 53852->53942 53854 6ccf1488 memcpy 53861 6ccf14ce memcpy 53854->53861 53854->53942 54009 6ccecd00 51 API calls 53855->54009 54008 6ccecd00 51 API calls 53856->54008 53858->53866 53870 6ccf1558 memcpy 53861->53870 53861->53942 53862 6ccf21ae HeapFree 53862->53942 53863 6ccee670 16 API calls 53863->53942 53865 6ccf1444 HeapFree 53865->53942 53867 6ccf0ed1 53866->53867 53871 6ccf0eee 53866->53871 53889 6ccf0c9f HeapFree 53866->53889 53867->53871 53878 6ccf0edf HeapFree 53867->53878 53868 6ccf212c HeapFree 53868->53942 53869 6ccf1b59 53876 6ccf2534 HeapFree 53869->53876 53930 6ccf0bc4 53869->53930 53874 6ccf158e memcpy 53870->53874 53875 6ccf157c HeapFree 53870->53875 53872 6ccf0f39 53871->53872 53882 6ccf0f56 53871->53882 53891 6ccf0f2b HeapFree 53871->53891 53879 6ccf0f47 HeapFree 53872->53879 53872->53882 53873 6ccf1bba 53873->53869 53890 6ccf250d HeapFree 53873->53890 53884 6ccf15e9 53874->53884 53885 6ccf15d4 HeapFree 53874->53885 53875->53874 53876->53930 53877 6ccf1f7e HeapFree 53877->53942 53878->53871 53879->53882 53881 6ccf0fa9 53893 6ccf0fb7 HeapFree 53881->53893 53895 6ccf0fc6 53881->53895 53882->53881 53882->53895 53901 6ccf0f9b HeapFree 53882->53901 53883 6ccf1ee9 HeapFree 53883->53942 53885->53884 53886 6ccf1c0d HeapFree 53886->53942 53887 6ccf1c6c 53898 6ccf24d7 53887->53898 53919 6ccf24c9 HeapFree 53887->53919 53888 6ccedcc0 51 API calls 53888->53980 53889->53866 53890->53869 53891->53871 53893->53895 53894 6ccf1019 53902 6ccf1027 HeapFree 53894->53902 53904 6ccf1036 53894->53904 53895->53894 53895->53904 53912 6ccf100b HeapFree 53895->53912 53896 6ccf1102 53906 6ccf1132 53896->53906 53929 6ccf1122 HeapFree 53896->53929 53898->53873 53908 6ccf24e1 HeapFree 53898->53908 53899 6ccf1d68 53905 6ccf2475 53899->53905 53928 6ccf2467 HeapFree 53899->53928 53900 6ccf1dcc HeapFree 53900->53942 53901->53882 53902->53904 53903 6ccf1089 53914 6ccf1093 HeapFree 53903->53914 53916 6ccf10a5 53903->53916 53904->53903 53904->53916 53924 6ccf107b HeapFree 53904->53924 53905->53887 53917 6ccf247f HeapFree 53905->53917 53936 6ccf114e HeapFree 53906->53936 53940 6ccf115e 53906->53940 53907 6ccf1d3a HeapFree 53907->53942 53908->53873 53909 6ccf1de3 53913 6ccf2413 53909->53913 53933 6ccf2405 HeapFree 53909->53933 53910 6ccf1e24 53922 6ccf23b1 53910->53922 53939 6ccf23a3 HeapFree 53910->53939 53911 6ccf1ba2 HeapFree 53911->53942 53912->53895 53913->53899 53925 6ccf241d HeapFree 53913->53925 53914->53916 53915 6ccf10e9 53915->53896 53927 6ccf10f0 HeapFree 53915->53927 53916->53896 53916->53915 53934 6ccf10db HeapFree 53916->53934 53917->53887 53918 6ccf095b 54007 6ccecd00 51 API calls 53918->54007 53919->53887 53921 6ccf1b4b HeapFree 53921->53942 53922->53909 53932 6ccf23bb HeapFree 53922->53932 53923 6ccf1f4f 53931 6ccf234f 53923->53931 53944 6ccf2341 HeapFree 53923->53944 53924->53904 53925->53899 53927->53896 53928->53899 53929->53906 53930->53844 53930->53847 53931->53910 53938 6ccf2359 HeapFree 53931->53938 53932->53909 53933->53909 53934->53916 53936->53940 53937 6ccf1331 54001 6ccecd00 51 API calls 53937->54001 53938->53910 53939->53910 53940->53937 53945 6ccf1601 53940->53945 53942->53826 53942->53831 53942->53836 53942->53840 53942->53843 53942->53848 53942->53851 53942->53852 53942->53854 53942->53861 53942->53862 53942->53863 53942->53868 53942->53870 53942->53877 53942->53883 53942->53886 53942->53900 53942->53907 53942->53911 53942->53921 54000 6ccee090 51 API calls 53942->54000 54003 6ccee550 HeapFree HeapFree 53942->54003 54018 6ccecd00 51 API calls 53942->54018 54020 6ccee250 54 API calls 53942->54020 53943 6ccf22ed 53943->53923 53948 6ccf22f7 HeapFree 53943->53948 53944->53923 53949 6ccf167f 53945->53949 53950 6ccf1606 memcpy 53945->53950 53946 6ccf1367 memcpy 53953 6ccf145e 53946->53953 53954 6ccf139b 53946->53954 53948->53923 54005 6ccecd00 51 API calls 53949->54005 53950->53942 53959 6ccf163d memcpy 53950->53959 53951 6ccf21d7 54017 6ccecd00 51 API calls 53951->54017 53952 6ccf1745 53952->53869 53952->53873 53952->53887 53952->53899 53952->53909 53952->53910 53952->53923 53952->53930 53952->53940 53957 6ccf1ff5 53952->53957 53966 6ccf26b0 HeapFree 53952->53966 54004 6ccee550 HeapFree HeapFree 53953->54004 54002 6ccee670 16 API calls 53954->54002 53956 6ccf22df HeapFree 53956->53957 53957->53943 53957->53956 53959->53861 53959->53942 53964 6ccf146c HeapFree 53964->53861 53964->53942 53965 6ccf169a 53965->53946 53966->53957 53971 6ccf0867 53971->53942 54012 6ccecd00 51 API calls 53971->54012 53974 6ccf08ce 54010 6ccecd00 51 API calls 53974->54010 53977 6ccf0878 53977->53942 54015 6ccecd00 51 API calls 53977->54015 53979 6ccf1f32 54013 6ccecd00 51 API calls 53979->54013 53980->53834 53980->53842 53980->53846 53980->53850 53980->53888 53980->53918 53980->53930 53980->53951 53980->53952 53980->53971 53980->53974 53980->53977 53980->53979 53986 6ccf1f95 53980->53986 53989 6ccf2180 53980->53989 53997 6cced330 53 API calls 53980->53997 53998 6cda0e80 54 API calls 53980->53998 54014 6ccecd00 51 API calls 53986->54014 54016 6ccecd00 51 API calls 53989->54016 53996->53942 53997->53980 53999->53930 54001->53946 54002->53942 54003->53865 54004->53964 54005->53965 54007->53930 54008->53930 54009->53930 54010->53930 54011->53930 54012->53930 54013->53930 54014->53930 54015->53930 54016->53930 54017->53930 54018->53942 54020->53942
                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCEFD12
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEFD24
                              • memcpy.MSVCRT ref: 6CCEFD50
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEFD86
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEFE21
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF2624
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF29C3
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF29E8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF2A6A
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CCEFE41
                              • internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/serde_json-1.0.82/src/de.rs, xrefs: 6CCF29FA
                              • public_rsa_pempassword_hashdirectory_black_listfile_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF1A8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcessmemcpy
                              • String ID: called `Result::unwrap()` on an `Err` value$internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/serde_json-1.0.82/src/de.rs$public_rsa_pempassword_hashdirectory_black_listfile_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3951801138-850514084
                              • Opcode ID: 47e86aeae3eda66b31069cfa3b66f888e6024ace4dec32fd2499a7a6d12b213c
                              • Instruction ID: 9955302fc67fd438882e34c326b6ad41d90b30b169c33899989e37dcec61b08f
                              • Opcode Fuzzy Hash: 47e86aeae3eda66b31069cfa3b66f888e6024ace4dec32fd2499a7a6d12b213c
                              • Instruction Fuzzy Hash: 57133771909381CFD7B1CF18C454B9ABBF1BF89348F14891EE4A967650EB70A94ACB43
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 550 6cd1288b-6cd1288f 551 6cd12891-6cd1296e 550->551 552 6cd128c6-6cd128d0 call 6cceb500 550->552 560 6cd12970-6cd12980 HeapFree 551->560 561 6cd12985-6cd129a8 551->561 557 6cd16a0e-6cd17386 call 6cd0a040 call 6ce2cac0 552->557 560->561 562 6cd12814-6cd12825 call 6ccfc8f0 561->562 563 6cd129ae-6cd129c8 call 6cd21310 561->563 562->557 569 6cd129cd-6cd12c24 call 6cd21390 * 22 563->569 618 6cd12c2a-6cd12c4e 569->618 619 6cd1301f-6cd130c6 569->619 620 6cd12c50-6cd12c60 618->620 621 6cd12c7c-6cd12ca6 618->621 626 6cd130c7 call 6cd20c40 619->626 620->621 623 6cd12c62-6cd12c77 HeapFree 620->623 624 6cd12d25-6cd12d33 621->624 625 6cd12ca8-6cd12cae 621->625 623->621 628 6cd13876-6cd1387d 624->628 629 6cd12d39-6cd12d3e 624->629 625->624 627 6cd12cb0 625->627 630 6cd130cc-6cd130ea 626->630 633 6cd12cb3-6cd12d23 call 6cdc52f0 627->633 631 6cd13889-6cd1388c 628->631 632 6cd1387f-6cd13883 628->632 634 6cd12d40-6cd12d4d HeapFree 629->634 635 6cd12d52-6cd12d5c 629->635 630->628 636 6cd13e4f-6cd13e54 630->636 631->632 640 6cd1388e-6cd1389f HeapFree 631->640 632->629 632->631 633->624 634->635 641 6cd12d83-6cd12d8c 635->641 642 6cd12d5e-6cd12d64 635->642 637 6cd13f2b-6cd141a9 636->637 638 6cd13e6c-6cd13e79 636->638 653 6cd141fa-6cd1420e 637->653 638->618 638->637 640->632 643 6cd138a1-6cd138a8 641->643 644 6cd12d92-6cd12d97 641->644 648 6cd13df4-6cd13dfd 642->648 649 6cd12d6a-6cd12d6f 642->649 652 6cd138b4-6cd138b7 643->652 650 6cd12d99-6cd12da6 HeapFree 644->650 651 6cd12dab-6cd12db3 644->651 654 6cd13e26-6cd13e38 648->654 649->641 655 6cd12d71-6cd12d7e HeapFree 649->655 650->651 656 6cd12db9-6cd12e02 call 6cdc51c0 call 6cdc9ae0 651->656 657 6cd138cd-6cd13c31 call 6cd0dd70 * 3 memcpy call 6cdc51c0 651->657 652->657 658 6cd138aa-6cd138ae 652->658 659 6cd1420f call 6cd20c40 653->659 660 6cd13e44-6cd13e48 654->660 661 6cd13e3a-6cd13e3d 654->661 655->641 677 6cd12e07-6cd12e0a 656->677 692 6cd13c32 call 6ccec4b0 657->692 658->644 658->652 666 6cd14214-6cd1428b 659->666 662 6cd13e17-6cd13e20 660->662 663 6cd13e4a-6cd13e4d 660->663 661->660 667 6cd13e3f-6cd13e42 661->667 662->649 662->654 669 6cd13e07-6cd13e12 HeapFree 663->669 675 6cd141e2-6cd141f4 666->675 676 6cd14535-6cd14582 call 6cda2130 memcpy 666->676 667->660 668 6cd13dff-6cd13e05 667->668 668->662 668->669 669->662 675->638 675->653 684 6cd14593-6cd145db 676->684 685 6cd14584-6cd1458e HeapFree 676->685 677->557 687 6cd145f4-6cd145fe 684->687 688 6cd145dd-6cd145f1 memset 684->688 685->684 690 6cd14600-6cd14677 call 6cda2130 * 2 687->690 691 6cd14679-6cd1469e call 6cda2130 687->691 688->687 701 6cd146a1-6cd14758 call 6cd0c9c0 690->701 691->701 695 6cd13c37-6cd13c49 692->695 696 6cd13c4a call 6ccec4b0 695->696 700 6cd13c4f-6cd13da9 696->700 700->636 700->676 705 6cd14761-6cd14766 701->705 706 6cd1475a-6cd1475f 701->706 708 6cd149f7-6cd14a31 705->708 709 6cd1476c-6cd1478c 705->709 707 6cd14793-6cd14796 706->707 710 6cd147d9-6cd147ec 707->710 711 6cd14798-6cd147a6 707->711 722 6cd14a45-6cd14a47 708->722 723 6cd14b7c-6cd14b93 HeapFree 708->723 709->707 713 6cd1480e-6cd14814 710->713 714 6cd147ee-6cd1480c 710->714 715 6cd147a8-6cd147b4 call 6cd0c7e0 711->715 716 6cd147bb-6cd147d5 711->716 719 6cd14846-6cd1487f 713->719 720 6cd14816-6cd14844 713->720 718 6cd14884-6cd14896 714->718 715->716 716->706 724 6cd147d7 716->724 726 6cd148b1-6cd148dd memcpy 718->726 727 6cd14898-6cd148aa call 6cd0c9c0 718->727 719->718 720->718 725 6cd14bb0-6cd14c01 call 6cdc51c0 call 6cdc9ae0 722->725 729 6cd14a4d-6cd14b20 call 6cdc51c0 722->729 723->722 723->725 724->705 725->557 726->705 732 6cd148e3 726->732 727->726 739 6cd14b23 call 6ce28210 729->739 732->706 741 6cd14b28-6cd14b2a 739->741 741->723 742 6cd14c06-6cd1501b call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 memcpy call 6cd11d90 741->742 758 6cd1501c call 6ccf3ec0 742->758 759 6cd15021-6cd151ad 758->759 761 6cd151b3-6cd151bb 759->761 762 6cd152e7-6cd152f4 759->762 761->762 763 6cd153e6-6cd15d6d call 6cd0b490 call 6cd0bb40 memcpy call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 761->763 764 6cd15300-6cd15303 762->764 796 6cd15d6e call 6ccf3ec0 763->796 764->763 766 6cd152f6-6cd152fa 764->766 766->761 766->764 797 6cd15d73-6cd15e5a 796->797 799 6cd15e60-6cd15f7c call 6cd0b490 call 6cd0bb40 call 6cd11d90 797->799 800 6cd15f9f-6cd15fac 797->800 812 6cd15f7e call 6cce1540 799->812 802 6cd15fb8-6cd15fbb 800->802 803 6cd15fae-6cd15fb2 800->803 802->803 805 6cd15fbd-6cd15fc9 HeapFree 802->805 803->799 803->802 805->803 813 6cd15f83-6cd15f8c 812->813 813->800 814 6cd15fcb-6cd16013 813->814 815 6cd16014 call 6cdf6ad0 814->815 816 6cd16019-6cd1602c 815->816 817 6cd16033 call 6cd0cba0 816->817 818 6cd16038-6cd16040 817->818 818->557 819 6cd16041 call 6ce031c0 818->819 819->557
                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD12980
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: $H]l2$PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$WC$`cl%$gj$no-destructno-zerono-domainno-network[INFO] AESNI support detected! Using AES-CTR mode$no-extension$pathsipsexcludeno-efno-ffno-dfno-procno-servicessafeno-wallpaperspawnedpropagatepropagated-processdebugno-deletetimer$9A$bl!$cl
                              • API String ID: 3298025750-1113567611
                              • Opcode ID: e1b1ec1f66baf25380caebb9c266e7a0298b76c717545e1aec6ba42500f42715
                              • Instruction ID: 540c481a45b0297362e00932ab0d6aa6ddd30f603e302fd09a2a7ec1fe0151d7
                              • Opcode Fuzzy Hash: e1b1ec1f66baf25380caebb9c266e7a0298b76c717545e1aec6ba42500f42715
                              • Instruction Fuzzy Hash: E6A258B180D3808AD371CF24D894BEBBBE4AFD5308F148A1DE5C857691EB759548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 820 6cd12f9c-6cd12fa8 821 6cd12fba-6cd12fbd 820->821 822 6cd12fb0-6cd12fb4 821->822 823 6cd12fbf-6cd12fcb HeapFree 821->823 822->821 824 6cd12966-6cd1296e 822->824 823->822 825 6cd16a0e-6cd17386 call 6cd0a040 call 6ce2cac0 823->825 827 6cd12970-6cd12980 HeapFree 824->827 828 6cd12985-6cd129a8 824->828 827->828 829 6cd12814-6cd12825 call 6ccfc8f0 828->829 830 6cd129ae-6cd12c24 call 6cd21310 call 6cd21390 * 22 828->830 829->825 885 6cd12c2a-6cd12c4e 830->885 886 6cd1301f-6cd130ea call 6cd20c40 830->886 887 6cd12c50-6cd12c60 885->887 888 6cd12c7c-6cd12ca6 885->888 895 6cd13876-6cd1387d 886->895 903 6cd13e4f-6cd13e54 886->903 887->888 890 6cd12c62-6cd12c77 HeapFree 887->890 891 6cd12d25-6cd12d33 888->891 892 6cd12ca8-6cd12cae 888->892 890->888 891->895 896 6cd12d39-6cd12d3e 891->896 892->891 894 6cd12cb0 892->894 900 6cd12cb3-6cd12d23 call 6cdc52f0 894->900 898 6cd13889-6cd1388c 895->898 899 6cd1387f-6cd13883 895->899 901 6cd12d40-6cd12d4d HeapFree 896->901 902 6cd12d52-6cd12d5c 896->902 898->899 907 6cd1388e-6cd1389f HeapFree 898->907 899->896 899->898 900->891 901->902 908 6cd12d83-6cd12d8c 902->908 909 6cd12d5e-6cd12d64 902->909 904 6cd13f2b-6cd141a9 903->904 905 6cd13e6c-6cd13e79 903->905 920 6cd141fa-6cd1428b call 6cd20c40 904->920 905->885 905->904 907->899 910 6cd138a1-6cd138a8 908->910 911 6cd12d92-6cd12d97 908->911 915 6cd13df4-6cd13dfd 909->915 916 6cd12d6a-6cd12d6f 909->916 919 6cd138b4-6cd138b7 910->919 917 6cd12d99-6cd12da6 HeapFree 911->917 918 6cd12dab-6cd12db3 911->918 921 6cd13e26-6cd13e38 915->921 916->908 922 6cd12d71-6cd12d7e HeapFree 916->922 917->918 923 6cd12db9-6cd12e02 call 6cdc51c0 call 6cdc9ae0 918->923 924 6cd138cd-6cd13da9 call 6cd0dd70 * 3 memcpy call 6cdc51c0 call 6ccec4b0 * 2 918->924 919->924 925 6cd138aa-6cd138ae 919->925 942 6cd141e2-6cd141f4 920->942 943 6cd14535-6cd14582 call 6cda2130 memcpy 920->943 927 6cd13e44-6cd13e48 921->927 928 6cd13e3a-6cd13e3d 921->928 922->908 944 6cd12e07-6cd12e0a 923->944 924->903 924->943 925->911 925->919 929 6cd13e17-6cd13e20 927->929 930 6cd13e4a-6cd13e4d 927->930 928->927 934 6cd13e3f-6cd13e42 928->934 929->916 929->921 936 6cd13e07-6cd13e12 HeapFree 930->936 934->927 935 6cd13dff-6cd13e05 934->935 935->929 935->936 936->929 942->905 942->920 951 6cd14593-6cd145db 943->951 952 6cd14584-6cd1458e HeapFree 943->952 944->825 954 6cd145f4-6cd145fe 951->954 955 6cd145dd-6cd145f1 memset 951->955 952->951 957 6cd14600-6cd14677 call 6cda2130 * 2 954->957 958 6cd14679-6cd1469e call 6cda2130 954->958 955->954 968 6cd146a1-6cd14758 call 6cd0c9c0 957->968 958->968 972 6cd14761-6cd14766 968->972 973 6cd1475a-6cd1475f 968->973 975 6cd149f7-6cd14a31 972->975 976 6cd1476c-6cd1478c 972->976 974 6cd14793-6cd14796 973->974 977 6cd147d9-6cd147ec 974->977 978 6cd14798-6cd147a6 974->978 989 6cd14a45-6cd14a47 975->989 990 6cd14b7c-6cd14b93 HeapFree 975->990 976->974 980 6cd1480e-6cd14814 977->980 981 6cd147ee-6cd1480c 977->981 982 6cd147a8-6cd147b4 call 6cd0c7e0 978->982 983 6cd147bb-6cd147d5 978->983 986 6cd14846-6cd1487f 980->986 987 6cd14816-6cd14844 980->987 985 6cd14884-6cd14896 981->985 982->983 983->973 991 6cd147d7 983->991 993 6cd148b1-6cd148dd memcpy 985->993 994 6cd14898-6cd148aa call 6cd0c9c0 985->994 986->985 987->985 992 6cd14bb0-6cd14c01 call 6cdc51c0 call 6cdc9ae0 989->992 996 6cd14a4d-6cd14b2a call 6cdc51c0 call 6ce28210 989->996 990->989 990->992 991->972 992->825 993->972 999 6cd148e3 993->999 994->993 996->990 1009 6cd14c06-6cd151ad call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 memcpy call 6cd11d90 call 6ccf3ec0 996->1009 999->973 1028 6cd151b3-6cd151bb 1009->1028 1029 6cd152e7-6cd152f4 1009->1029 1028->1029 1030 6cd153e6-6cd15e5a call 6cd0b490 call 6cd0bb40 memcpy call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 call 6ccf3ec0 1028->1030 1031 6cd15300-6cd15303 1029->1031 1066 6cd15e60-6cd15f8c call 6cd0b490 call 6cd0bb40 call 6cd11d90 call 6cce1540 1030->1066 1067 6cd15f9f-6cd15fac 1030->1067 1031->1030 1033 6cd152f6-6cd152fa 1031->1033 1033->1028 1033->1031 1066->1067 1081 6cd15fcb-6cd16040 call 6cdf6ad0 call 6cd0cba0 1066->1081 1069 6cd15fb8-6cd15fbb 1067->1069 1070 6cd15fae-6cd15fb2 1067->1070 1069->1070 1072 6cd15fbd-6cd15fc9 HeapFree 1069->1072 1070->1066 1070->1069 1072->1070 1081->825 1086 6cd16041 call 6ce031c0 1081->1086 1086->825
                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD12FC6
                              Strings
                              • 0Vl, xrefs: 6CD12CBA
                              • pathsipsexcludeno-efno-ffno-dfno-procno-servicessafeno-wallpaperspawnedpropagatepropagated-processdebugno-deletetimer, xrefs: 6CD12A1A
                              • no-extension, xrefs: 6CD129FD
                              • H]l2, xrefs: 6CD129A8
                              • no-destructno-zerono-domainno-network[INFO] AESNI support detected! Using AES-CTR mode, xrefs: 6CD12BC0
                              • T_l, xrefs: 6CD12DF0, 6CD12DF7
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD12DDA
                              • WC, xrefs: 6CD129C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: 0Vl$H]l2$PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$T_l$WC$no-destructno-zerono-domainno-network[INFO] AESNI support detected! Using AES-CTR mode$no-extension$pathsipsexcludeno-efno-ffno-dfno-procno-servicessafeno-wallpaperspawnedpropagatepropagated-processdebugno-deletetimer
                              • API String ID: 3298025750-612161213
                              • Opcode ID: b6254ff8482053a064af1aa7732086deeb38ff531a9c590fcf28386c6c678324
                              • Instruction ID: 7b083e35aeb16c9e43e9219c69d965f6da94c1fba052739cbbc62bea51d35959
                              • Opcode Fuzzy Hash: b6254ff8482053a064af1aa7732086deeb38ff531a9c590fcf28386c6c678324
                              • Instruction Fuzzy Hash: 60C1A3B194D340AFD320DB10EC85FAFB2F8AB8570CF50491CF6549AA61E776D5088B63
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1087 6cdc4a60-6cdc4a76 call 6cde1b10 1090 6cdc4a7c-6cdc4a83 1087->1090 1091 6cdc4b88-6cdc4ba5 call 6ccf9c20 1087->1091 1092 6cdc4a94-6cdc4aa0 AcquireSRWLockExclusive 1090->1092 1093 6cdc4a85-6cdc4a89 1090->1093 1096 6cdc4ba7-6cdc4c54 call 6ccf9650 call 6cdaf190 call 6cdaf170 call 6cda8f00 call 6ce2cac0 call 6ccf9a00 call 6ccfc7f0 1091->1096 1097 6cdc4aa7-6cdc4ae1 call 6ccfaf20 1092->1097 1095 6cdc4a8f-6cdc4a92 1093->1095 1093->1096 1095->1097 1133 6cdc4e09-6cdc4e56 call 6ccf9900 call 6cda8980 call 6ce2cac0 call 6cde1b10 1096->1133 1134 6cdc4c5a-6cdc4c62 1096->1134 1102 6cdc4ae6-6cdc4aee 1097->1102 1104 6cdc4b0a-6cdc4b11 1102->1104 1105 6cdc4af0-6cdc4af4 1102->1105 1106 6cdc4b54-6cdc4b5a 1104->1106 1107 6cdc4b13-6cdc4b29 1104->1107 1109 6cdc4b75-6cdc4b84 1105->1109 1110 6cdc4af6-6cdc4b06 1105->1110 1112 6cdc4b6c-6cdc4b74 1106->1112 1113 6cdc4b5c-6cdc4b67 ReleaseSRWLockExclusive 1106->1113 1118 6cdc4b2b-6cdc4b31 1107->1118 1119 6cdc4b44-6cdc4b4f HeapFree 1107->1119 1109->1112 1114 6cdc4b86 1109->1114 1110->1112 1115 6cdc4b08 1110->1115 1113->1112 1114->1113 1115->1113 1121 6cdc4b36-6cdc4b3f HeapFree 1118->1121 1122 6cdc4b33 1118->1122 1119->1106 1121->1119 1122->1121 1166 6cdc4e5c-6cdc4e63 1133->1166 1167 6cdc4f62-6cdc4f7f call 6ccf9c20 1133->1167 1135 6cdc4cca-6cdc4cd2 call 6cdc55d0 1134->1135 1136 6cdc4c64-6cdc4c6b 1134->1136 1143 6cdc4cd7-6cdc4ce3 1135->1143 1138 6cdc4d17-6cdc4d2f call 6cdc4250 1136->1138 1139 6cdc4c71-6cdc4c8b memcpy 1136->1139 1142 6cdc4d31-6cdc4d42 call 6cdc3ff0 1138->1142 1154 6cdc4d44-6cdc4d52 1138->1154 1139->1142 1153 6cdc4d92-6cdc4da8 1142->1153 1142->1154 1146 6cdc4ce9-6cdc4cef 1143->1146 1147 6cdc4d80-6cdc4d82 1143->1147 1152 6cdc4cf5-6cdc4d12 1146->1152 1146->1153 1147->1146 1151 6cdc4d88-6cdc4d8c 1147->1151 1151->1146 1151->1153 1157 6cdc4dde-6cdc4de9 1152->1157 1158 6cdc4dca-6cdc4ddb call 6cdc4250 1153->1158 1159 6cdc4daa-6cdc4dc8 memcpy 1153->1159 1154->1157 1158->1157 1159->1157 1169 6cdc4e74-6cdc4e7d AcquireSRWLockExclusive 1166->1169 1170 6cdc4e65-6cdc4e69 1166->1170 1174 6cdc4f81-6cdc4fdb call 6ccf9650 call 6cdaf190 call 6cdaf170 call 6cda9530 call 6ce2cac0 call 6ccf9a00 1167->1174 1171 6cdc4e84-6cdc4ecb call 6ccfaf20 1169->1171 1173 6cdc4e6f-6cdc4e72 1170->1173 1170->1174 1179 6cdc4ecd-6cdc4ed1 1171->1179 1180 6cdc4ee7-6cdc4eee 1171->1180 1173->1171 1182 6cdc4f4f-6cdc4f5e 1179->1182 1183 6cdc4ed3-6cdc4ee3 1179->1183 1184 6cdc4ef0-6cdc4f06 1180->1184 1185 6cdc4f31-6cdc4f37 1180->1185 1188 6cdc4f46-6cdc4f4e 1182->1188 1189 6cdc4f60 1182->1189 1183->1188 1190 6cdc4ee5 1183->1190 1194 6cdc4f08-6cdc4f0e 1184->1194 1195 6cdc4f21-6cdc4f2c HeapFree 1184->1195 1187 6cdc4f39-6cdc4f41 ReleaseSRWLockExclusive 1185->1187 1185->1188 1187->1188 1189->1187 1190->1187 1197 6cdc4f10 1194->1197 1198 6cdc4f13-6cdc4f1c HeapFree 1194->1198 1195->1185 1197->1198 1198->1195
                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6CDC5267,?,?,?), ref: 6CDC4A98
                              • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?), ref: 6CDC4B3F
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 6CDC4B4F
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?), ref: 6CDC4B67
                              • memcpy.MSVCRT ref: 6CDC4C7B
                              Strings
                              • lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs, xrefs: 6CDC4BAE
                              • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 6CDC4B98
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveFreeHeapLock$AcquireReleasememcpy
                              • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
                              • API String ID: 1574103879-1937734220
                              • Opcode ID: abd77417ed307c93f96c537fa8b8ae1f8910a2b0db406062d1007848512cdd79
                              • Instruction ID: 2bccbfdf8dd68c94beb725a277657f4d1b2cb992c92a931d84107f9fac918fe7
                              • Opcode Fuzzy Hash: abd77417ed307c93f96c537fa8b8ae1f8910a2b0db406062d1007848512cdd79
                              • Instruction Fuzzy Hash: F3C1B1B1E00649DFCB00DF55C880AAEB7B9FF45308F148559E859ABB21E731E945CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1205 6cd12c50-6cd12c60 1206 6cd12c62-6cd12c77 HeapFree 1205->1206 1207 6cd12c7c-6cd12ca6 1205->1207 1206->1207 1208 6cd12d25-6cd12d33 1207->1208 1209 6cd12ca8-6cd12cae 1207->1209 1211 6cd13876-6cd1387d 1208->1211 1212 6cd12d39-6cd12d3e 1208->1212 1209->1208 1210 6cd12cb0 1209->1210 1215 6cd12cb3-6cd12d23 call 6cdc52f0 1210->1215 1213 6cd13889-6cd1388c 1211->1213 1214 6cd1387f-6cd13883 1211->1214 1216 6cd12d40-6cd12d4d HeapFree 1212->1216 1217 6cd12d52-6cd12d5c 1212->1217 1213->1214 1219 6cd1388e-6cd1389f HeapFree 1213->1219 1214->1212 1214->1213 1215->1208 1216->1217 1220 6cd12d83-6cd12d8c 1217->1220 1221 6cd12d5e-6cd12d64 1217->1221 1219->1214 1222 6cd138a1-6cd138a8 1220->1222 1223 6cd12d92-6cd12d97 1220->1223 1226 6cd13df4-6cd13dfd 1221->1226 1227 6cd12d6a-6cd12d6f 1221->1227 1230 6cd138b4-6cd138b7 1222->1230 1228 6cd12d99-6cd12da6 HeapFree 1223->1228 1229 6cd12dab-6cd12db3 1223->1229 1231 6cd13e26-6cd13e38 1226->1231 1227->1220 1232 6cd12d71-6cd12d7e HeapFree 1227->1232 1228->1229 1233 6cd12db9-6cd12e02 call 6cdc51c0 call 6cdc9ae0 1229->1233 1234 6cd138cd-6cd13c31 call 6cd0dd70 * 3 memcpy call 6cdc51c0 1229->1234 1230->1234 1235 6cd138aa-6cd138ae 1230->1235 1236 6cd13e44-6cd13e48 1231->1236 1237 6cd13e3a-6cd13e3d 1231->1237 1232->1220 1249 6cd12e07-6cd12e0a 1233->1249 1260 6cd13c32 call 6ccec4b0 1234->1260 1235->1223 1235->1230 1238 6cd13e17-6cd13e20 1236->1238 1239 6cd13e4a-6cd13e4d 1236->1239 1237->1236 1242 6cd13e3f-6cd13e42 1237->1242 1238->1227 1238->1231 1244 6cd13e07-6cd13e12 HeapFree 1239->1244 1242->1236 1243 6cd13dff-6cd13e05 1242->1243 1243->1238 1243->1244 1244->1238 1251 6cd16a0e-6cd17386 call 6cd0a040 call 6ce2cac0 1249->1251 1262 6cd13c37-6cd13c49 1260->1262 1263 6cd13c4a call 6ccec4b0 1262->1263 1265 6cd13c4f-6cd13da9 1263->1265 1267 6cd14535-6cd14582 call 6cda2130 memcpy 1265->1267 1268 6cd13e4f-6cd13e54 1265->1268 1278 6cd14593-6cd145db 1267->1278 1279 6cd14584-6cd1458e HeapFree 1267->1279 1269 6cd13f2b-6cd141a9 1268->1269 1270 6cd13e6c-6cd13e79 1268->1270 1275 6cd141fa-6cd1420e 1269->1275 1270->1269 1272 6cd12c2a-6cd12c4e 1270->1272 1272->1205 1272->1207 1277 6cd1420f call 6cd20c40 1275->1277 1280 6cd14214-6cd1428b 1277->1280 1281 6cd145f4-6cd145fe 1278->1281 1282 6cd145dd-6cd145f1 memset 1278->1282 1279->1278 1280->1267 1287 6cd141e2-6cd141f4 1280->1287 1284 6cd14600-6cd14677 call 6cda2130 * 2 1281->1284 1285 6cd14679-6cd1469e call 6cda2130 1281->1285 1282->1281 1292 6cd146a1-6cd14758 call 6cd0c9c0 1284->1292 1285->1292 1287->1270 1287->1275 1296 6cd14761-6cd14766 1292->1296 1297 6cd1475a-6cd1475f 1292->1297 1299 6cd149f7-6cd14a31 1296->1299 1300 6cd1476c-6cd1478c 1296->1300 1298 6cd14793-6cd14796 1297->1298 1301 6cd147d9-6cd147ec 1298->1301 1302 6cd14798-6cd147a6 1298->1302 1313 6cd14a45-6cd14a47 1299->1313 1314 6cd14b7c-6cd14b93 HeapFree 1299->1314 1300->1298 1304 6cd1480e-6cd14814 1301->1304 1305 6cd147ee-6cd1480c 1301->1305 1306 6cd147a8-6cd147b4 call 6cd0c7e0 1302->1306 1307 6cd147bb-6cd147d5 1302->1307 1310 6cd14846-6cd1487f 1304->1310 1311 6cd14816-6cd14844 1304->1311 1309 6cd14884-6cd14896 1305->1309 1306->1307 1307->1297 1315 6cd147d7 1307->1315 1317 6cd148b1-6cd148dd memcpy 1309->1317 1318 6cd14898-6cd148aa call 6cd0c9c0 1309->1318 1310->1309 1311->1309 1316 6cd14bb0-6cd14c01 call 6cdc51c0 call 6cdc9ae0 1313->1316 1320 6cd14a4d-6cd14b20 call 6cdc51c0 1313->1320 1314->1313 1314->1316 1315->1296 1316->1251 1317->1296 1323 6cd148e3 1317->1323 1318->1317 1330 6cd14b23 call 6ce28210 1320->1330 1323->1297 1332 6cd14b28-6cd14b2a 1330->1332 1332->1314 1333 6cd14c06-6cd1501b call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 memcpy call 6cd11d90 1332->1333 1349 6cd1501c call 6ccf3ec0 1333->1349 1350 6cd15021-6cd151ad 1349->1350 1352 6cd151b3-6cd151bb 1350->1352 1353 6cd152e7-6cd152f4 1350->1353 1352->1353 1354 6cd153e6-6cd15d6d call 6cd0b490 call 6cd0bb40 memcpy call 6cdc51c0 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 call 6cd0b490 call 6cd0bb40 call 6cd11d90 1352->1354 1355 6cd15300-6cd15303 1353->1355 1387 6cd15d6e call 6ccf3ec0 1354->1387 1355->1354 1357 6cd152f6-6cd152fa 1355->1357 1357->1352 1357->1355 1388 6cd15d73-6cd15e5a 1387->1388 1390 6cd15e60-6cd15f7c call 6cd0b490 call 6cd0bb40 call 6cd11d90 1388->1390 1391 6cd15f9f-6cd15fac 1388->1391 1403 6cd15f7e call 6cce1540 1390->1403 1393 6cd15fb8-6cd15fbb 1391->1393 1394 6cd15fae-6cd15fb2 1391->1394 1393->1394 1396 6cd15fbd-6cd15fc9 HeapFree 1393->1396 1394->1390 1394->1393 1396->1394 1404 6cd15f83-6cd15f8c 1403->1404 1404->1391 1405 6cd15fcb-6cd16013 1404->1405 1406 6cd16014 call 6cdf6ad0 1405->1406 1407 6cd16019-6cd1602c 1406->1407 1408 6cd16033 call 6cd0cba0 1407->1408 1409 6cd16038-6cd16040 1408->1409 1409->1251 1410 6cd16041 call 6ce031c0 1409->1410 1410->1251
                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD12C77
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD12D4D
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,6CF8B0E0,00000000,?), ref: 6CD12D7E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,6CF8B0E0,00000000,?), ref: 6CD12DA6
                              Strings
                              • 0Vl, xrefs: 6CD12CBA
                              • T_l, xrefs: 6CD12DF0, 6CD12DF7
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD12DDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: 0Vl$PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$T_l
                              • API String ID: 3298025750-1666152087
                              • Opcode ID: 2e1f1c550e771ee57bbe4fe0061f70ce8d3e7da19009f162090634a577727028
                              • Instruction ID: 671bf15c1e09cdebb9964c1be0f3d7f99631dedc64ae50e4f5d676b7129ae33f
                              • Opcode Fuzzy Hash: 2e1f1c550e771ee57bbe4fe0061f70ce8d3e7da19009f162090634a577727028
                              • Instruction Fuzzy Hash: 15513BB164D340DBE7608F55D48979AB7F1BF85308F244A2DE2A987A70DB71D508CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1411 6cceeba0-6cceebb2 1412 6cceebb4-6cceebb6 1411->1412 1413 6cceebe3-6cceebea 1411->1413 1414 6cceec28-6cceec2f 1412->1414 1415 6cceebb8-6cceebbf 1412->1415 1416 6cceecfc 1413->1416 1419 6cceecff 1414->1419 1417 6cceebef-6cceebf1 1415->1417 1418 6cceebc1-6cceebc6 1415->1418 1416->1419 1421 6cceec34-6cceec38 1417->1421 1422 6cceebf3-6cceebfd 1417->1422 1418->1417 1420 6cceebc8-6cceebcd 1418->1420 1423 6cceed04-6cceed0d 1419->1423 1426 6cceebcf-6cceebe1 HeapReAlloc RtlReAllocateHeap 1420->1426 1427 6cceec43-6cceec52 1420->1427 1424 6cceec3e 1421->1424 1425 6cceecef-6cceecf7 1421->1425 1428 6cceecb5-6cceecbf GetProcessHeap 1422->1428 1429 6cceec03-6cceec06 1422->1429 1430 6cceecf9 1424->1430 1425->1423 1426->1413 1431 6cceec6d-6cceec7e HeapAlloc 1427->1431 1432 6cceec54-6cceec5f GetProcessHeap 1427->1432 1428->1430 1433 6cceecc1-6cceecc6 1428->1433 1434 6cceeccc-6cceecde HeapAlloc 1429->1434 1435 6cceec0c-6cceec1d HeapAlloc 1429->1435 1430->1416 1431->1430 1437 6cceec80-6cceecb3 memcpy HeapFree 1431->1437 1432->1430 1436 6cceec65-6cceec6b 1432->1436 1433->1434 1433->1435 1434->1430 1438 6cceece0-6cceeceb 1434->1438 1435->1425 1440 6cceec23 1435->1440 1436->1431 1437->1425 1438->1425 1440->1430
                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,00000008,00000008,?), ref: 6CCEEBDC
                              • HeapAlloc.KERNEL32(00000000,00000000,00000008,00000008,?), ref: 6CCEEC12
                              • GetProcessHeap.KERNEL32(00000008,?), ref: 6CCEEC56
                              • HeapAlloc.KERNEL32(?,00000000,?,00000008,?), ref: 6CCEEC74
                              • memcpy.MSVCRT ref: 6CCEEC97
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,00000008,?), ref: 6CCEECAB
                              • GetProcessHeap.KERNEL32(00000008,?), ref: 6CCEECB5
                              • HeapAlloc.KERNEL32(00000000,00000000,?,00000008,?), ref: 6CCEECD5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: 7e684c4923916c5228efa7199efbf04caddc00e26a819eac3ab6047b78e98d55
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: 1A41C170B453429BEB04DFAAC880B6A77F6BB8E344F24812DE9158BB51FB74D844C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • memcmp.MSVCRT ref: 6CCF0242
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • file_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF023C, 6CCF2260
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$memcmp
                              • String ID: file_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 4130495867-3114836061
                              • Opcode ID: bede497265389862ee12876b29f9c6036dbde0679aa61bcc8d5f795aaa9253f6
                              • Instruction ID: e8b8f33bf8ab76a664baf9fe4e1fa2f89080c42f0631c7705308ad01d060af13
                              • Opcode Fuzzy Hash: bede497265389862ee12876b29f9c6036dbde0679aa61bcc8d5f795aaa9253f6
                              • Instruction Fuzzy Hash: 52516B309093818FD3A0CF14C450B9ABBF1BF85748F24592CE8A99B750E771E989DB83
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1872 6ccef810-6ccef829 1873 6ccef82b-6ccef83b 1872->1873 1874 6ccef867-6ccef878 call 6ccecd00 1872->1874 1876 6ccef840-6ccef84b 1873->1876 1881 6ccefa1a-6ccefa20 1874->1881 1878 6ccef87d-6ccef880 1876->1878 1879 6ccef84d-6ccef855 1876->1879 1882 6ccef9a9-6ccef9bd call 6cced750 1878->1882 1883 6ccef886-6ccef88b 1878->1883 1879->1878 1880 6ccef857-6ccef865 1879->1880 1880->1874 1880->1876 1885 6ccefa26-6ccefa2d 1881->1885 1891 6ccefa13-6ccefa15 call 6ccee250 1882->1891 1886 6ccef9bf-6ccef9ce call 6ccecd00 1883->1886 1887 6ccef891-6ccef8bb 1883->1887 1886->1881 1890 6ccef8de-6ccef8f0 call 6ccef250 1887->1890 1896 6ccef91a-6ccef922 1890->1896 1897 6ccef8f2-6ccef8f4 1890->1897 1891->1881 1898 6ccef94e-6ccef952 1896->1898 1899 6ccef924-6ccef92d 1896->1899 1900 6ccef8f6-6ccef906 1897->1900 1901 6ccef971-6ccef977 1897->1901 1903 6ccef954-6ccef960 HeapFree 1898->1903 1904 6ccef965-6ccef96f 1898->1904 1902 6ccef936-6ccef939 1899->1902 1906 6ccef908-6ccef90d call 6cceed10 1900->1906 1907 6ccef8c0 1900->1907 1905 6ccef979-6ccef994 call 6ccee090 1901->1905 1908 6ccef93b-6ccef94c HeapFree 1902->1908 1909 6ccef930-6ccef934 1902->1909 1903->1904 1904->1905 1915 6ccef996-6ccef99a 1905->1915 1916 6ccef9d0-6ccef9d5 1905->1916 1913 6ccef912-6ccef918 1906->1913 1910 6ccef8c3-6ccef8db 1907->1910 1908->1909 1909->1898 1909->1902 1910->1890 1913->1910 1919 6ccef99c-6ccef9a7 1915->1919 1920 6ccef9f1-6ccef9f6 1915->1920 1917 6ccef9ed-6ccef9ef 1916->1917 1918 6ccef9d7-6ccef9e8 call 6ccee550 HeapFree 1916->1918 1922 6ccefa10 1917->1922 1918->1917 1919->1885 1923 6ccefa2e-6ccefa33 1920->1923 1924 6ccef9f8-6ccef9fc 1920->1924 1922->1891 1925 6ccefa46-6ccefa49 1923->1925 1927 6ccef9fe-6ccefa08 HeapFree 1924->1927 1928 6ccefa0d 1924->1928 1929 6ccefa4b-6ccefa5c HeapFree 1925->1929 1930 6ccefa40-6ccefa44 1925->1930 1927->1928 1928->1922 1929->1930 1930->1924 1930->1925
                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEF947
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000004), ref: 6CCEF960
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEFA57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: eb5a961865b816765a38a782a0576275b3229f29760058f13062fd4e54fc115d
                              • Instruction ID: 1bd0f2c9a39b697b2c137eec7372e4c881ce078bc3c4b3322f203c0acaefb327
                              • Opcode Fuzzy Hash: eb5a961865b816765a38a782a0576275b3229f29760058f13062fd4e54fc115d
                              • Instruction Fuzzy Hash: 0A71ACB1E00219DFCB10CF99E880BAEFBB2FF8A308F254119D4146B750E771A985CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • process_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF2251
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: process_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-986806953
                              • Opcode ID: 8b89b891a112d112139063bebfd89c5e8dc6af3969b5b369d0ac6a5d15cfbe15
                              • Instruction ID: 5c0d55e05e9b1d571c7aa81905911a123525641f7b9de57c5832b206111b946b
                              • Opcode Fuzzy Hash: 8b89b891a112d112139063bebfd89c5e8dc6af3969b5b369d0ac6a5d15cfbe15
                              • Instruction Fuzzy Hash: 5C517B709093818FD3A0CF18C450B9AB7F1FF85748F145A1DE8A99B750E771E989DB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: H]l2$A
                              • API String ID: 3298025750-158417659
                              • Opcode ID: fad1ab6e5d2c8945ec2105b4a8be9ffe17f07e327995ce3e88fd29f32b3103c3
                              • Instruction ID: 594be4e6724059ccbdc6112d0c6f0ce709b017117d656cf3c357c66398b1e36d
                              • Opcode Fuzzy Hash: fad1ab6e5d2c8945ec2105b4a8be9ffe17f07e327995ce3e88fd29f32b3103c3
                              • Instruction Fuzzy Hash: DD51FBB140C3C0CAE7219F24D45979BBBE4AF96308F14495CE5C80B792D7BA9548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$CloseHandle
                              • String ID: H]l2$A
                              • API String ID: 1910495013-158417659
                              • Opcode ID: 379ef676a521998805599e0c3ae6cf6f95d99b5fc48963b10a617c59912c2301
                              • Instruction ID: c67dae185fe46cfdddffdce4859c584d240d32cf40790b1cc233933e75e15a6f
                              • Opcode Fuzzy Hash: 379ef676a521998805599e0c3ae6cf6f95d99b5fc48963b10a617c59912c2301
                              • Instruction Fuzzy Hash: 1B510BB140C3C0CAE7219F24D45979BBBF4AF96308F14495CE5C80B792DBBA9548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$CloseHandle
                              • String ID: H]l2$A
                              • API String ID: 1910495013-158417659
                              • Opcode ID: 0633191efe5e8a484f29dc29192a4faf4b2fd9ed204adcd126101c871ea6d505
                              • Instruction ID: 3a02139598d02b8d87e3941373fad80c4e7a756fcc2c5cededdd8a40169c0846
                              • Opcode Fuzzy Hash: 0633191efe5e8a484f29dc29192a4faf4b2fd9ed204adcd126101c871ea6d505
                              • Instruction Fuzzy Hash: FA510CB140C3C0CAE7219F24D45979BBBF4AF96308F14495CE5C81B792DBBA9548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: H]l2$A
                              • API String ID: 3298025750-158417659
                              • Opcode ID: 409596877db272206f9b083e4166ec5b821018b8246347a10383c5acd6562a2c
                              • Instruction ID: f461d6306c577d2879eba3292915ecc739dea5557fad6bfa171b526ac17db404
                              • Opcode Fuzzy Hash: 409596877db272206f9b083e4166ec5b821018b8246347a10383c5acd6562a2c
                              • Instruction Fuzzy Hash: F4510CB140C3C0CAE7619F24D45979BBBF4AF96308F14495CE5C80A792D7BA9548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$CloseHandle
                              • String ID: H]l2$A
                              • API String ID: 1910495013-158417659
                              • Opcode ID: 43fdfe977cf72946f73ba85467fb31f34a6f2e22158bb6699d2d37e0d0bc9669
                              • Instruction ID: 0894eea557bf35599f2f318d6d9b5aa3d1d6b8941a7517b91f26fd18b3067a32
                              • Opcode Fuzzy Hash: 43fdfe977cf72946f73ba85467fb31f34a6f2e22158bb6699d2d37e0d0bc9669
                              • Instruction Fuzzy Hash: 75510BB140C3C0CAE7619F24C45979BBBF4AF96308F14495CE5C81B792DBBA9548CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: H]l2$A
                              • API String ID: 3298025750-158417659
                              • Opcode ID: c3c4c08e778dc8f12f0c07282bf1d2048c19ed16af786be4cd2ef4fbf4a722ff
                              • Instruction ID: 35379300f38a7ef085c986b4859225ef7722870484d5d09201039c34fe2c0327
                              • Opcode Fuzzy Hash: c3c4c08e778dc8f12f0c07282bf1d2048c19ed16af786be4cd2ef4fbf4a722ff
                              • Instruction Fuzzy Hash: 4951EBB140C3C0CAE7619F24C45979BBBF4AF96308F14495CE5D81B792DBBA9148CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2577 6ccef6d0-6ccef6e6 2578 6ccef6e8-6ccef6fc 2577->2578 2579 6ccef723-6ccef734 call 6ccecd00 2577->2579 2580 6ccef700-6ccef70b 2578->2580 2588 6ccef765-6ccef771 2579->2588 2582 6ccef7e6-6ccef801 call 6cced750 call 6ccee250 2580->2582 2583 6ccef711-6ccef714 2580->2583 2582->2588 2586 6ccef736-6ccef739 2583->2586 2587 6ccef716-6ccef721 2583->2587 2586->2582 2591 6ccef73f-6ccef760 call 6cda14f0 2586->2591 2587->2579 2587->2580 2589 6ccef7de-6ccef7e5 2588->2589 2596 6ccef762 2591->2596 2597 6ccef773-6ccef77b 2591->2597 2596->2588 2598 6ccef77d-6ccef77f 2597->2598 2599 6ccef7b6-6ccef7b8 2597->2599 2600 6ccef7c3 2598->2600 2601 6ccef781 2598->2601 2599->2600 2602 6ccef7ba 2599->2602 2603 6ccef7c8-6ccef7db memcpy 2600->2603 2604 6ccef7bc-6ccef7c1 call 6cceb4c0 2601->2604 2605 6ccef783-6ccef78d 2601->2605 2602->2604 2602->2605 2603->2589 2604->2600 2606 6ccef78f-6ccef796 GetProcessHeap 2605->2606 2607 6ccef79a-6ccef7a7 HeapAlloc 2605->2607 2609 6ccef798 2606->2609 2610 6ccef7a9-6ccef7b4 call 6cceb500 2606->2610 2607->2603 2607->2610 2609->2607 2610->2599
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpy
                              • String ID:
                              • API String ID: 4164033339-0
                              • Opcode ID: 6af51742b8e5722a95259d15a64a1ee5ece7343e53ac63d520af40431b595b26
                              • Instruction ID: 2e8a2e286cef13af286a01b711375bb9e77dc27dd2a8355f33a0f2a432f9e3b1
                              • Opcode Fuzzy Hash: 6af51742b8e5722a95259d15a64a1ee5ece7343e53ac63d520af40431b595b26
                              • Instruction Fuzzy Hash: 3A31E875E042069FE7109BA7E880BAAF7B9FF8A318F194129DC1897741F730D805C6A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2634 6cdd2500-6cdd2509 ExitProcess
                              APIs
                              • ExitProcess.KERNEL32(?,?,?,00000002,00000000,00000000), ref: 6CDD2504
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcess
                              • String ID:
                              • API String ID: 621844428-0
                              • Opcode ID: c39359bbe569ece7b67651f7765170398af4dcfa730a54239745832285ee5d8c
                              • Instruction ID: afaa3d293fd4749387d61836570956e3c0e87eeb4d59116b53d0f45e26cdc272
                              • Opcode Fuzzy Hash: c39359bbe569ece7b67651f7765170398af4dcfa730a54239745832285ee5d8c
                              • Instruction Fuzzy Hash:
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemInfo.KERNEL32(?), ref: 6CDEB683
                              • GetProcessHeap.KERNEL32(?), ref: 6CDEB6C3
                              • HeapAlloc.KERNEL32(?,00000000,00000050,?), ref: 6CDEB6DD
                              • GetProcessHeap.KERNEL32(?,00000000,00000050,?), ref: 6CDEB798
                              • HeapAlloc.KERNEL32(?,00000000,00000030,?,00000000,00000050,?), ref: 6CDEB7B2
                              • GetProcessHeap.KERNEL32 ref: 6CDEB91A
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CDEB92F
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CDEB97F
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CDEB998
                              • GetProcessHeap.KERNEL32(?), ref: 6CDEB9B6
                              • HeapAlloc.KERNEL32(?,00000000,0000000C,?), ref: 6CDEB9D0
                              • GetProcessHeap.KERNEL32 ref: 6CDEBADC
                              • HeapAlloc.KERNEL32(?,00000000,00000007), ref: 6CDEBAFB
                              • GetProcessHeap.KERNEL32 ref: 6CDEBB1C
                              • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CDEBB3B
                              • memcpy.MSVCRT ref: 6CDEBB53
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CDEBB88
                              • GetProcessHeap.KERNEL32 ref: 6CDEBC29
                              • HeapAlloc.KERNEL32(?,00000008,?), ref: 6CDEBC42
                              • GetProcessHeap.KERNEL32 ref: 6CDEBCA2
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CDEBCBB
                              • GetProcessHeap.KERNEL32 ref: 6CDEBE2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Alloc$Free$InfoSystemmemcpy
                              • String ID: $0
                              • API String ID: 4091343045-272453368
                              • Opcode ID: 2b5c7af107c00ba53b25338fe37c7e18bb183169b73decb0e8c3a8eb93a2d529
                              • Instruction ID: f5c18cd546aa8a3aeb0cd3f864b79461adf84a0e585425d9c2fb2a15f95c7ed9
                              • Opcode Fuzzy Hash: 2b5c7af107c00ba53b25338fe37c7e18bb183169b73decb0e8c3a8eb93a2d529
                              • Instruction Fuzzy Hash: 30624A70A097419FD720DF25C880B6BBBF5BF8A348F10491DE4999B7A1EB70D849CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE1F57A
                              • HeapAlloc.KERNEL32(00000000,00000000,00000003), ref: 6CE1F58E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,00000000), ref: 6CE1F6D8
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F70F
                              • HeapAlloc.KERNEL32(00000003,00000000,00000021,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F723
                              • memcpy.MSVCRT ref: 6CE1F73A
                              • GetProcessHeap.KERNEL32(00000003,00000000,00000021,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F759
                              • HeapAlloc.KERNEL32(00000000,00000000,0000000C,00000003,00000000,00000021,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F76D
                              • GetProcessHeap.KERNEL32(00000000,00000000,0000000C,00000003,00000000,00000021,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F7A0
                              • HeapAlloc.KERNEL32(00000000,00000000,0000000C,00000000,00000000,0000000C,00000003,00000000,00000021,?,?,?,?,?,00000000,00000000), ref: 6CE1F7B4
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F807
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F811
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,00000003), ref: 6CE1F824
                              • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F83F
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 6CE1F85A
                              • GetProcessHeap.KERNEL32 ref: 6CE1F996
                              • HeapAlloc.KERNEL32(00000001,00000000,00000018), ref: 6CE1F9AA
                              Strings
                              • ', xrefs: 6CE1F78A
                              • /C[INFO] WOW64 redirection reverted, xrefs: 6CE1F60D
                              • !, xrefs: 6CE1F745
                              • failed to spawn thread/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\mod.rs, xrefs: 6CE1FB86
                              • for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"[WARNING] Cannot clean event logs[INFO] Event logs purger process spawned., xrefs: 6CE1F61D
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CE1FC0B
                              • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 6CE1FBBA, 6CE1FBD9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$CloseFreeHandle$memcpy
                              • String ID: !$'$/C[INFO] WOW64 redirection reverted$called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$failed to spawn thread/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\mod.rs$for /F "tokens=*" %1 in ('wevtutil.exe el') DO wevtutil.exe cl "%1"[WARNING] Cannot clean event logs[INFO] Event logs purger process spawned.
                              • API String ID: 1376290354-2163988920
                              • Opcode ID: 9defd1c3ee887d506dfa57604338d093e027f5e7628cdef28b7ce97ef1fc3f76
                              • Instruction ID: 55990ba2ce5b2a53ecdb6e1fb9d8659519e1fea22f51562cf16f8cad93355b7e
                              • Opcode Fuzzy Hash: 9defd1c3ee887d506dfa57604338d093e027f5e7628cdef28b7ce97ef1fc3f76
                              • Instruction Fuzzy Hash: B422C4B1D043089BEB10CFA5DC45BEEBBB4BF0530CF244019E914ABB91EB799955CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapAlloc.KERNEL32(?,00000000,00000020), ref: 6CD0DE00
                              • GetProcessHeap.KERNEL32 ref: 6CD0DF40
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0DF59
                              • memcpy.MSVCRT ref: 6CD0DF6D
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0DFB8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000), ref: 6CD0E01A
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116D2
                              • j j, xrefs: 6CD0DDFB
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD0E25C, 6CD0E344, 6CD0E683
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFree$Processmemcpy
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$called `Result::unwrap()` on an `Err` value$j j
                              • API String ID: 1009194398-2602185676
                              • Opcode ID: bda7877485d4fd81cf0a3d87d1b394c5e32d17850bfbbe011d15a16b9f8f9abc
                              • Instruction ID: 12f699ea6251c2620be030213c51c5418c3af9426e62f1b2d7a83059ddb7c47b
                              • Opcode Fuzzy Hash: bda7877485d4fd81cf0a3d87d1b394c5e32d17850bfbbe011d15a16b9f8f9abc
                              • Instruction Fuzzy Hash: AA526CB1A09B84CBD720DF64C844BDFB7F4BF89308F108A1DE4985B661DB719549CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6CD073DA), ref: 6CD08943
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6CD073DA), ref: 6CD089FF
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6CD08B5B
                              • memmove.MSVCRT ref: 6CD08BD3
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?), ref: 6CD08C3B
                                • Part of subcall function 6CDCA0C0: QueryPerformanceCounter.KERNEL32 ref: 6CDCA0DD
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CD08E84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveLock$Release$Acquire$CounterPerformanceQuerymemmove
                              • String ID: called `Result::unwrap()` on an `Err` value$h[lT$internal error: entered unreachable code/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\sync\mpmc\mod.rs(WlP
                              • API String ID: 3634184793-724416604
                              • Opcode ID: 96300f3617d9bb90b5e61d6fa2f173b50d8046b3845e232fc61e2ff5d61941a9
                              • Instruction ID: 5a35c3a7dbbb50932fde62fa9b0d2cd930062dcd2f311e7cbc0c2b83367dfb55
                              • Opcode Fuzzy Hash: 96300f3617d9bb90b5e61d6fa2f173b50d8046b3845e232fc61e2ff5d61941a9
                              • Instruction Fuzzy Hash: 0C529071709300DFD700DF29C880B5AB7F5AF85328F298A5EE8985BB61D735D845CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: strlen
                              • String ID:
                              • API String ID: 39653677-0
                              • Opcode ID: 7e232841a50195c0cad2d7e8fa1f72d0a137f443ae6c0c7c2a9d726eefebae02
                              • Instruction ID: d32d6e2b7a4412610795a5571844b9e54c3fb6e9e06eb64234fa877903bacc12
                              • Opcode Fuzzy Hash: 7e232841a50195c0cad2d7e8fa1f72d0a137f443ae6c0c7c2a9d726eefebae02
                              • Instruction Fuzzy Hash: 77F108B19083558FD700CF29C490395BBF2AF4631CF2C86AED9AA4F796C7799449CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0C550: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD12597), ref: 6CD0C56A
                                • Part of subcall function 6CD0C580: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD125A1,?), ref: 6CD0C58D
                              • SwitchToThread.KERNEL32 ref: 6CD06E82
                              • GetProcessHeap.KERNEL32 ref: 6CD06EDA
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06EF7
                              • memset.MSVCRT ref: 6CD06F0E
                              • GetProcessHeap.KERNEL32 ref: 6CD06F8D
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06FAA
                              • memset.MSVCRT ref: 6CD06FC1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,00000000,00000178), ref: 6CD07004
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD07096
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD070F8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD07161
                              • SwitchToThread.KERNEL32 ref: 6CD071C1
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD0748A
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD07447
                              • internal error: entered unreachable code/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\sync\mpmc\mod.rs(WlP, xrefs: 6CD076F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$ExclusiveLock$AllocProcessReleaseSwitchThreadmemset$Acquire
                              • String ID: called `Result::unwrap()` on an `Err` value$internal error: entered unreachable code/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\sync\mpmc\mod.rs(WlP
                              • API String ID: 3293618497-19801793
                              • Opcode ID: 77818141c76ce9f1ae3c01754c5383f51dd383853c40069710e649300a5f2f8b
                              • Instruction ID: 06a16b3be2ce129f08ed0935f191ba8706e0ed1b4f1eddf3a406ad004f32a789
                              • Opcode Fuzzy Hash: 77818141c76ce9f1ae3c01754c5383f51dd383853c40069710e649300a5f2f8b
                              • Instruction Fuzzy Hash: 8E42AD71B08741EBD710CF28C44075AB7F1BF85318F258A2DE9A99BB61DB31E845CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • assertion failed: d.plus > 0, xrefs: 6CCF58DF
                              • 0, xrefs: 6CCF57FF
                              • assertion failed: d.mant.checked_add(d.plus).is_some(), xrefs: 6CCF58F5
                              • assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError, xrefs: 6CCF588B
                              • assertion failed: d.minus > 0, xrefs: 6CCF58C9
                              • assertion failed: buf.len() >= MAX_SIG_DIGITS, xrefs: 6CCF5921
                              • assertion failed: d.mant.checked_sub(d.minus).is_some(), xrefs: 6CCF590B
                              • assertion failed: d.mant > 0, xrefs: 6CCF58B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset$memcpy
                              • String ID: 0$assertion failed: buf.len() >= MAX_SIG_DIGITS$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError
                              • API String ID: 368790112-2344143831
                              • Opcode ID: 8d3e8824f07d5dc5ad89ae325631bf080c03515d27c4e269effca7df31975547
                              • Instruction ID: dd778d4846dd3a628db8344035b76b6fc7ed5a189fcd0c7cf325548d3ab900ae
                              • Opcode Fuzzy Hash: 8d3e8824f07d5dc5ad89ae325631bf080c03515d27c4e269effca7df31975547
                              • Instruction Fuzzy Hash: 52424671E002199BDF54CF64D880BED73B6BF89304F2585A9D829F7781F7319A4A8B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetUserNameW.ADVAPI32(00000000,00000000), ref: 6CE16B39
                              • GetLastError.KERNEL32 ref: 6CE16B41
                              • GetProcessHeap.KERNEL32 ref: 6CE16BEA
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CE16C05
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocErrorLastNameProcessUser
                              • String ID: ?$called `Result::unwrap()` on an `Err` value
                              • API String ID: 434072182-3528718506
                              • Opcode ID: 365862359d492f9382ffacdbe475e39de8ab7449dd33aa30aa62661a625ce1dc
                              • Instruction ID: cb35f3b10d81a8c822d898ab3de37869c42ce4fc5d1d8dd04929d1ea238dc664
                              • Opcode Fuzzy Hash: 365862359d492f9382ffacdbe475e39de8ab7449dd33aa30aa62661a625ce1dc
                              • Instruction Fuzzy Hash: 58C1B3B2E092598BDF00CF99C8417EEBBB9FF45308F344129E814ABB41D7759A19CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0A952
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0A9A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0C033
                                • Part of subcall function 6CD07FE0: AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6CD0B20E,00000000,?,?,?,?,6CD0690C), ref: 6CD07FEC
                                • Part of subcall function 6CD07FE0: CloseHandle.KERNEL32(FFFFFFFF), ref: 6CD080B7
                                • Part of subcall function 6CD07FE0: ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CD08110
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$ExclusiveLock$AcquireCloseHandleRelease
                              • String ID:
                              • API String ID: 3404053607-0
                              • Opcode ID: eb703a318c2cc94b82dd86be4ba67fbf57ea65556031282599e6504b2c2f0507
                              • Instruction ID: ba329a550fe46e2899f621142f2d6264b20a057199c786c453aa7cb838162735
                              • Opcode Fuzzy Hash: eb703a318c2cc94b82dd86be4ba67fbf57ea65556031282599e6504b2c2f0507
                              • Instruction Fuzzy Hash: D102B171B04601DFCB14DF9DC880BAAB7B1FF85308F28416DD9596BB61DB31A845CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,6CE086C4), ref: 6CDFDD52
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,6CE086C4), ref: 6CDFDDA7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,?,6CE086C4,?,00000000), ref: 6CDFF673
                                • Part of subcall function 6CDFA730: AcquireSRWLockExclusive.KERNEL32 ref: 6CDFA98C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$AcquireExclusiveLock
                              • String ID:
                              • API String ID: 2371024757-0
                              • Opcode ID: ea6c6b229081447a58cdf517e178854e79d174fdb2a419ee5cbc19e8ae0ce6fe
                              • Instruction ID: 01b7104772d94466fb64c9b9662a1289fb7871437d079e848791357847924573
                              • Opcode Fuzzy Hash: ea6c6b229081447a58cdf517e178854e79d174fdb2a419ee5cbc19e8ae0ce6fe
                              • Instruction Fuzzy Hash: 8B02B171A04205DFCB14DF59C880BAEF7F1FF45308F2A4169D9696BB61DB31A806CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • assertion failed: d.plus > 0, xrefs: 6CCF58DF
                              • assertion failed: d.mant.checked_add(d.plus).is_some(), xrefs: 6CCF58F5
                              • assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError, xrefs: 6CCF588B
                              • assertion failed: d.minus > 0, xrefs: 6CCF58C9
                              • assertion failed: buf.len() >= MAX_SIG_DIGITS, xrefs: 6CCF5921
                              • assertion failed: d.mant.checked_sub(d.minus).is_some(), xrefs: 6CCF590B
                              • assertion failed: d.mant > 0, xrefs: 6CCF58B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset$memcpy
                              • String ID: assertion failed: buf.len() >= MAX_SIG_DIGITS$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError
                              • API String ID: 368790112-1451125116
                              • Opcode ID: 9d2482dae97f790299a10f0ed8052fd45858911cd287c95760279b9537b69092
                              • Instruction ID: 9c6428e644cd42eea945396a4331589c5e24670e14637dd7d606a0cb59799e67
                              • Opcode Fuzzy Hash: 9d2482dae97f790299a10f0ed8052fd45858911cd287c95760279b9537b69092
                              • Instruction Fuzzy Hash: FE424871E002199BDF54CF64D880BED73B6BF49304F2585A9D829F7781F7349A4A8B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • BCryptGenRandom.BCRYPT(00000000,?,00000020,00000002), ref: 6CD1B17D
                              • BCryptGenRandom.BCRYPT(00000000,?,00000020,00000002), ref: 6CD1B2ED
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CryptRandom
                              • String ID: ,ll$4llY$@$te k
                              • API String ID: 2662593985-925207699
                              • Opcode ID: 533727676063573ec2fd450ad36062f4da498b0b67dd530951daa99d4480b8b3
                              • Instruction ID: c6e6f10acd651aeffd1139c478c58a123d04ef9eb86793e20912e52c74f03ff6
                              • Opcode Fuzzy Hash: 533727676063573ec2fd450ad36062f4da498b0b67dd530951daa99d4480b8b3
                              • Instruction Fuzzy Hash: 26B2136440D3D08DD3328B6994517EBFFF06FEA315F084A8EE9D846293D6758288DB63
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceCounter.KERNEL32 ref: 6CDCA0DD
                              • GetLastError.KERNEL32 ref: 6CDCA0FD
                              • QueryPerformanceFrequency.KERNEL32(00000000), ref: 6CDCA18C
                                • Part of subcall function 6CDD96F0: QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,6CDCA0F3,00000000,00000000), ref: 6CDD9729
                              Strings
                              • attempt to divide by zero, xrefs: 6CDCA346
                              • t{l, xrefs: 6CDCA3AE, 6CDCA3EA
                              • overflow when subtracting durations, xrefs: 6CDCA3FC
                              • |{lH, xrefs: 6CDCA3B2
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CDCA11F, 6CDCA377
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CDCA39E
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CDCA3D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: PerformanceQuery$Frequency$CounterErrorLast
                              • String ID: assertion failed: edelta >= 0library\core\src\num\diy_float.rs$attempt to divide by zero$called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs$called `Result::unwrap()` on an `Err` value$overflow when subtracting durations$t{l$|{lH
                              • API String ID: 361767260-1598764566
                              • Opcode ID: 49297a0a1796be110efbeee628887e1ef428d405d4400ac865b01983dc708d4d
                              • Instruction ID: 11b80236c52806f2cf9c8e57348f425328dcb2bdf2a1c97d8f3dd278ca3113fb
                              • Opcode Fuzzy Hash: 49297a0a1796be110efbeee628887e1ef428d405d4400ac865b01983dc708d4d
                              • Instruction Fuzzy Hash: 77A1C1B2B043009BD704DF68CC41B9BB7EAABC4754F158A2DF45997BA0E731E9098793
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpy
                              • String ID: FALS$Fals$TRUE$True$fals$true
                              • API String ID: 4164033339-392382064
                              • Opcode ID: 39ed6f3f62869e7b3e0ab8e7a5c32ee11fa655263a3ab6e663ede57cfbb52cfa
                              • Instruction ID: a0ee5ab7530a7c93952d3d3eceac3fd15cf0b3b96690fbb8bfc0aed8dd226be5
                              • Opcode Fuzzy Hash: 39ed6f3f62869e7b3e0ab8e7a5c32ee11fa655263a3ab6e663ede57cfbb52cfa
                              • Instruction Fuzzy Hash: 41B12730A0D3C18FDB168F2488B05ABFFB5AF8324CB19819EC5D54BD62D738A519C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy
                              • String ID: 2-byte k$expa$expa$expand 32-byte kte k$expate k$nd 3$nd 32-by$nd 32-by
                              • API String ID: 3510742995-3738056600
                              • Opcode ID: 1a36bec88eed8aa5e7e07c4741e89496ad745cfb8a994606b7c4fa921bb846ac
                              • Instruction ID: 49ea64669c67d412110ce674cd550b5b297d6974d5fd5db665e9563362a38710
                              • Opcode Fuzzy Hash: 1a36bec88eed8aa5e7e07c4741e89496ad745cfb8a994606b7c4fa921bb846ac
                              • Instruction Fuzzy Hash: 1BE245B1D002288FDB64CFA9C984BCDFBB1BF48314F6581AAD509BB201D7746A96CF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CDCF000: CreateFileW.KERNEL32(?,00120114,?,?,?,?,00000000), ref: 6CDCF1E8
                                • Part of subcall function 6CDCF000: HeapFree.KERNEL32(00000000,?), ref: 6CDCF206
                              • DeviceIoControl.KERNEL32(?,000900A8,00000000,00000000,?,00004000,00000000,00000000), ref: 6CDD0EE3
                              • GetLastError.KERNEL32 ref: 6CDD0F48
                              • CloseHandle.KERNEL32(?), ref: 6CDD0FC7
                              • GetProcessHeap.KERNEL32 ref: 6CDD0FF7
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CDD100D
                              • memcpy.MSVCRT ref: 6CDD103F
                              • HeapFree.KERNEL32(00000000,?), ref: 6CDD10DE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocCloseControlCreateDeviceErrorFileHandleLastProcessmemcpy
                              • String ID: J^l
                              • API String ID: 1740046355-3444829382
                              • Opcode ID: bcd20a1724e9570d92dd7ca1b55613b9181516452e23e3d1b69bd1ffb9e28d7b
                              • Instruction ID: 01a615e118c7d29a8860f3ca4dcb379ea4fa20b3f6963aa068c824a1f1beec6c
                              • Opcode Fuzzy Hash: bcd20a1724e9570d92dd7ca1b55613b9181516452e23e3d1b69bd1ffb9e28d7b
                              • Instruction Fuzzy Hash: 7981EBB19087819AD700CF24C841B6BB7F5EFC5748F218A1DF8995B6A1E774E508CB63
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD1AA55
                              • HeapAlloc.KERNEL32(00000000,00000000,00000017), ref: 6CD1AA72
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1AC66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcess
                              • String ID: 100$called `Result::unwrap()` on an `Err` value$e le$han $ss t$st b
                              • API String ID: 2113670309-902743412
                              • Opcode ID: ac6657fbe89c02c5a3f83b63e65647cb1e1ffe24edc16d7d07c9764ceeb872b9
                              • Instruction ID: 8ba78a8669fa9f77702550d5042ecbfab06dce6ad0e3baa8b4d8bd5549ede8e4
                              • Opcode Fuzzy Hash: ac6657fbe89c02c5a3f83b63e65647cb1e1ffe24edc16d7d07c9764ceeb872b9
                              • Instruction Fuzzy Hash: 87C1F0B16083449FD710CF25D481B8BBBE1BF88358F148A2DE8999B761D774E948CF92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(-00000001), ref: 6CD02FB0
                              • TlsGetValue.KERNEL32(00000000), ref: 6CD02FD8
                              • TlsGetValue.KERNEL32(-00000001,00000000), ref: 6CD02FF1
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CD03011
                              • HeapAlloc.KERNEL32(00000000,00000000,0000000C,00000000,00000000), ref: 6CD03025
                              • TlsSetValue.KERNEL32(00000000,00000000,00000000,00000000), ref: 6CD03051
                              • TlsGetValue.KERNEL32(00000000,00000000), ref: 6CD030D1
                              Strings
                              • 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 6CD03214
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CD03259
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Value$Heap$AllocProcess
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 3559649508-2220681599
                              • Opcode ID: 972955eb6b35340682bad2130566a1a07751a0d6716edaaf9dc242f192c66faa
                              • Instruction ID: 923fdb33283bc8af99eadd749c0142f5445fdfa2e5f46a8272d2d3d3704626c6
                              • Opcode Fuzzy Hash: 972955eb6b35340682bad2130566a1a07751a0d6716edaaf9dc242f192c66faa
                              • Instruction Fuzzy Hash: 28814C71F01204DFEB204F29C805FA677B9EF0234CF148569E8499BBA1D73AE549C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • NtReadFile.NTDLL ref: 6CDD19B2
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 6CDD19C1
                              • RtlNtStatusToDosError.NTDLL ref: 6CDD19F7
                              • NtWriteFile.NTDLL ref: 6CDD1AD2
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 6CDD1AE1
                              Strings
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CDD1A2C
                              • jjj, xrefs: 6CDD1ACB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileObjectSingleWait$ErrorReadStatusWrite
                              • String ID: called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs$jjj
                              • API String ID: 221916143-3878638358
                              • Opcode ID: 03eef7dd2e6795799b2d12d364c1a6665e97af40eadc7047f68600cfc80a6d2a
                              • Instruction ID: bd2be75e35926928e116794b01636e91bb4fa06bef37b339ecc470140f7da9df
                              • Opcode Fuzzy Hash: 03eef7dd2e6795799b2d12d364c1a6665e97af40eadc7047f68600cfc80a6d2a
                              • Instruction Fuzzy Hash: E55187B1908345AFE700CF14CC41B9BBBE8EB85728F11892DF5E497691D3B4E949CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                              • API String ID: 384173800-1835852900
                              • Opcode ID: b9d8a0cdf6c412f3338e9e42c48c041568d0e77d96541178eb8e30e620bfcfc6
                              • Instruction ID: ab26bf7e3fa2d05ea33d4357932a76e25a868fec3764e8001f582974667b020f
                              • Opcode Fuzzy Hash: b9d8a0cdf6c412f3338e9e42c48c041568d0e77d96541178eb8e30e620bfcfc6
                              • Instruction Fuzzy Hash: 950180B2E193288BCB00BF78950732DBEB4FE46245F114A2DD48947A11E734A414CF93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: assertion failed: buf.len() >= MAX_SIG_DIGITS$assertion failed: d.mant + d.plus < (1 << 61)$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: edelta >= 0library\core\src\num\diy_float.rs$attempt to divide by zero
                              • API String ID: 0-205705915
                              • Opcode ID: 3933582807865d427f6fd53f652c4864eacc880b20cfa5e096226dc14d36f3fc
                              • Instruction ID: 6c2ef0dc0a7e5dfd6a01d84d866efc0f72d49e82ed3a5283af3de72cc6b4c1fc
                              • Opcode Fuzzy Hash: 3933582807865d427f6fd53f652c4864eacc880b20cfa5e096226dc14d36f3fc
                              • Instruction Fuzzy Hash: 07723D76A087119FC748CF28C48061AB7E2BFC8754F158A2DF8A997755D730ED09CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CCF3F1E
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CCF3F35
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CCF3FE0
                              Strings
                              • 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 6CCF4205, 6CCF4364
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CCF4246, 6CCF43A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Alloc
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 651230671-2220681599
                              • Opcode ID: f2b8d5f7304ffe779acabbe2fdefcee32ecfcd061575ec677e570318c289eddf
                              • Instruction ID: a3abfed1f110a6009eb54f9f0b7a2dea62c9ba5bc3b523761f9b574ec5990ded
                              • Opcode Fuzzy Hash: f2b8d5f7304ffe779acabbe2fdefcee32ecfcd061575ec677e570318c289eddf
                              • Instruction Fuzzy Hash: 24E18A72A002158FEB14CF29C881BBAB7B5FF85318F148179E9199B781E734AD0AC791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,6CD0BEF8,?,?,?,?), ref: 6CD217A0
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,6CD0BEF8,?,?,?,?), ref: 6CD2196F
                              • HeapAlloc.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,6CD0BEF8,?,?,?), ref: 6CD21984
                              • memcpy.MSVCRT ref: 6CD21A9C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD21B14
                              • memcpy.MSVCRT ref: 6CD21CD4
                              • memcpy.MSVCRT ref: 6CD21D4F
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?), ref: 6CD21D79
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$FreeProcess$Alloc
                              • String ID:
                              • API String ID: 1235786331-0
                              • Opcode ID: 58ae943cd7713ad8b7fc267c1342a6c50b984dcc7b88ad57a5d440de3206a10c
                              • Instruction ID: 1f431672ec53aae2b2c4b94cd7833f0ceab9bffef8c149b072a40f3653e533e7
                              • Opcode Fuzzy Hash: 58ae943cd7713ad8b7fc267c1342a6c50b984dcc7b88ad57a5d440de3206a10c
                              • Instruction Fuzzy Hash: 6C22F371E05215CBDF10CF64C8807AEB7B1BF4531CF288269DA65ABAA0D73ADD45CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • C:\Users\runneradmin\.cargo\registry\src\index.crates.io-1cd66030c949c28d\hashbrown-0.12.3\src\raw\mod.rs, xrefs: 6CD2052E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemmovememset
                              • String ID: C:\Users\runneradmin\.cargo\registry\src\index.crates.io-1cd66030c949c28d\hashbrown-0.12.3\src\raw\mod.rs
                              • API String ID: 2660627060-3661997313
                              • Opcode ID: a538269428feb28627b7132635a04637b28450efb23ca2bb3e916024f2ffd741
                              • Instruction ID: 6910373e57b8508c852db202681301d1a6f1fd90c4310f0e3a0d9ac75dc7a0db
                              • Opcode Fuzzy Hash: a538269428feb28627b7132635a04637b28450efb23ca2bb3e916024f2ffd741
                              • Instruction Fuzzy Hash: 89623871D097644FDB12DB3DC4506AAFFB1AFA7244B09C75AE8697BB61C730A8028750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • assertion failed: ee + 15 < 512, xrefs: 6CD40C6F
                              • assertion failed: cc + 15 < 512, xrefs: 6CD40C7D
                              • assertion failed: self.counter1024 % 16 == 0/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/rand_hc-0.3.1/src/hc128.rs, xrefs: 6CD40C61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpymemset
                              • String ID: assertion failed: cc + 15 < 512$assertion failed: ee + 15 < 512$assertion failed: self.counter1024 % 16 == 0/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/rand_hc-0.3.1/src/hc128.rs
                              • API String ID: 1297977491-1825198817
                              • Opcode ID: 6b1b3da28788f2573d6f39e589c820e1f8242d3cd4c613dcabcce12f2d817f73
                              • Instruction ID: 95defbdb4dd354762e6042e05fdd2a8dc6e6325f42a972430e5e4e865207d397
                              • Opcode Fuzzy Hash: 6b1b3da28788f2573d6f39e589c820e1f8242d3cd4c613dcabcce12f2d817f73
                              • Instruction Fuzzy Hash: DDA22C75D006198FCB18CF4CD490AA9B7F1FF88358F1A81ADE949AB351CB34A952CF84
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd3b9fa05b53efc8474eb10fd678b1593c6f7063641f891777c0add326ae3dc0
                              • Instruction ID: 718a67801a51854e985ef6b08aea5dab1c618f3282ac8e42d4ce0fc59c34f121
                              • Opcode Fuzzy Hash: dd3b9fa05b53efc8474eb10fd678b1593c6f7063641f891777c0add326ae3dc0
                              • Instruction Fuzzy Hash: 5A129F75608B168FD710CF28C48075AB7F1BF89319F248A2DE99997B41D738E946CBC2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD37028
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD370FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-3916222277
                              • Opcode ID: 62a8c5e28f6843b6b62a91f89fc6272f1f1fc56afc57e6ee1adea962b03c8280
                              • Instruction ID: 75a231c1fcb280aa79d56492161479dcc4c366ef8e5cbf826e9ce7d37f78aee0
                              • Opcode Fuzzy Hash: 62a8c5e28f6843b6b62a91f89fc6272f1f1fc56afc57e6ee1adea962b03c8280
                              • Instruction Fuzzy Hash: 62826875909B55DBC701CF28C88061BB7F1BFCA354F119B1DE8A96B261DB30E945CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy$FreeHeapmemset
                              • String ID:
                              • API String ID: 389588089-3916222277
                              • Opcode ID: 51072a00697b358ba77bbaf1ba83dea1659e930437b48656892b7608474f30f5
                              • Instruction ID: a12b0d3fb3c4130714039a140da97ec07b074286568eb0c5eb84753f26e1e906
                              • Opcode Fuzzy Hash: 51072a00697b358ba77bbaf1ba83dea1659e930437b48656892b7608474f30f5
                              • Instruction Fuzzy Hash: A881EB7192D3C08BE372CB6888807DAB795AFDA308F144B2DF8C857A52E7754289C753
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CDEEBE0: GetProcessHeap.KERNEL32 ref: 6CDEEC32
                                • Part of subcall function 6CDEEBE0: HeapAlloc.KERNEL32(00000000,00000000,0003A420), ref: 6CDEEC49
                                • Part of subcall function 6CDEEBE0: memset.MSVCRT ref: 6CDEEC6F
                                • Part of subcall function 6CDEEBE0: GetProcessHeap.KERNEL32 ref: 6CDEECB7
                                • Part of subcall function 6CDEEBE0: HeapAlloc.KERNEL32(00000000,00000000,00000009), ref: 6CDEECCB
                                • Part of subcall function 6CDEEBE0: GetProcessHeap.KERNEL32(00000000,00000000,00000009), ref: 6CDEED88
                                • Part of subcall function 6CDEEBE0: HeapAlloc.KERNEL32(00000000,00000000,000000A0,00000000,00000000,00000009), ref: 6CDEED9F
                              • GlobalMemoryStatusEx.KERNEL32(01010101), ref: 6CD05D5B
                              • GetPerformanceInfo.PSAPI(?,00000038), ref: 6CD05DA8
                              • GetDiskFreeSpaceExW.KERNEL32(?,00000000,00000000,00000000), ref: 6CD05EBB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$DiskFreeGlobalInfoMemoryPerformanceSpaceStatusmemset
                              • String ID: @
                              • API String ID: 2129359485-2766056989
                              • Opcode ID: 96c61e5a653ae5327af98da63dac3f360a22ab2720ecbb24568e30e9177f5bca
                              • Instruction ID: 1e94130dc36daef6645e4bd02c0328750d822ccba18f7cd2ebfa13f6561e0bee
                              • Opcode Fuzzy Hash: 96c61e5a653ae5327af98da63dac3f360a22ab2720ecbb24568e30e9177f5bca
                              • Instruction Fuzzy Hash: 56618E71A083809BE721CF18D885BDAB7E5BFC9318F54491DF9C897260E731E589CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD2C68D
                                • Part of subcall function 6CD29170: memcpy.MSVCRT ref: 6CD291C3
                                • Part of subcall function 6CD29170: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,00000000,?,?,6CD28804), ref: 6CD291F8
                              Strings
                              • ?, xrefs: 6CD2C241
                              • attempt to divide by zeroassertion failed: self.len() <= isize::MAX as usize/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/zeroize-1.5.7/src/lib.rs, xrefs: 6CD2C430
                              • capacity overflow, xrefs: 6CD2C44A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$memcpy
                              • String ID: ?$attempt to divide by zeroassertion failed: self.len() <= isize::MAX as usize/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/zeroize-1.5.7/src/lib.rs$capacity overflow
                              • API String ID: 1887603139-3695021941
                              • Opcode ID: f8713efca65de8185e4699f2323703c337df21dbf841975359314bbfb430e40b
                              • Instruction ID: 79f489bc906b7731ed06fa10d9ae438a78d4eafdd3ae22ffa51a93da59999286
                              • Opcode Fuzzy Hash: f8713efca65de8185e4699f2323703c337df21dbf841975359314bbfb430e40b
                              • Instruction Fuzzy Hash: DB029B71908F458BE711DF29C88061BB7F2BFCA398F108B1DE9995B621DB35D845CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoInitializeEx.OLE32(00000000,00000000), ref: 6CDEACFE
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000,00000000), ref: 6CDEAD31
                              • CoCreateInstance.OLE32(6CE9B5C8,00000000,00000001,6CE9B5D8,00000000,00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000,?,00000000), ref: 6CDEAD7E
                                • Part of subcall function 6CDEAF90: SysAllocString.OLEAUT32(root\WMI), ref: 6CDEAFB5
                                • Part of subcall function 6CDEAF90: SysFreeString.OLEAUT32(00000000), ref: 6CDEAFDB
                              • CoSetProxyBlanket.OLE32(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000,6CE9B5C8,00000000,00000001,6CE9B5D8,00000000,00000000,000000FF,00000000), ref: 6CDEAE0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeString$AllocBlanketCreateFreeInstanceProxySecurity
                              • String ID:
                              • API String ID: 2775903894-0
                              • Opcode ID: d5c5e503b58ca0b0fe09e6493d37ca00d98ac3185d6968f34307fb526555c712
                              • Instruction ID: ece0b193ad6ffa57307939f2a01cf32c41f17648693fba51306b0234753ba7b1
                              • Opcode Fuzzy Hash: d5c5e503b58ca0b0fe09e6493d37ca00d98ac3185d6968f34307fb526555c712
                              • Instruction Fuzzy Hash: 46711771D01F0EAADB12CFA5C842B9EF7B5BF4A744F209309E8193A591DB70AA45CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • attempt to divide by zero, xrefs: 6CCF735F
                              • assertion failed: !buf.is_empty()called `Option::unwrap()` on a `None` valuex, xrefs: 6CCF7584
                              • assertion failed: d.mant < (1 << 61)x, xrefs: 6CCF756E
                              • assertion failed: d.mant > 0, xrefs: 6CCF7558
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: assertion failed: !buf.is_empty()called `Option::unwrap()` on a `None` valuex$assertion failed: d.mant < (1 << 61)x$assertion failed: d.mant > 0$attempt to divide by zero
                              • API String ID: 0-4195645054
                              • Opcode ID: fa907cc3ff0cbc3b63f6b4d5bc1c3a081bf389845358153d82553bfd53795122
                              • Instruction ID: 1b3b4d3da20291588b4bb261bf4ae14ffb79f966d50ebdd24b855a1ef9c0241e
                              • Opcode Fuzzy Hash: fa907cc3ff0cbc3b63f6b4d5bc1c3a081bf389845358153d82553bfd53795122
                              • Instruction Fuzzy Hash: D2F1C172F006198BDB08CF69DC907EEB7F2AF88350F168139E925A7791E6349D45CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • called `Option::unwrap()` on a `None` value, xrefs: 6CDA1C85
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy
                              • String ID: called `Option::unwrap()` on a `None` value
                              • API String ID: 3510742995-836832528
                              • Opcode ID: 36aebc8aacfb95733cd637334e813d83b1eca0cb443264b30a36b8ca41bb8ecc
                              • Instruction ID: 3d6f7f78c886a85f83b8efbd716b60b95767452185bfd835a90186c6c2ca15fc
                              • Opcode Fuzzy Hash: 36aebc8aacfb95733cd637334e813d83b1eca0cb443264b30a36b8ca41bb8ecc
                              • Instruction Fuzzy Hash: EEF1EA7148E3A4AFC7028BA1DC519F77F749F03258B0A42D7F4448BA63D2269B99C7B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD20F8F
                              • HeapAlloc.KERNEL32(?,00000000,00000005), ref: 6CD20FA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: f2b3e9d673c5e480f90ae80149af121ad6b9d34b76e3ef10439c30161b547429
                              • Instruction ID: 238bdd5196b25b9cff80a62f40fd845143ebd4a44cf4747e2d46fe171eb6a876
                              • Opcode Fuzzy Hash: f2b3e9d673c5e480f90ae80149af121ad6b9d34b76e3ef10439c30161b547429
                              • Instruction Fuzzy Hash: 1A126CB2E01695CBC714CF68C8902AEF7B1BF45358F28832AD555A7BA1D379ED40C790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCEBA6B
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEBA84
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID:
                              • API String ID: 1617791916-0
                              • Opcode ID: 11c8496a8baaca08855d2c8fc70b1e1f33819b08da776de57de579faedcc0bf7
                              • Instruction ID: fa3d0f09378f5e11077b61218e1a64f887c9af548b05d17cfac3970a95d68ed4
                              • Opcode Fuzzy Hash: 11c8496a8baaca08855d2c8fc70b1e1f33819b08da776de57de579faedcc0bf7
                              • Instruction Fuzzy Hash: ABF16C72E0471A4BDB05CE39C8A16BDB7B2BF8F344F188329E85567B45F730AA418784
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 6CD011A5
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CD011E6
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\sync\once.rs, xrefs: 6CD01002
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$assertion failed: edelta >= 0library\core\src\num\diy_float.rs$called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\sync\once.rs
                              • API String ID: 3298025750-2254546133
                              • Opcode ID: 4a9c019bc469835ca493c5f87d3ea079bdea6e04cc310a0ce5033beeb24af22d
                              • Instruction ID: ffa4fc602edd7d77b47893640eb6164af8b8885a24ad82f8efcf37a91f1540f1
                              • Opcode Fuzzy Hash: 4a9c019bc469835ca493c5f87d3ea079bdea6e04cc310a0ce5033beeb24af22d
                              • Instruction Fuzzy Hash: 7BA18B32B042489FDB14CF6CC882BFAB7B6EF85318F108268E9159B7E2D7349908C751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset
                              • String ID: !
                              • API String ID: 2221118986-1387752520
                              • Opcode ID: c3c3017c3d2b5c7f9605994dd18b3ca24f451a551453f6dc40b8b38816efb03c
                              • Instruction ID: 37fe8b2d57d489b55da5f5ede3563ef4228a632d0e913099371977cffc5f6514
                              • Opcode Fuzzy Hash: c3c3017c3d2b5c7f9605994dd18b3ca24f451a551453f6dc40b8b38816efb03c
                              • Instruction Fuzzy Hash: F1429375E25F9842E723963598037E7E7A4AFFB248F00D71FEDAA32E50DB24B5419240
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 11671aece59c0aac73dafede399bafd817862ca4b616e35b1c166d5d2fb7044d
                              • Instruction ID: 6304cfbb46e39d99dec5dbfba8d03e0600627c310b9e77193b3561ecca2d4172
                              • Opcode Fuzzy Hash: 11671aece59c0aac73dafede399bafd817862ca4b616e35b1c166d5d2fb7044d
                              • Instruction Fuzzy Hash: AD024676E30B6686EB035B3DE9421A9B778AFE7345F09C32BFD5432950F7215602C248
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0000$attempt to divide by zero
                              • API String ID: 0-2494717124
                              • Opcode ID: 1f80993cd44de302fc86b667cb82acb260b11966c49cb0e903e9e0b648f6bcb2
                              • Instruction ID: c1e2eb2f9c9a1295a5c344e5b6a2ff7664036571a7442f3f4de67366247eba3c
                              • Opcode Fuzzy Hash: 1f80993cd44de302fc86b667cb82acb260b11966c49cb0e903e9e0b648f6bcb2
                              • Instruction Fuzzy Hash: F1F1C071B093018FD748CF19C49075ABBE2AFC9314F15CA2EE8A997791E731DD468B82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 6CCE5194, 6CCE5320, 6CCE5545
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CCE51D9, 6CCE539C, 6CCE5586
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 0-2220681599
                              • Opcode ID: c26d987acf298cd733ef884469bef46e1e27bc36c755452017e32d6f79410215
                              • Instruction ID: f392663600f8449dfd18c3332b9089030f1d6412260aa4d418cd1b5f293d2788
                              • Opcode Fuzzy Hash: c26d987acf298cd733ef884469bef46e1e27bc36c755452017e32d6f79410215
                              • Instruction Fuzzy Hash: C7D1D332B042698FE7148A2DC851BFAB376FF8A314F008639E9499F7C2E6799D05C751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 6CD22205, 6CD223F5
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CD2224B, 6CD22436
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 0-2220681599
                              • Opcode ID: 55a57513b35cedd3ef8836137157c5af06593ea9e7c5f8b5418a3507f2b25b26
                              • Instruction ID: e967fc2e3d2511f4e4cd5a23bae615c83e047aafaa8e569124f3dc58e87e23f1
                              • Opcode Fuzzy Hash: 55a57513b35cedd3ef8836137157c5af06593ea9e7c5f8b5418a3507f2b25b26
                              • Instruction Fuzzy Hash: 86B16D327141558FE7188B2CC899BBAB376FF9532CF108679FA498B7D2E6389845C350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID:
                              • API String ID: 1475443563-0
                              • Opcode ID: 0be9516f759bb08367adcf5869369d1201bf72342a50f7ac874ed8d4305ba1ed
                              • Instruction ID: 4797e9ed9127d099ef0ea16b37344c56a37ecacc336be5d180c1a0e57d7f5eb0
                              • Opcode Fuzzy Hash: 0be9516f759bb08367adcf5869369d1201bf72342a50f7ac874ed8d4305ba1ed
                              • Instruction Fuzzy Hash: DA12E575E042168FCB05CF29C4807AEB7F2AF9A354F26836AE815B7751E770AD4287D0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CloseHandle.KERNEL32(FFFFFFFF), ref: 6CDC218D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: a4a5d52d421cc430c9542ded50ff9717fe1712568717fdb2d5e5b34449898da4
                              • Instruction ID: 69b1d7a420b28b192393c381a48cbb9d0295e01017f04fce97cd1a74fe9cb7f3
                              • Opcode Fuzzy Hash: a4a5d52d421cc430c9542ded50ff9717fe1712568717fdb2d5e5b34449898da4
                              • Instruction Fuzzy Hash: 5A026C72A083508FD714CF29C89075EF7E5BFC8324F158A2EE9A9977A0D7759804CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
                              • API String ID: 0-485157861
                              • Opcode ID: 8197ee564e80cf43ffcae27665dce51b69a82bda4c2c9632ef85b1803288a184
                              • Instruction ID: 4837778cdab7b261797c183add6ec049d6c7fcd9cf8ee6a3fb2c1d7a553b36e3
                              • Opcode Fuzzy Hash: 8197ee564e80cf43ffcae27665dce51b69a82bda4c2c9632ef85b1803288a184
                              • Instruction Fuzzy Hash: 5DD17C72E00254AFEB244B18EC45FFAB769EF85318F048138FA586F782DA755D0AC790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD04960
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: e78a51342eddf4ab2c9de514c9a393ed0acf2306bb486c744695ffbf4ad4ae8b
                              • Instruction ID: 0074f258d37e2ea55bd1b7de4cc2600dbd4a9e2489d22831218b7a41ee1ec77e
                              • Opcode Fuzzy Hash: e78a51342eddf4ab2c9de514c9a393ed0acf2306bb486c744695ffbf4ad4ae8b
                              • Instruction Fuzzy Hash: 29C18D70E04B198BDB10CFADC4907AEB7F2FF9A314F10822ED469AB6A1C7749945CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • BCryptGenRandom.BCRYPT(00000000,?,?,00000002), ref: 6CD22652
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CryptRandom
                              • String ID:
                              • API String ID: 2662593985-0
                              • Opcode ID: 5c576fc24f6e8369fd3d3cd96ffba47190fd06c0bf65f92d6d7af0636e92b47b
                              • Instruction ID: 2c605053ce189a0ac5515d56c5ccc6c64f4163a63377ce548af082d0c7e3edef
                              • Opcode Fuzzy Hash: 5c576fc24f6e8369fd3d3cd96ffba47190fd06c0bf65f92d6d7af0636e92b47b
                              • Instruction Fuzzy Hash: D2D05E323942086EEB049EB99C09FB733D9AB88618F208424F90ECA581E564D8004550
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 16fbc2fd5b81998d7d8a071fe2811c85c186650915add4b5709901eb81786625
                              • Instruction ID: f2ab24a9844a180be37afc1c120ba5e90565d041e39bbe6bdbb4b5d737a8e09b
                              • Opcode Fuzzy Hash: 16fbc2fd5b81998d7d8a071fe2811c85c186650915add4b5709901eb81786625
                              • Instruction Fuzzy Hash: 63629C71E00A29CBCB14CF98C4907AEF7B1FF4A314F25926AD858BB791C7759D818B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f45385492a4020898e971b0f71704674466a7aaedfcfdc359359c3db9277ec0b
                              • Instruction ID: c7d495a5dcb67fab70517b53edf6672e16e4ac00ede05ed7be59882f583ce681
                              • Opcode Fuzzy Hash: f45385492a4020898e971b0f71704674466a7aaedfcfdc359359c3db9277ec0b
                              • Instruction Fuzzy Hash: 41127F3184A382DFC7039FB4C8511997BF5AF47319B2A84FAD480DB562E37D588ACB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 855ba48f5fffb7282bbd5aed48ccbeaca2b230ba58f668f888784da104c412b6
                              • Instruction ID: 6cc4fea66f65a6a9c98355c65ac45ee9b328d93f332089ccec12e73841dd0aa5
                              • Opcode Fuzzy Hash: 855ba48f5fffb7282bbd5aed48ccbeaca2b230ba58f668f888784da104c412b6
                              • Instruction Fuzzy Hash: A4228E70E04A698BDB15CFA9C4503EEFBB1BF8A300F14825ED459BB781DB749A85CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8edd90c632105b4c95f69994ca464a46f9ebc92567cef265b2d61f6b1e4260d
                              • Instruction ID: 5e61aec0f6b28510693dee2cf6626afa6ce20f077975579e84f010d1cf0d201c
                              • Opcode Fuzzy Hash: d8edd90c632105b4c95f69994ca464a46f9ebc92567cef265b2d61f6b1e4260d
                              • Instruction Fuzzy Hash: EA12C131E04A19CBCB11CFA9C4803AEF7B2FF8A314F258269D8596B791D7759C42CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5e35c142868b44627c56a95987aaf684b145f52c73e2f292becd49c5231e6f71
                              • Instruction ID: 8804b4cd90ad3aa8e2a6ac4efdf518716de3f0486e2420df9d11979b09f1f787
                              • Opcode Fuzzy Hash: 5e35c142868b44627c56a95987aaf684b145f52c73e2f292becd49c5231e6f71
                              • Instruction Fuzzy Hash: A202A435E05E19CBCB11CFA8C4807AEB7B2AF4A354F2482A9D8097F655EB358D47CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction ID: a3e3c62795b6b04398200d1b4db34176642c6b3154d977e650acac3297021020
                              • Opcode Fuzzy Hash: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction Fuzzy Hash: 4EB1D375E057158FDB02DF7DC8812AAF7F1AF9A240F64C32AE825B7622D731E8818750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction ID: 7fe2b8d792c842a89f6f46e4f658c4e2f369a0273bd0411d75bcd98c3974a09f
                              • Opcode Fuzzy Hash: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction Fuzzy Hash: 19B1F571E057168FDB06DF7DC88126AF7F1AF9A240F55832AE825B7622E731E8818750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction ID: b33acec4ca9b9b630ed5942770e8f93930535d2135e569113771c24c9fa163fe
                              • Opcode Fuzzy Hash: 4c5941b04db232a910353bca7bbc04f4789ca7b70563a912600c8871805134b4
                              • Instruction Fuzzy Hash: 0CB1F475E197158FDB02DF7DC88126AF7F1BF9A240F54C32AE825B7A22D731A8818750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 955eb4e5b45e9059c91a2217d8ca98cedba0241f59eb2338f613b50f96b08863
                              • Instruction ID: 3c7ac8a8c17c778a672e1f788be24e7e157962cd7aa543071664544c2ed9372f
                              • Opcode Fuzzy Hash: 955eb4e5b45e9059c91a2217d8ca98cedba0241f59eb2338f613b50f96b08863
                              • Instruction Fuzzy Hash: 28C13170C1DFC542E733A73E98032EAE7A4AFEB255F00DB0AEDE835D11DB21A6456241
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 259ccf681b5ac38167ebb6095f75bf86753556ed3a2169d97838b421cc10f66f
                              • Instruction ID: 54b618789bd4e433fd97098e74ed7a4ad403efce30e78bda73e2d4f349f3c660
                              • Opcode Fuzzy Hash: 259ccf681b5ac38167ebb6095f75bf86753556ed3a2169d97838b421cc10f66f
                              • Instruction Fuzzy Hash: B391E5B0A087018BD714CF29C89176AB7E2BFCF314F158A2EE4958B781E735D985C792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: baf52fefd47fc3d40ebfdbf7a0078c9eaf05b0b7d300ee78e329a1046205f74f
                              • Instruction ID: d5632cd744eefa61a0370ceda5986a372f5f8074e9c67a53a8ad4ba2f0a13504
                              • Opcode Fuzzy Hash: baf52fefd47fc3d40ebfdbf7a0078c9eaf05b0b7d300ee78e329a1046205f74f
                              • Instruction Fuzzy Hash: 267138B2D002559FD700DFA9C840AABB7F9EF86348F08C269D4496B711EB31E946C7E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 077f857fc95e9de93b93bf22a7222b223ecf341776a5fbd5a74f7481a976f95e
                              • Instruction ID: c046acf4b1528f71e3a36ee86187bd5f28baa190b78c6430256e83326e630090
                              • Opcode Fuzzy Hash: 077f857fc95e9de93b93bf22a7222b223ecf341776a5fbd5a74f7481a976f95e
                              • Instruction Fuzzy Hash: F5918872E106198F9F08CFEAD8815DEF7F2BF8C314B66816AD419FB204D77469428B94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1d6de02cd48be07d1f573e454a36241c9b05d79b644e644cf0e3b500e3153fa0
                              • Instruction ID: 9ce5cc162347c0733e62e2e2eb82f5996f0dc5ae2d2b58d50369400389bb0cb2
                              • Opcode Fuzzy Hash: 1d6de02cd48be07d1f573e454a36241c9b05d79b644e644cf0e3b500e3153fa0
                              • Instruction Fuzzy Hash: 70617B33F166254BEB259B3DCC513A9B6629FD2354B1AC33ADC74B7795FB3095028280
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f21c5529f0772083689dfc8eb28deda7be2f709c8ca1d821584ff3cf9671a535
                              • Instruction ID: 39d4a6c35f7e849963cc2bf708ab4efaad8f99627c194b41a971455f5c33ba6b
                              • Opcode Fuzzy Hash: f21c5529f0772083689dfc8eb28deda7be2f709c8ca1d821584ff3cf9671a535
                              • Instruction Fuzzy Hash: 2A61D277E155319BE760CF50CC80759B2A6BBC93A4F1F42A9CD2A2B511DA30BA09CBD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 233c2c2f5fd9a8bc013564f3573fe2225f198b6fbc5a8ab793d3bc39748220bd
                              • Instruction ID: d4c9d8f4dedb3ce9eb50793a1060ec83e1d03bf8173c0911f1cc044726401dbb
                              • Opcode Fuzzy Hash: 233c2c2f5fd9a8bc013564f3573fe2225f198b6fbc5a8ab793d3bc39748220bd
                              • Instruction Fuzzy Hash: 9F61C4A6C2EBA14EDB13FA3A8412246D6A85FF75C8B50D70BFC9135672FB21B5C30251
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 79d82159bb36dd1e3c1cfb0150e0b9b67f7906665545f8a60dc56a59dd69099f
                              • Instruction ID: cacc6c1d03fc3fdaf9ad97c1da083c18410baab3116bb0d53fdb2f245f7ad7af
                              • Opcode Fuzzy Hash: 79d82159bb36dd1e3c1cfb0150e0b9b67f7906665545f8a60dc56a59dd69099f
                              • Instruction Fuzzy Hash: CD61A1A5C2EBA14EDB13FA3A841228AD6A85FF75C8B50D70BFC9135672E721B5C30251
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 39a82c9902031ab9e070728771b1a433a7981fe036b6d90ac304dfba823a885a
                              • Instruction ID: 3b945a316cecda10d395ede6f2dad3b86cd278605b87d19b52b092270077482a
                              • Opcode Fuzzy Hash: 39a82c9902031ab9e070728771b1a433a7981fe036b6d90ac304dfba823a885a
                              • Instruction Fuzzy Hash: CD61B0A5C2EBA14EDB13FA3A8412286DAA84FF75C8B50D70BFC9135672E721B5C34251
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4fced3df81500bb054c0549ab584360752711a90ea3159b13b83ac298d089b73
                              • Instruction ID: a8645046cf17a9c1fc932386db9138d9bc8e0f5441fd1833691a203564aaae59
                              • Opcode Fuzzy Hash: 4fced3df81500bb054c0549ab584360752711a90ea3159b13b83ac298d089b73
                              • Instruction Fuzzy Hash: 21515E72F105154B9B48CFA9C8855AFF7F2EF88220719C13AD91AE7351DA74E901CBD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a6630cccdee9cb0ab248aef143c8d64895da61284240ac91d5d7021655b8c5e
                              • Instruction ID: 8cab33edae8105fa45b372e6adfe243935425af6bdf31b722f4bf37e9d6bb02f
                              • Opcode Fuzzy Hash: 0a6630cccdee9cb0ab248aef143c8d64895da61284240ac91d5d7021655b8c5e
                              • Instruction Fuzzy Hash: 81E0E2756017199B87108F4ED840886FBE8EE88660700C42FE99DC7710D2B0A8008B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE1E70E
                              • HeapAlloc.KERNEL32(?,00000000,00000003), ref: 6CE1E728
                              • GetProcessHeap.KERNEL32(00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1E945
                              • HeapAlloc.KERNEL32(?,00000000,0000001E,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1E95F
                              • GetProcessHeap.KERNEL32(?,00000000,0000001E,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1E9C9
                              • HeapAlloc.KERNEL32(?,00000000,0000000C,?,00000000,0000001E,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1E9E3
                              • GetProcessHeap.KERNEL32(?,00000000,0000000C,?,00000000,0000001E,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EA22
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1811A
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE18122
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1812F
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1813D
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1814B
                              • HeapAlloc.KERNEL32(?,00000000,0000000C,?,00000000,0000000C,?,00000000,0000001E,00000001,00000002,?,?,?,?,00000000), ref: 6CE1EA3C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,?,?,00000000,00000003), ref: 6CE1EA8F
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,00000000,00000003), ref: 6CE1EA9E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EB11
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EB31
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EBDB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,`vl,?,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EBEC
                              • CloseHandle.KERNEL32(00000002,?,?,?,?,00000000,00000003), ref: 6CE1EC3F
                              • CloseHandle.KERNEL32(00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EC60
                              • CloseHandle.KERNEL32(?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1EC7E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CloseHandle$Free$AllocProcess
                              • String ID: '$/C[INFO] WOW64 redirection reverted$4l&$NING$] Se$`vl$called `Result::unwrap()` on an `Err` value$elet$fail$hl#$ion $lf d
                              • API String ID: 196451283-3482696771
                              • Opcode ID: 461f7682b4d9841b2ba86463d0e0171de9e58286de4ea4a6473de98fc0fefc43
                              • Instruction ID: 775922758d94ab0a10e9d65ba6ebc1fbbaa5f84016854740aa7a3a5a275f90b8
                              • Opcode Fuzzy Hash: 461f7682b4d9841b2ba86463d0e0171de9e58286de4ea4a6473de98fc0fefc43
                              • Instruction Fuzzy Hash: 24227D70E05658CBEB20CF64CC45B9DBBB2BF05308F248199E519ABB91DB719A84CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA15
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA1A
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA1F
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA24
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA29
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA2E
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA33
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA38
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA3D
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA42
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA47
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA4C
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA51
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA56
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA5B
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA60
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA68
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA6D
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA72
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA77
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA7C
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA81
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA86
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: abort
                              • String ID: P
                              • API String ID: 4206212132-3110715001
                              • Opcode ID: c2a55ef51929a263e95ddff5047f217ce7685313d94bad75d9393927e1646890
                              • Instruction ID: a7b7ac4ab487b17744e77c8be7b6ceccb3cd23f1aeea8c489195b9d170575eb2
                              • Opcode Fuzzy Hash: c2a55ef51929a263e95ddff5047f217ce7685313d94bad75d9393927e1646890
                              • Instruction Fuzzy Hash: 7A3157316887189FD7108F1AE481757B7F5AF8232CF29D95EE5A847B41C33CA449DB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CCEB890: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,89C88904,?,?,?,?,6CCEB740), ref: 6CCEB982
                                • Part of subcall function 6CCEB890: HeapAlloc.KERNEL32(00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,89C88904,?,?), ref: 6CCEB995
                              • GetProcessHeap.KERNEL32 ref: 6CE1EEAC
                              • HeapAlloc.KERNEL32(?,00000000,00000003), ref: 6CE1EEC6
                              • GetProcessHeap.KERNEL32(00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F0D9
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1811A
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE18122
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1812F
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1813D
                                • Part of subcall function 6CE18110: CloseHandle.KERNEL32(?,?,?,00000000,?,?,6CE1F28F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1814B
                              • HeapAlloc.KERNEL32(?,00000000,0000001F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F0F3
                              • GetProcessHeap.KERNEL32(?,00000000,0000001F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F15E
                              • HeapAlloc.KERNEL32(?,00000000,0000000C,?,00000000,0000001F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F178
                              • GetProcessHeap.KERNEL32(?,00000000,0000000C,?,00000000,0000001F,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F1B7
                              • HeapAlloc.KERNEL32(?,00000000,0000000C,?,00000000,0000000C,?,00000000,0000001F,00000001,00000002,?,?,?,?,00000000), ref: 6CE1F1D1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,?,?,00000000,00000003), ref: 6CE1F224
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,00000000,00000003), ref: 6CE1F233
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F2AC
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F363
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F374
                              • CloseHandle.KERNEL32(00000002,?,?,?,?,00000000,00000003), ref: 6CE1F3DC
                              • CloseHandle.KERNEL32(00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F400
                              • CloseHandle.KERNEL32(?,00000001,00000002,?,?,?,?,00000000,00000003), ref: 6CE1F424
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$CloseHandle$AllocFreeProcess
                              • String ID: fai$'$/C[INFO] WOW64 redirection reverted$NING$] Di$`vl$clea$iled$n up$sks
                              • API String ID: 3512142491-1927724501
                              • Opcode ID: 5b40834b4c794835c07a8490f5d45929b48ed852dd0154bf656753ce3229c026
                              • Instruction ID: 3c9143e5fbee67778d78eb3373780f7755ea22eaee55f34eb770f579b6abaeae
                              • Opcode Fuzzy Hash: 5b40834b4c794835c07a8490f5d45929b48ed852dd0154bf656753ce3229c026
                              • Instruction Fuzzy Hash: 590258B0E05258CFEB10CF65C845B9EBBB1BF06308F2441A9D509ABB91D7759A88CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 02f8578d5f82ea87d36092dbb4552799a354716275e5e5ee88c3fe307731728d
                              • Instruction ID: 5ebb73b8770e3fa84fc3ed9a03a82c19a5f2e3860a2ffb994832d04c297ad49b
                              • Opcode Fuzzy Hash: 02f8578d5f82ea87d36092dbb4552799a354716275e5e5ee88c3fe307731728d
                              • Instruction Fuzzy Hash: D9B17871A08346CFD710CF28C48075ABBF1BF86308F29496DE9959B752D379E845CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 12cdc691d45e3f5139acbbf2238407f0870855ef8dd62ab3bf491d16d93a547c
                              • Instruction ID: 0031e08e6bdeb643467858b6f380481b87e5eb1c15d41e2ab028f340dd784870
                              • Opcode Fuzzy Hash: 12cdc691d45e3f5139acbbf2238407f0870855ef8dd62ab3bf491d16d93a547c
                              • Instruction Fuzzy Hash: D941EF719897459FE715CE29C480726BBF0AF8632CF29898DC9954BB42C33DE846CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA1A
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA1F
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA24
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA29
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA2E
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA33
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA38
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA3D
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA42
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA47
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA4C
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA51
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA56
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA5B
                              • abort.MSVCRT(?,?,?,00000001,?,?,6CE2B4B9), ref: 6CE2FA60
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA68
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA6D
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA72
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA77
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA7C
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA81
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA86
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: abort
                              • String ID:
                              • API String ID: 4206212132-0
                              • Opcode ID: 79a4254f61617160ebe845348d87405e2af915e8f6e12b27edd113784e667f5e
                              • Instruction ID: dc402c4cff78bd1051eb06269bbb0868c1fbb0a4486bc17d11940fb40bacfded
                              • Opcode Fuzzy Hash: 79a4254f61617160ebe845348d87405e2af915e8f6e12b27edd113784e667f5e
                              • Instruction Fuzzy Hash: EE2166326887148FD710CF1AE8C07A6B7F1EFC3718F29892ED5A957B40C278A40E9791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetLastError.KERNEL32(00000000), ref: 6CDDA4E6
                              • GetFullPathNameW.KERNEL32(?,00000000,00000002,00000000,00000000), ref: 6CDDA4F5
                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,?,00000000,00000002,00000000,00000000), ref: 6CDDA500
                              • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,?,00000000,00000002,00000000,00000000), ref: 6CDDA515
                              • memcmp.MSVCRT ref: 6CDDA587
                              • HeapFree.KERNEL32(00000000,00000002,?,00000000,00000002,00000000,00000000), ref: 6CDDA5CF
                              • HeapFree.KERNEL32(00000000,?,?,00000000,00000002,00000000,00000000), ref: 6CDDA5EB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$FreeHeap$FullNamePathmemcmp
                              • String ID: SetThreadDescription$kernel32
                              • API String ID: 3874603709-1950310818
                              • Opcode ID: 4ac7e257839a358fe7b4c3b18bbb1bf865918857ccff796a2a3175b74c504e29
                              • Instruction ID: 0e0b4c2c9c8aaf954727f200da8561dfa58b6309a9c7160bc54ce33403560885
                              • Opcode Fuzzy Hash: 4ac7e257839a358fe7b4c3b18bbb1bf865918857ccff796a2a3175b74c504e29
                              • Instruction Fuzzy Hash: D191B7B1E40609DFDF00DFA4C884BAEB7B5EF05348F25812DE819A7B61EB35A905CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0CBA0: GetProcessHeap.KERNEL32 ref: 6CD0CBF7
                                • Part of subcall function 6CD0CBA0: HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD0CC0F
                                • Part of subcall function 6CD0CBA0: GetProcessHeap.KERNEL32 ref: 6CD0CCB1
                                • Part of subcall function 6CCEC4B0: GetProcessHeap.KERNEL32 ref: 6CCEC4D2
                                • Part of subcall function 6CCEC4B0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEC4E1
                                • Part of subcall function 6CCEC4B0: memcpy.MSVCRT ref: 6CCEC506
                                • Part of subcall function 6CCF3DB0: GetProcessHeap.KERNEL32 ref: 6CCF3DDE
                                • Part of subcall function 6CCF3DB0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCF3DED
                                • Part of subcall function 6CD0DDE7: HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                                • Part of subcall function 6CD0DDE7: memcpy.MSVCRT ref: 6CD11E0C
                                • Part of subcall function 6CD0DDE7: memcpy.MSVCRT ref: 6CD11EE7
                              • memcpy.MSVCRT ref: 6CD162BE
                              • memcpy.MSVCRT ref: 6CD162D8
                                • Part of subcall function 6CCE1540: HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CCE155E
                              • memcpy.MSVCRT ref: 6CD16317
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$Alloc$Process
                              • String ID: 0Vl$0el,$PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$del?$ldl$lfl$tdl)
                              • API String ID: 3292045870-3203382375
                              • Opcode ID: 7d13c314be80490e2163b2038c6d2e19a7622c7b78b3f4f3ac59a444c339b3d9
                              • Instruction ID: 4a0ebc29c11f28d5be2d47e76a7c4b8b44312f95f7807008e77102f58804eaa6
                              • Opcode Fuzzy Hash: 7d13c314be80490e2163b2038c6d2e19a7622c7b78b3f4f3ac59a444c339b3d9
                              • Instruction Fuzzy Hash: 6B3212B18093809BE771CF10D885BDFB7E9BB84308F10891DE58C97A60EB75A549CB93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CDEEC32
                              • HeapAlloc.KERNEL32(00000000,00000000,0003A420), ref: 6CDEEC49
                              • memset.MSVCRT ref: 6CDEEC6F
                              • GetProcessHeap.KERNEL32 ref: 6CDEECB7
                              • HeapAlloc.KERNEL32(00000000,00000000,00000009), ref: 6CDEECCB
                              • GetProcessHeap.KERNEL32(00000000,00000000,00000009), ref: 6CDEED88
                              • HeapAlloc.KERNEL32(00000000,00000000,000000A0,00000000,00000000,00000009), ref: 6CDEED9F
                              • GetTickCount64.KERNEL32 ref: 6CDEEE8E
                                • Part of subcall function 6CDEF320: PdhOpenQueryA.PDH(00000000,00000000,00000000), ref: 6CDEF350
                                • Part of subcall function 6CDEF320: HeapAlloc.KERNEL32(00000000,00000000,00000023), ref: 6CDEF408
                                • Part of subcall function 6CDEF320: memcpy.MSVCRT ref: 6CDEF41F
                                • Part of subcall function 6CDEF320: GetProcessHeap.KERNEL32 ref: 6CDEF441
                                • Part of subcall function 6CDEF320: HeapAlloc.KERNEL32(00000000,00000000,00000005), ref: 6CDEF455
                              • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 6CDEF042
                              • GetPerformanceInfo.PSAPI(?,00000038), ref: 6CDEF093
                              • GetDiskFreeSpaceExW.KERNEL32(?,00000000,00000000,00000000), ref: 6CDEF22B
                              Strings
                              • cannot access a Thread Local Storage value during or after destruction/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\local.rs, xrefs: 6CDEF282, 6CDEF2A2
                              • l CP, xrefs: 6CDEECDC
                              • @, xrefs: 6CDEF035
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Count64DiskFreeGlobalInfoMemoryOpenPerformanceQuerySpaceStatusTickmemcpymemset
                              • String ID: @$cannot access a Thread Local Storage value during or after destruction/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\local.rs$l CP
                              • API String ID: 1153887567-1979277503
                              • Opcode ID: 29c6eae18fb49165083698d1efe72caeda3d1392b227e9505a74e09e586b97b8
                              • Instruction ID: b948060ffb58de6be40a9d341e59d292e200208d1f10cbb048d4c9f0c5ce2a2c
                              • Opcode Fuzzy Hash: 29c6eae18fb49165083698d1efe72caeda3d1392b227e9505a74e09e586b97b8
                              • Instruction Fuzzy Hash: FC02B4B19047809BE720CF24D8457ABB7F4BF89308F14862DEC989F692EB75D548CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CDFBEDB
                              • AcquireSRWLockExclusive.KERNEL32(?,?), ref: 6CDFBFA0
                              • memmove.MSVCRT ref: 6CDFC023
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CDFC053
                              • AcquireSRWLockExclusive.KERNEL32(?,?), ref: 6CDFC17B
                              • memmove.MSVCRT ref: 6CDFC203
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CDFC233
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CDFC260
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CDFC292
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CDFC2AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveLock$FreeHeapRelease$Acquirememmove
                              • String ID: /{l$called `Result::unwrap()` on an `Err` value
                              • API String ID: 181249939-3149847514
                              • Opcode ID: dc3a9e5cc603e7716bb5b6e739ba98a76f11022fc9a28c1dbc6ecd09346ae04b
                              • Instruction ID: 44232f6cf025fdfca2aef0e1795da377f8331208137a5374f961274118ee52c3
                              • Opcode Fuzzy Hash: dc3a9e5cc603e7716bb5b6e739ba98a76f11022fc9a28c1dbc6ecd09346ae04b
                              • Instruction Fuzzy Hash: DBF1BE706092009FD710EF15C840B5AB7F1FFC6358F26851DE8A85BBA1D731E856CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetComputerNameExW.KERNEL32(00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EA8
                              • GetProcessHeap.KERNEL32(00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EED
                              • HeapAlloc.KERNEL32(00000000,00000008,?,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EFC
                              • GetComputerNameExW.KERNEL32(00000005,00000000,00000000,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21F0E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21F55
                              • GetLastError.KERNEL32 ref: 6CD21FBA
                              Strings
                              • $wl7, xrefs: 6CD21FF9
                              • $vl[, xrefs: 6CD21F9C
                              • $vl[, xrefs: 6CD2201F
                              • $vl[, xrefs: 6CD21FDA
                              • /usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/gethostname-0.4.1/src/lib.rs, xrefs: 6CD21F8B, 6CD2200E
                              • ul., xrefs: 6CD21F76
                              • GetComputerNameExW failed to read hostname. Please report this issue to <https://github.com/swsnr/gethostname.rs/issues>!, xrefs: 6CD21FEA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$ComputerName$AllocErrorFreeLastProcess
                              • String ID: $vl[$$vl[$$vl[$$wl7$/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/gethostname-0.4.1/src/lib.rs$GetComputerNameExW failed to read hostname. Please report this issue to <https://github.com/swsnr/gethostname.rs/issues>!$ul.
                              • API String ID: 3737649113-4040282568
                              • Opcode ID: 302efadf5c01eac792dfbe46d40dd17f18d9e2519fc090e253e2913c72c100a5
                              • Instruction ID: 498cc5a28a0b72cfb52209fbe5007250531b9beceb5b481179f34fd49e2b73ed
                              • Opcode Fuzzy Hash: 302efadf5c01eac792dfbe46d40dd17f18d9e2519fc090e253e2913c72c100a5
                              • Instruction Fuzzy Hash: 5841C6B2D002099BDB109FA5DC45BEF76B8EF0531CF148418EA246BB50E77AD908CBA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: strlen
                              • String ID:
                              • API String ID: 39653677-0
                              • Opcode ID: 23ef73d4ed38cc05c123995d761ec6cb7fb47cc20363047ca69d8b527b2939da
                              • Instruction ID: d40901ecbfbbcf94d1065767e5e4411739619367d54d5af1521082e9f9df84ee
                              • Opcode Fuzzy Hash: 23ef73d4ed38cc05c123995d761ec6cb7fb47cc20363047ca69d8b527b2939da
                              • Instruction Fuzzy Hash: 1C4129B06097018FE710DF19C480B2ABBF0FF89718F20892EE599D7B51E779D9448B86
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0A790: HeapFree.KERNEL32(6CF8B0E0,00000000,6CD1260A,?,6CD1260A,?,?), ref: 6CD0A7A8
                                • Part of subcall function 6CD0AAB0: HeapFree.KERNEL32(6CF8B0E0,00000000), ref: 6CD0AAC1
                                • Part of subcall function 6CD09D40: HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,00000000,?,00000000,?,6CD0CD3B), ref: 6CD09D82
                                • Part of subcall function 6CD09D40: HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,00000000,?,00000000,?,6CD0CD3B), ref: 6CD09D9D
                              • GetSystemInfo.KERNEL32(?), ref: 6CD0E0E0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32 ref: 6CDF6B72
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,00000140), ref: 6CDF6B89
                                • Part of subcall function 6CDF6AD0: memcpy.MSVCRT ref: 6CDF6BB0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C78
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,0000004C,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C88
                                • Part of subcall function 6CDF6AD0: GetSystemInfo.KERNEL32(00000000), ref: 6CDF6BDA
                                • Part of subcall function 6CD04790: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD04960
                              • memcmp.MSVCRT ref: 6CD0E349
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0E5A3
                                • Part of subcall function 6CCF34C0: GetProcessHeap.KERNEL32 ref: 6CCF34F5
                                • Part of subcall function 6CCF34C0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCF3508
                                • Part of subcall function 6CCF34C0: memcpy.MSVCRT ref: 6CCF351A
                              • memcpy.MSVCRT ref: 6CD0E7E4
                              • GetProcessHeap.KERNEL32 ref: 6CD0E818
                              • HeapAlloc.KERNEL32(?,00000000,00000010), ref: 6CD0E832
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD0E8A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1181F
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116D2
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD0E25C, 6CD0E344, 6CD0E683
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcess$memcpy$InfoSystem$AcquireExclusiveLockmemcmp
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$called `Result::unwrap()` on an `Err` value
                              • API String ID: 2000797427-293423381
                              • Opcode ID: f1321efd6ab2541f53b425e77d43a6494eb361e320cac88e649b78f3352bb0e7
                              • Instruction ID: 304b980e86464d7fae774fdef1461fc97385d1d5edc20a6f36d3336f3cac6a34
                              • Opcode Fuzzy Hash: f1321efd6ab2541f53b425e77d43a6494eb361e320cac88e649b78f3352bb0e7
                              • Instruction Fuzzy Hash: D82235B1908B809AD770DF24D884BDBB7F4BFC9308F008A1DE48D57661EB71A549CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0AAB0: HeapFree.KERNEL32(6CF8B0E0,00000000), ref: 6CD0AAC1
                                • Part of subcall function 6CD09D40: HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,00000000,?,00000000,?,6CD0CD3B), ref: 6CD09D82
                                • Part of subcall function 6CD09D40: HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,00000000,?,00000000,?,6CD0CD3B), ref: 6CD09D9D
                                • Part of subcall function 6CD0A790: HeapFree.KERNEL32(6CF8B0E0,00000000,6CD1260A,?,6CD1260A,?,?), ref: 6CD0A7A8
                              • GetSystemInfo.KERNEL32(?), ref: 6CD0E0E0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32 ref: 6CDF6B72
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,00000140), ref: 6CDF6B89
                                • Part of subcall function 6CDF6AD0: memcpy.MSVCRT ref: 6CDF6BB0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C78
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,0000004C,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C88
                                • Part of subcall function 6CDF6AD0: GetSystemInfo.KERNEL32(00000000), ref: 6CDF6BDA
                                • Part of subcall function 6CD04790: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD04960
                              • memcmp.MSVCRT ref: 6CD0E349
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0E5A3
                                • Part of subcall function 6CCF34C0: GetProcessHeap.KERNEL32 ref: 6CCF34F5
                                • Part of subcall function 6CCF34C0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCF3508
                                • Part of subcall function 6CCF34C0: memcpy.MSVCRT ref: 6CCF351A
                              • memcpy.MSVCRT ref: 6CD0E7E4
                              • GetProcessHeap.KERNEL32 ref: 6CD0E818
                              • HeapAlloc.KERNEL32(?,00000000,00000010), ref: 6CD0E832
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD0E8A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1181F
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116D2
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD0E25C, 6CD0E344, 6CD0E683
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcess$memcpy$InfoSystem$AcquireExclusiveLockmemcmp
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$called `Result::unwrap()` on an `Err` value
                              • API String ID: 2000797427-293423381
                              • Opcode ID: a85ac432d8b3319355bfdba1e84d9214b75ee7791aafffb7432a41d0ae2dbb3b
                              • Instruction ID: 22b9adc5d04e5c559ab5e61800a4775cf393fba0a55425d4dd92d36e77e2e8e0
                              • Opcode Fuzzy Hash: a85ac432d8b3319355bfdba1e84d9214b75ee7791aafffb7432a41d0ae2dbb3b
                              • Instruction Fuzzy Hash: FC2235B1908B809AD770DF24D884BDBB7F4BFC9308F008A1DE49D57661EB71A549CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0AAB0: HeapFree.KERNEL32(6CF8B0E0,00000000), ref: 6CD0AAC1
                                • Part of subcall function 6CD0A790: HeapFree.KERNEL32(6CF8B0E0,00000000,6CD1260A,?,6CD1260A,?,?), ref: 6CD0A7A8
                              • GetSystemInfo.KERNEL32(?), ref: 6CD0E0E0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32 ref: 6CDF6B72
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,00000140), ref: 6CDF6B89
                                • Part of subcall function 6CDF6AD0: memcpy.MSVCRT ref: 6CDF6BB0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C78
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,0000004C,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C88
                                • Part of subcall function 6CDF6AD0: GetSystemInfo.KERNEL32(00000000), ref: 6CDF6BDA
                                • Part of subcall function 6CD04790: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD04960
                              • memcmp.MSVCRT ref: 6CD0E349
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0E5A3
                                • Part of subcall function 6CCF34C0: GetProcessHeap.KERNEL32 ref: 6CCF34F5
                                • Part of subcall function 6CCF34C0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCF3508
                                • Part of subcall function 6CCF34C0: memcpy.MSVCRT ref: 6CCF351A
                              • memcpy.MSVCRT ref: 6CD0E7E4
                              • GetProcessHeap.KERNEL32 ref: 6CD0E818
                              • HeapAlloc.KERNEL32(?,00000000,00000010), ref: 6CD0E832
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD0E8A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1181F
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116D2
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD0E25C, 6CD0E344, 6CD0E683
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcess$memcpy$InfoSystem$AcquireExclusiveLockmemcmp
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$called `Result::unwrap()` on an `Err` value
                              • API String ID: 2000797427-293423381
                              • Opcode ID: 52e6ccc1e7a75e86f04a90c273b4180529769e516b2e662a42ea0b058d1c36ea
                              • Instruction ID: a257e109fccff010ce682ebcea5192d104a1a57ee75fa0dceb3e294a2955d149
                              • Opcode Fuzzy Hash: 52e6ccc1e7a75e86f04a90c273b4180529769e516b2e662a42ea0b058d1c36ea
                              • Instruction Fuzzy Hash: FA2234B1908B809AD770DF24D884BDBB7F4BFC9308F008A1DE49D57661EB71A549CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD156BC
                                • Part of subcall function 6CD0DDE7: HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                                • Part of subcall function 6CD0DDE7: memcpy.MSVCRT ref: 6CD11E0C
                                • Part of subcall function 6CD0DDE7: memcpy.MSVCRT ref: 6CD11EE7
                                • Part of subcall function 6CCEC4B0: GetProcessHeap.KERNEL32 ref: 6CCEC4D2
                                • Part of subcall function 6CCEC4B0: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEC4E1
                                • Part of subcall function 6CCEC4B0: memcpy.MSVCRT ref: 6CCEC506
                              Strings
                              • failed to spawn thread, xrefs: 6CD15ABD
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD159CE
                              • \al, xrefs: 6CD159EC, 6CD159F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$Alloc$FreeProcess
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$\al$failed to spawn thread
                              • API String ID: 457687450-1300963335
                              • Opcode ID: c0c29b60429ec36e64f741f870fe8198151787fbf1f4b2bbfa70363740871939
                              • Instruction ID: 6086227f6cd13365a27abaecd79d87b4ddf2a453a7d6528f95f215f884397598
                              • Opcode Fuzzy Hash: c0c29b60429ec36e64f741f870fe8198151787fbf1f4b2bbfa70363740871939
                              • Instruction Fuzzy Hash: 62F19EB190C3849BE771DB20E840BDFB7E4AF85309F04491DE58D57AA1EB359608CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B4AB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B4C2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B502
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B51E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B552
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B56E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B5A2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B5BE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD0698D), ref: 6CD0B5F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: c14d39cd9b5d4dac85385e3195ca8e72269c7d4539f3c2ebd6402674b824fe50
                              • Instruction ID: 6cef8fd8d29e9c4ec6624ff6246c94acb048036fbf8b1332f94faa5e2facccbf
                              • Opcode Fuzzy Hash: c14d39cd9b5d4dac85385e3195ca8e72269c7d4539f3c2ebd6402674b824fe50
                              • Instruction Fuzzy Hash: 5D714E71A59650EFEB228F49CC44B65B7B2FB05708F28085CE6612BAF0C772F854CB55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE68B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE6A2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE6E2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE6FE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE732
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE74E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE782
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE79E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE7D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: c14d39cd9b5d4dac85385e3195ca8e72269c7d4539f3c2ebd6402674b824fe50
                              • Instruction ID: 1645af8b30ec27c5980997334be54f7b39e72da4539efea4d3f4bb2e64990d2e
                              • Opcode Fuzzy Hash: c14d39cd9b5d4dac85385e3195ca8e72269c7d4539f3c2ebd6402674b824fe50
                              • Instruction Fuzzy Hash: 15717E36951750DFEB228F4ACC40B65B7B2FB0A748F24085CE5612BAA4E772FC54CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6CCE68AC), ref: 6CCEA5F7
                              • HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,6CCE68AC), ref: 6CCEA60E
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEA644
                              • memcpy.MSVCRT ref: 6CCEA660
                              • GetProcessHeap.KERNEL32 ref: 6CCEA6B0
                              • GetProcessHeap.KERNEL32 ref: 6CCEA733
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCEA74B
                              • memcpy.MSVCRT ref: 6CCEA788
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$memcpy
                              • String ID: Patternsbuckets$by_idordermax_pattern_idtotal_pattern_bytes$kind$minimum_len$}, .. } { .. } }((,
                              • API String ID: 1759892863-961451234
                              • Opcode ID: 255debac491d5bc57269b469e0934a8ab444e1dfbcf881aae4bc392074c10a77
                              • Instruction ID: 73f2a40c297423d3d3dfe449dbafb14ed705a8048202f42d623c450209ba21d2
                              • Opcode Fuzzy Hash: 255debac491d5bc57269b469e0934a8ab444e1dfbcf881aae4bc392074c10a77
                              • Instruction Fuzzy Hash: E1C1CFB5D012199FDB00CF95C841BEEBBB9AF8A708F258159E8047B751F734DA06CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(E850002C,00000000,?,6CD1122A,?,?,00000010), ref: 6CDF6F1E
                              • SleepConditionVariableSRW.KERNEL32(E8500034,00000000,000000FF,00000000,E850002C,00000000,?,6CD1122A,?,?,00000010), ref: 6CDF6F6B
                              • ReleaseSRWLockExclusive.KERNEL32(00000000,E850002C,00000000,?,6CD1122A,?,?,00000010), ref: 6CDF6FA4
                              • GetProcessHeap.KERNEL32 ref: 6CDF7090
                              • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CDF709F
                              • GetProcessHeap.KERNEL32(?,?,00000000,?), ref: 6CDF71FA
                              • HeapAlloc.KERNEL32(00000001,00000000,00000018), ref: 6CDF720E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocExclusiveLockProcess$AcquireConditionReleaseSleepVariable
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 1274049008-2333694755
                              • Opcode ID: dee3dd85047b6088ac2f545ca0c207b50b8572ff45db2539e8f3d55b32f74def
                              • Instruction ID: ca9c3ca89de7238b419eb85d9f68dc70a3f68ed5bcf62b00cddd016ce4790700
                              • Opcode Fuzzy Hash: dee3dd85047b6088ac2f545ca0c207b50b8572ff45db2539e8f3d55b32f74def
                              • Instruction Fuzzy Hash: 4FA1A271E05606EBEB01DF65C800BEEB7B4BF06348F264159E834ABA61EB75D447C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE08872
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CE08885
                              • GetProcessHeap.KERNEL32 ref: 6CE088AD
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CE088C0
                              • memcpy.MSVCRT ref: 6CE088DE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CE089B9
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE089CA
                              • memcpy.MSVCRT ref: 6CE08A71
                              • GetProcessHeap.KERNEL32 ref: 6CE08AAB
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CE08ABE
                              • memcpy.MSVCRT ref: 6CE08ADB
                                • Part of subcall function 6CE00C10: GetProcessHeap.KERNEL32(?,?,?,?,00000001,00000000,?,?,6CE08AF6,?,?), ref: 6CE00C37
                                • Part of subcall function 6CE00C10: HeapAlloc.KERNEL32(6CE08AF6,00000000,BEC35D5B,?,?,?,?,00000001,00000000,?,?,6CE08AF6,?,?), ref: 6CE00C46
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$memcpy$Free
                              • String ID: <unknown>[WARNING] walker:
                              • API String ID: 1446904418-1778361470
                              • Opcode ID: c5c4349a93ebb911a5fe20a0ebb52a63e64380b8f2e6a893874c95c1faa9e6c2
                              • Instruction ID: 0579fe3ca48cb96d497ecd68ad8a964fb544e21aa963c9b9ba3d5fa86ca33fc7
                              • Opcode Fuzzy Hash: c5c4349a93ebb911a5fe20a0ebb52a63e64380b8f2e6a893874c95c1faa9e6c2
                              • Instruction Fuzzy Hash: 93D124B1F013168BDF248F64C8817AEB7B6BF86318F38412AD415A7B94E7309865CBD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • Address %p has no image-section, xrefs: 6CE2F08B
                              • Mingw-w64 runtime failure:, xrefs: 6CE2EF08
                              • VirtualProtect failed with code 0x%x, xrefs: 6CE2F046
                              • VirtualQuery failed for %d bytes at address %p, xrefs: 6CE2F077
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: QueryVirtualabortfwritevfprintf
                              • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                              • API String ID: 2513968241-1534286854
                              • Opcode ID: 7905f68f731f0617d8f076c859c82e68d79624c46874a2876a98d59953b85bd6
                              • Instruction ID: 417b7bf8cd20b7500fbb9ed0635e6b482566b5b9af491c34d5c8ace95552cc1f
                              • Opcode Fuzzy Hash: 7905f68f731f0617d8f076c859c82e68d79624c46874a2876a98d59953b85bd6
                              • Instruction Fuzzy Hash: 155177B1A157118BD710DF28C885B5AFBF0FF85758F65892DE8888B714D338E448CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CDF7090
                              • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CDF709F
                              • memcpy.MSVCRT ref: 6CDF714F
                              • GetProcessHeap.KERNEL32(?,?,00000000,?), ref: 6CDF71FA
                              • HeapAlloc.KERNEL32(00000001,00000000,00000018), ref: 6CDF720E
                              • GetProcessHeap.KERNEL32(00000001,00000000,00000018), ref: 6CDF7301
                              • HeapAlloc.KERNEL32(?,00000000,00000010,00000001,00000000,00000018), ref: 6CDF7315
                              • CloseHandle.KERNEL32(00000001,00000010,00000001,00000000,00000018), ref: 6CDF7352
                              Strings
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CDF7483
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CDF73F8
                              • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 6CDF742C, 6CDF744E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$CloseHandlememcpy
                              • String ID: called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                              • API String ID: 4145315782-3166664570
                              • Opcode ID: d49a13152722b1b485d4de02cb9b04a27a7fea0ba3fe80f1ea1ce3b98817d590
                              • Instruction ID: cb3f766bb6a2e3e7c70f81c5897fc17751c68d32a685d48a6841eadca219711a
                              • Opcode Fuzzy Hash: d49a13152722b1b485d4de02cb9b04a27a7fea0ba3fe80f1ea1ce3b98817d590
                              • Instruction Fuzzy Hash: F9D1C671E01615EBDB01DFA5CC40BEEB7B5BF46308F27411AE824ABB61EB719446C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE1995E
                              • HeapAlloc.KERNEL32(00000004,00000000,AAAAAAAB), ref: 6CE1996D
                              • memcpy.MSVCRT ref: 6CE199E6
                              • memcpy.MSVCRT ref: 6CE19A34
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE19B45
                              Strings
                              • %lH, xrefs: 6CE1992F
                              • %lH, xrefs: 6CE19A69
                              • attempt to join into collection with len > usize::MAX/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\str.rs, xrefs: 6CE19936
                              • assertion failed: mid <= self.len(), xrefs: 6CE19A70
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$AllocFreeProcess
                              • String ID: %lH$%lH$assertion failed: mid <= self.len()$attempt to join into collection with len > usize::MAX/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\str.rs
                              • API String ID: 2458105893-629508089
                              • Opcode ID: 26acf668442910e5103eecf00a41d4cafd444a161cb53955e52ba6959926a2a4
                              • Instruction ID: 4b8ddc0b409d393bfe7439ea93c862e4e9749684b2062efb6bfc959fef60d7c2
                              • Opcode Fuzzy Hash: 26acf668442910e5103eecf00a41d4cafd444a161cb53955e52ba6959926a2a4
                              • Instruction Fuzzy Hash: DE810672E042158FDB04DF69C880BAEB7F5FF49318F24462DD925A7B50E731AA18CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6a1a7ebae2a9e5fa865c9dcdda14bca5513c2e55d47b72cef1f34e083e166ceb
                              • Instruction ID: f0445a4ef5974db5cc55d2201a5c4188846372ea167c02e8497a5f05e8a1a725
                              • Opcode Fuzzy Hash: 6a1a7ebae2a9e5fa865c9dcdda14bca5513c2e55d47b72cef1f34e083e166ceb
                              • Instruction Fuzzy Hash: CF114C35A0022C9BDB14DF68C880ADEB7B5AF85358F208558D80967B40DB34AE498BD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemInfo.KERNEL32(?), ref: 6CD0E0E0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32 ref: 6CDF6B72
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,00000140), ref: 6CDF6B89
                                • Part of subcall function 6CDF6AD0: memcpy.MSVCRT ref: 6CDF6BB0
                                • Part of subcall function 6CDF6AD0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C78
                                • Part of subcall function 6CDF6AD0: HeapAlloc.KERNEL32(?,00000000,0000004C,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C88
                                • Part of subcall function 6CDF6AD0: GetSystemInfo.KERNEL32(00000000), ref: 6CDF6BDA
                                • Part of subcall function 6CD04790: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD04960
                              • memcmp.MSVCRT ref: 6CD0E349
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1181F
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116D2
                              • [FATAL] Cannot parse public keysrc/encryptor/source/mod.rs, xrefs: 6CD11A36
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD0E25C, 6CD0E344, 6CD0E683, 6CD0E6C8, 6CD117F9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeInfoProcessSystem$memcmpmemcpy
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$[FATAL] Cannot parse public keysrc/encryptor/source/mod.rs$called `Result::unwrap()` on an `Err` value
                              • API String ID: 4021788263-3028633279
                              • Opcode ID: 16328d7fd6d73a9c624351f7e953cd88a1874f8bbcf9ae027140cf570d882661
                              • Instruction ID: d06089dc4dba737d5c448746e1d91a98e0d877a941fe0c5952a2d8e57403a101
                              • Opcode Fuzzy Hash: 16328d7fd6d73a9c624351f7e953cd88a1874f8bbcf9ae027140cf570d882661
                              • Instruction Fuzzy Hash: 2332007190DBC08AD371DF24D889BABB7E4BFCA309F108A1DE48C56651EB719089CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD0D9A4
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0D9B7
                              • memcpy.MSVCRT ref: 6CD0D9D0
                              • GetProcessHeap.KERNEL32(?,00000000,?), ref: 6CD0D9FF
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0DA18
                              • memcpy.MSVCRT ref: 6CD0DA2F
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,00000000,?), ref: 6CD0DB09
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0DB22
                              • memcpy.MSVCRT ref: 6CD0DB38
                              • GetProcessHeap.KERNEL32(?,00000000,?), ref: 6CD0DB71
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0DB8A
                              • memcpy.MSVCRT ref: 6CD0DBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpy
                              • String ID:
                              • API String ID: 4164033339-0
                              • Opcode ID: 1e848a8cb306139312df9b38ad3952b061b026fd8340cc00c1d0721146dc051a
                              • Instruction ID: d8b3f4b6cc6bf611fe262abd6e2aa5f89a14adaccd6b9892eca3f8bb577c6e4d
                              • Opcode Fuzzy Hash: 1e848a8cb306139312df9b38ad3952b061b026fd8340cc00c1d0721146dc051a
                              • Instruction Fuzzy Hash: E0B14FB5A05B419FD710DF29C840A9BF7F4BF89308F10451DE99997B21EB70E458CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCF34F5
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CCF3508
                              • memcpy.MSVCRT ref: 6CCF351A
                              • GetProcessHeap.KERNEL32 ref: 6CCF353C
                              • HeapAlloc.KERNEL32(?,00000000,00000001), ref: 6CCF3556
                              • GetProcessHeap.KERNEL32(?,00000000,00000001), ref: 6CCF3598
                              • HeapAlloc.KERNEL32(?,00000000,?,?,00000000,00000001), ref: 6CCF35B1
                              • memcpy.MSVCRT ref: 6CCF35C3
                              • memcpy.MSVCRT ref: 6CCF35F2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,00000000,00000001), ref: 6CCF361A
                              • memcpy.MSVCRT ref: 6CCF3625
                              • memmove.MSVCRT ref: 6CCF3631
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$AllocProcess$Freememmove
                              • String ID:
                              • API String ID: 3110823636-0
                              • Opcode ID: 01673dff062c786507fd9fbd31aa1f753873c1784f7d2f12cd7cfd53b906e199
                              • Instruction ID: 108a502391cd9fb0e727e45c647cc4449a9d2eeaa6478a4d9cfbc2461e97565c
                              • Opcode Fuzzy Hash: 01673dff062c786507fd9fbd31aa1f753873c1784f7d2f12cd7cfd53b906e199
                              • Instruction Fuzzy Hash: BB51BEB1E01315ABEB409F65DC45BAE7AB8EF06758F180028E8189B741F775D909C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CloseHandle.KERNEL32(FFFFFFFF), ref: 6CD07E77
                              • memmove.MSVCRT ref: 6CD07F20
                              • memmove.MSVCRT ref: 6CD07F5E
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6CD0B20E,00000000,?,?,?,?,6CD0690C), ref: 6CD07FEC
                              • CloseHandle.KERNEL32(FFFFFFFF), ref: 6CD080B7
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD0814C
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD07EA4, 6CD07EAB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandlememmove$AcquireExclusiveLock
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$called `Result::unwrap()` on an `Err` value
                              • API String ID: 1412512203-293423381
                              • Opcode ID: e6f216293f86d162d8aaca0e1c4d74ee679f0e4d0cee4804b52cb7031b5375a5
                              • Instruction ID: 98fcfeed81171308a3e606fabd714229bc4c8e3ec5a39a1afc105c7ef4eb9984
                              • Opcode Fuzzy Hash: e6f216293f86d162d8aaca0e1c4d74ee679f0e4d0cee4804b52cb7031b5375a5
                              • Instruction Fuzzy Hash: 3DD1D271E01219DFDB10CF68CC80BEEB7B5BF45318F25461AD425ABBA1D735A906CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID: capacity overflow
                              • API String ID: 1475443563-2273299319
                              • Opcode ID: 5067d45eaf48e23e5386baaea0b3dd58950d8d01bf2978028edce8374b36f16d
                              • Instruction ID: bb1f8ba2ab08b8d3420a06683db5828fb103f90cbbc82936828be1bdb174dd6f
                              • Opcode Fuzzy Hash: 5067d45eaf48e23e5386baaea0b3dd58950d8d01bf2978028edce8374b36f16d
                              • Instruction Fuzzy Hash: F712A071A08784DFC721CF28C880B9FBBF1BF8A304F14495DE98997661D730A989CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4BE1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4C22
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4C5B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4C7E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4CC2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4CE4
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4CFB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,-00000001,?,6CDE3B6D,?,?,6CDEF2FB), ref: 6CDE4D12
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 7b3429de6a86ece179b2c5e320e92a37361ad1d78f9a09894a4ebaf17a413cb7
                              • Instruction ID: 15630f036efa597d492a8378df74184394db27a5f4b78e462871ea0fb3ffa414
                              • Opcode Fuzzy Hash: 7b3429de6a86ece179b2c5e320e92a37361ad1d78f9a09894a4ebaf17a413cb7
                              • Instruction Fuzzy Hash: C441D632641700DFEB219F95DC40FA6B7B2FB09718F28052DE5651BAB0CB72B858CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD116A1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$Alloc$FreeProcess
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 457687450-2333694755
                              • Opcode ID: efb473adefa41858f4f5c2fb6d1aebe07423e4ec71c07d605ffcc6c12dd5aa89
                              • Instruction ID: 6635693fc9d4406e2eb014adc0191f550b3480988db5b6bf09770783f502d6ad
                              • Opcode Fuzzy Hash: efb473adefa41858f4f5c2fb6d1aebe07423e4ec71c07d605ffcc6c12dd5aa89
                              • Instruction Fuzzy Hash: E891A1716087419BD710DF28D880B9BB7F4BF89304F104A2DE59957B60EB31E958CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CDF6B72
                              • HeapAlloc.KERNEL32(?,00000000,00000140), ref: 6CDF6B89
                              • memcpy.MSVCRT ref: 6CDF6BB0
                              • GetSystemInfo.KERNEL32(00000000), ref: 6CDF6BDA
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C78
                              • HeapAlloc.KERNEL32(?,00000000,0000004C,?,?,?,?,?,?,?,?,?,00000000), ref: 6CDF6C88
                              • AcquireSRWLockExclusive.KERNEL32(?,00000001), ref: 6CDF6D9D
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,00000001), ref: 6CDF6DC3
                              • WakeAllConditionVariable.KERNEL32(?,?,?,00000001), ref: 6CDF6DCC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocExclusiveLockProcess$AcquireConditionInfoReleaseSystemVariableWakememcpy
                              • String ID:
                              • API String ID: 3384573377-0
                              • Opcode ID: c0dc6a836fb70513ecbdf5bc4b8f7e4b3c73156391f39e20f450bc9720af2d78
                              • Instruction ID: 83b9948be54d3db52691f69bd30e85bca61e6e7bab6073ccbd151a3925aa7061
                              • Opcode Fuzzy Hash: c0dc6a836fb70513ecbdf5bc4b8f7e4b3c73156391f39e20f450bc9720af2d78
                              • Instruction Fuzzy Hash: 0181A1705083809BE7109F25C85179FBBF4BF86308F15461CE9A89BB91D7B6944BCBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(-00000001,?,?,6CDF1795,00000000), ref: 6CD477EF
                              • TlsGetValue.KERNEL32(00000000,00000000), ref: 6CD47813
                              • TlsGetValue.KERNEL32(-00000001,00000000,00000000), ref: 6CD4782C
                              • GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 6CD4784C
                              • HeapAlloc.KERNEL32(00000000,00000000,0000000C,00000000,00000000,00000000), ref: 6CD47860
                              • TlsSetValue.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 6CD47884
                              • TlsGetValue.KERNEL32(00000000,00000000,00000000), ref: 6CD478C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Value$Heap$AllocProcess
                              • String ID: ThreadPoolBuildErrorkind$}, .. } { .. } }((,
                              • API String ID: 3559649508-2968193098
                              • Opcode ID: 143c8f2eaf98cf951d077ff978847e3d8e4547d9635b2f9c56ed52c29031a2ae
                              • Instruction ID: 4e55441c8c50c0413aa92589b687b297b6a42761fb62a75c32f9de0c42796c7c
                              • Opcode Fuzzy Hash: 143c8f2eaf98cf951d077ff978847e3d8e4547d9635b2f9c56ed52c29031a2ae
                              • Instruction Fuzzy Hash: 25410771E40304EFEB108FA5D805BA6B7B8EF01358F16C469EA58DBB61D735E504CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0ABD2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0ABED
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,00000000,?,?,?,?,6CD06918), ref: 6CD0AC22
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0AC3E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,00000000,?,?,?,?,6CD06918), ref: 6CD0AC72
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0AC8E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,00000000,?,?,?,?,6CD06918), ref: 6CD0ACC2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0ACDE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0ACF5
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06918), ref: 6CD0AD0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 21316eb126880d6cf7ea766cf628df22d079dc4ca7e3838c8bcc575b17997ad4
                              • Instruction ID: 5e60dd8b5cd20a8845fd98b7e084869016cf134beaccdbce29375556398af24e
                              • Opcode Fuzzy Hash: 21316eb126880d6cf7ea766cf628df22d079dc4ca7e3838c8bcc575b17997ad4
                              • Instruction Fuzzy Hash: 48417079B50600DFEB218F48CC40B65B7B2FB05B08F26085CE9592BBB0C772B854CB55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • Unknown pseudo relocation bit size %d., xrefs: 6CE2F1AC
                              • Unknown pseudo relocation protocol version %d., xrefs: 6CE2F30D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                              • API String ID: 0-395989641
                              • Opcode ID: fa286498655900cc86fef1f7f01b979c2ada432111b81ab18930c0e1c11ce0bf
                              • Instruction ID: daed24f440442c21bbb832d8989a1fe343f14475e1f5e2f80d459e5eda9f6535
                              • Opcode Fuzzy Hash: fa286498655900cc86fef1f7f01b979c2ada432111b81ab18930c0e1c11ce0bf
                              • Instruction Fuzzy Hash: D371F672A052258FCB10DF69C88179AB7B1FF86718F364919D9449BB05D738E80ACB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: capacity overflow
                              • API String ID: 0-2273299319
                              • Opcode ID: ea262fa631ad844a43d548d4265e9aee9e248342119a41625e9b4b43e3a6790c
                              • Instruction ID: 8f25af0213042621a727a1216790244c85cbd443543fa14eba6a178155c1f37d
                              • Opcode Fuzzy Hash: ea262fa631ad844a43d548d4265e9aee9e248342119a41625e9b4b43e3a6790c
                              • Instruction Fuzzy Hash: E6D1BF7190C7818FD310DF28D8807AAB7F1BF9A348F144A1DE8D957AA1EB31E549CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • TOl, xrefs: 6CDDAA49, 6CDDABF4, 6CDDAB6D
                              • use of std::thread::current() is not possible after the thread's local data has been destroyed, xrefs: 6CDDAD6B, 6CDDAD92
                              • assertion failed: state_and_queue.addr() & STATE_MASK == RUNNINGOnce instance has previously been poisoned, xrefs: 6CDDADFF
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CDDADDB
                              • already borrowedlibrary\std\src\io\stdio.rs, xrefs: 6CDDAD55, 6CDDADB4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: TOl$already borrowedlibrary\std\src\io\stdio.rs$assertion failed: state_and_queue.addr() & STATE_MASK == RUNNINGOnce instance has previously been poisoned$called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs$use of std::thread::current() is not possible after the thread's local data has been destroyed
                              • API String ID: 0-258444476
                              • Opcode ID: 49d33bd756e0387bb0d08066562322c655b3534c379cce159217324733cd82b0
                              • Instruction ID: f546ea8d59ec0cdf03b25dcf0d97b607b426c36271c8bdf1eb7d0d750250ea7e
                              • Opcode Fuzzy Hash: 49d33bd756e0387bb0d08066562322c655b3534c379cce159217324733cd82b0
                              • Instruction Fuzzy Hash: 07B14671E01305DBDF11CF64CC40BAEB7B5AF01318F16821AE869ABBA1EB35B545CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD0E92E
                              • GetProcessHeap.KERNEL32(?), ref: 6CD0EC2E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveHeapLockProcessRelease
                              • String ID:
                              • API String ID: 2888651213-0
                              • Opcode ID: babca56f0e261a40a92c2eacf5adf1d411e18e0bf1f4d78bc01d22c792b540ae
                              • Instruction ID: ce4aac55d9f538ae5da491383bf9be1bd4929121caf6c345622b5c1e8539c962
                              • Opcode Fuzzy Hash: babca56f0e261a40a92c2eacf5adf1d411e18e0bf1f4d78bc01d22c792b540ae
                              • Instruction Fuzzy Hash: 36D17C75A09B818BD764CF28D840BABB7F1BF9A304F044A1DE8D95B661DB309845CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD93BC0
                              • HeapAlloc.KERNEL32(?,00000000,6CD9478F), ref: 6CD93BDD
                              • memcpy.MSVCRT ref: 6CD93BF1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,00000000,6CD9478F), ref: 6CD93E9C
                              Strings
                              • , xrefs: 6CD93C16
                              • capacity overflow/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/num-bigint-dig-0.8.1/src/biguint.rscalled `Option::unwrap()` on a `None` value, xrefs: 6CD93EC1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcessmemcpy
                              • String ID: $capacity overflow/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/num-bigint-dig-0.8.1/src/biguint.rscalled `Option::unwrap()` on a `None` value
                              • API String ID: 3455684755-2544271985
                              • Opcode ID: 1d6fadc215dc5ceeecea8ef9c6753702f7ebe89cd8c6eb7672bffc1053c4d6d6
                              • Instruction ID: 035830e3a76a713ffae609e19abd7d81fea7b05e6531473709af3ccc7960b4dc
                              • Opcode Fuzzy Hash: 1d6fadc215dc5ceeecea8ef9c6753702f7ebe89cd8c6eb7672bffc1053c4d6d6
                              • Instruction Fuzzy Hash: 79A1527AD2AB418BDB02CF39C840656B7B1BF97394F148B19FDA827672DB31D8408781
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD10B95
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CD10BB0
                              • memcpy.MSVCRT ref: 6CD10BD0
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD10C06
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                              • memcpy.MSVCRT ref: 6CD11E0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$memcpy$Process
                              • String ID: capacity overflow
                              • API String ID: 1874662144-2273299319
                              • Opcode ID: 55aee6629f2a8c4e2e261d3767ad63c149422f81b1940a05c23cb3d849b91b3a
                              • Instruction ID: 138adb8348d7b7c4463784648a442ca5ed1ea39ca2bbbad3cb66fc0dbedfb5a2
                              • Opcode Fuzzy Hash: 55aee6629f2a8c4e2e261d3767ad63c149422f81b1940a05c23cb3d849b91b3a
                              • Instruction Fuzzy Hash: E981A271A097419FD710DF28D880BAAF7F5BF9A304F104A1DE5A957B60EB30E918CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • assertion failed: d.plus > 0, xrefs: 6CCF58DF
                              • assertion failed: d.mant.checked_add(d.plus).is_some(), xrefs: 6CCF58F5
                              • assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError, xrefs: 6CCF588B
                              • assertion failed: d.minus > 0, xrefs: 6CCF58C9
                              • assertion failed: buf.len() >= MAX_SIG_DIGITS, xrefs: 6CCF5921
                              • assertion failed: d.mant.checked_sub(d.minus).is_some(), xrefs: 6CCF590B
                              • assertion failed: d.mant > 0, xrefs: 6CCF58B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset
                              • String ID: assertion failed: buf.len() >= MAX_SIG_DIGITS$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: noborrowassertion failed: digits < 40assertion failed: other > 0kindEmptyZeroTryFromIntError
                              • API String ID: 2221118986-1451125116
                              • Opcode ID: 16ad41ab60bcab5f4dc82a90973a48582030d64b7f18f9df5a706b17137f2b1d
                              • Instruction ID: e758a44b87bef5ab4dcbbe699b15e6f2875cc17765e7098f9d775a6e2fe6b810
                              • Opcode Fuzzy Hash: 16ad41ab60bcab5f4dc82a90973a48582030d64b7f18f9df5a706b17137f2b1d
                              • Instruction Fuzzy Hash: 082105AAEC011433CB641BA47C42FD5327A4F34309F7768A4B41C75B83F716A21EC652
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA68
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA6D
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA72
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA77
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA7C
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA81
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA86
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: abort
                              • String ID:
                              • API String ID: 4206212132-0
                              • Opcode ID: ba72e32409556c4ed1c1cab19d057941ab8806fa23a806205a7b351341ac673d
                              • Instruction ID: 6c4ceda6b829e9415aed794a22fd8df2cd95de474085cb70ea48dde7161e1c2b
                              • Opcode Fuzzy Hash: ba72e32409556c4ed1c1cab19d057941ab8806fa23a806205a7b351341ac673d
                              • Instruction Fuzzy Hash: 9E21D7323461148FD704DF29D441BA673F6EBC625CB3882BED4588BB59D63AD8078791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE0368A
                              • HeapAlloc.KERNEL32(?,00000000,00000068), ref: 6CE036A4
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000068), ref: 6CE03828
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcess
                              • String ID:
                              • API String ID: 2113670309-0
                              • Opcode ID: f95810c78d51d97236ba55c30e369391055989cf7d94780f4ff0d0c487be1e61
                              • Instruction ID: 10ee05e390e7c6d20cb4d14cd2df2ce5d594f86e41c312e85e1a777d85a07da7
                              • Opcode Fuzzy Hash: f95810c78d51d97236ba55c30e369391055989cf7d94780f4ff0d0c487be1e61
                              • Instruction Fuzzy Hash: CCF17AB5A087419FD700CF25C480A5ABBF1FF8A348F248A1DF9956B761D731E949CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy$Heap$AllocProcess
                              • String ID:
                              • API String ID: 3823808316-0
                              • Opcode ID: 41df82472b149f329869a45dfc7995dda0969bb29db1b55763b5c14eeeef42cf
                              • Instruction ID: 108e80b2d5d364d364b55b23b886b7160762e505756622220927f8bd2248e2e4
                              • Opcode Fuzzy Hash: 41df82472b149f329869a45dfc7995dda0969bb29db1b55763b5c14eeeef42cf
                              • Instruction Fuzzy Hash: AD0209BAD11FAD87CB60CF148C857AAB376BF9F344F1063D9E5182A111DB704AC59B40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD056DB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD056F8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0570F
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD05726
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD05763
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD05779
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD0578B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD0579D
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD057B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 31e9779658dffea3c97a1dda056e9adf9e8c0f55af53ba76c99c27474f7c4e3a
                              • Instruction ID: f2c191f254363a9d90d81c91f7791d28d01ce39f436187ecd67ff445c25aff32
                              • Opcode Fuzzy Hash: 31e9779658dffea3c97a1dda056e9adf9e8c0f55af53ba76c99c27474f7c4e3a
                              • Instruction Fuzzy Hash: 2F317031641200EFEF21AF49CC48BA5B7B6FF45709F24005CE9511BAB0D776A858DB5A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • -----BEGIN -----END /usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/pem-rfc7468-0.6.0/src/grammar.rs, xrefs: 6CD3A99A, 6CD3A9B3, 6CD3AA08
                              • assertion failed: mid <= self.len()/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/base64ct-1.5.1/src/decoder.rs, xrefs: 6CD3ACE1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcmp
                              • String ID: -----BEGIN -----END /usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/pem-rfc7468-0.6.0/src/grammar.rs$assertion failed: mid <= self.len()/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/base64ct-1.5.1/src/decoder.rs
                              • API String ID: 1475443563-1425366842
                              • Opcode ID: aa9945a70addab002e81ec65fe2302746bf0e462b7837de1d3ff33a65e441df4
                              • Instruction ID: b384f72cd5f402661e713f0a2b4f1793da73aa9ecd81e59a6ff4855b988d98ca
                              • Opcode Fuzzy Hash: aa9945a70addab002e81ec65fe2302746bf0e462b7837de1d3ff33a65e441df4
                              • Instruction Fuzzy Hash: 79A18871F083768BDF208FE9C8D47AA77A69B43728F18925AC4AD57AF1E3298444C350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CD10D5F
                              • memcpy.MSVCRT ref: 6CD10D7F
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD10F25
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                              • memcpy.MSVCRT ref: 6CD11E0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocHeap$memcpy
                              • String ID: capacity overflow
                              • API String ID: 1551716280-2273299319
                              • Opcode ID: 4edd7e0d0b0320e66ba100d2220527ea92e7993bd4aedaf623a51c76043a0a04
                              • Instruction ID: 4c9e4ab3ba630865646bb29573455ced49c132e8243f6727ff76fcc97f00fc28
                              • Opcode Fuzzy Hash: 4edd7e0d0b0320e66ba100d2220527ea92e7993bd4aedaf623a51c76043a0a04
                              • Instruction Fuzzy Hash: 48819D71A087419BD700DF28D880B9AF7F4BF9A304F104A1DE5A957B61EB30E959CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6CD0B20E,00000000,?,?,?,?,6CD0690C), ref: 6CD07FEC
                              • CloseHandle.KERNEL32(FFFFFFFF), ref: 6CD080B7
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CD08110
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD08208
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CD08281
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD0814C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveLock$AcquireRelease$CloseHandle
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 3733085602-2333694755
                              • Opcode ID: 15ea9c22b9fc8b9dc6a6eacca73f099b5585eb493f5690014fcd6d9aa2183856
                              • Instruction ID: aa81bf7fa04e6803e91d6aaa4ac095664460147ead62f85a9a2eb5447c65e547
                              • Opcode Fuzzy Hash: 15ea9c22b9fc8b9dc6a6eacca73f099b5585eb493f5690014fcd6d9aa2183856
                              • Instruction Fuzzy Hash: 9B513970B05210DBDB10CF6DCC40BAB77B4AF42328F24061AE5B45BBA2D735E805CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memset
                              • String ID: assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0
                              • API String ID: 2221118986-1838371865
                              • Opcode ID: 29b1c140251d095109629e5c645edc5f0c66391f764271c455cf1602d5a3ac12
                              • Instruction ID: 6e79d57bad27d81113b5cc131c4747a57b59d23f9569aedec00cd7279ac63ae3
                              • Opcode Fuzzy Hash: 29b1c140251d095109629e5c645edc5f0c66391f764271c455cf1602d5a3ac12
                              • Instruction Fuzzy Hash: 8B418CB1F402146BDB58DB24CC51FAE76B96F64300F148199F829B7BC1EA74E90ACB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: strlen
                              • String ID:
                              • API String ID: 39653677-0
                              • Opcode ID: ba6c6a1887b9241dc4b4e0f7c05bf0cda26da1e36844b7535e578f9c321e9d63
                              • Instruction ID: 820632019459d31bd33e08c1fb1cea8be5dd69f53bac36803f19aaebea1ed5a7
                              • Opcode Fuzzy Hash: ba6c6a1887b9241dc4b4e0f7c05bf0cda26da1e36844b7535e578f9c321e9d63
                              • Instruction Fuzzy Hash: BE41F2796443168FD710CE1DC440B56B3F1BF8631CF344A29E9698BB54D338DA0ACB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(00000000), ref: 6CDC4E75
                              • HeapFree.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 6CDC4F1C
                              • HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 6CDC4F2C
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?,00000000), ref: 6CDC4F41
                              Strings
                              • lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs, xrefs: 6CDC4BAE, 6CDC4F88
                              • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 6CDC4B98, 6CDC4F72
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveFreeHeapLock$AcquireRelease
                              • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\remutex.rs
                              • API String ID: 808636619-1937734220
                              • Opcode ID: 71502ba4310dcfc2e5419773af33aa436930acb00ea9c41aa8356f6423393a38
                              • Instruction ID: a72962766d1958b83769516a6b984293ebc5f25db3e89fbdaab37bac5fa19ac9
                              • Opcode Fuzzy Hash: 71502ba4310dcfc2e5419773af33aa436930acb00ea9c41aa8356f6423393a38
                              • Instruction Fuzzy Hash: 244190B1E00505EFDB01DF94C845BAEB7F9BF06308F248599E9186BA21D731E945CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SysAllocString.OLEAUT32(WQL), ref: 6CDEB094
                              • SysAllocString.OLEAUT32(SELECT * FROM MSAcpi_ThermalZoneTemperature), ref: 6CDEB0A0
                              • SysFreeString.OLEAUT32(00000000), ref: 6CDEB0C0
                              • SysFreeString.OLEAUT32(00000000), ref: 6CDEB0C6
                              Strings
                              • SELECT * FROM MSAcpi_ThermalZoneTemperature, xrefs: 6CDEB09B
                              • WQL, xrefs: 6CDEB08F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: String$AllocFree
                              • String ID: SELECT * FROM MSAcpi_ThermalZoneTemperature$WQL
                              • API String ID: 344208780-2989581318
                              • Opcode ID: e30c70cfefc003a510cba7a34f1d4a2bb4dd1f46899496e40998442cd5b393ba
                              • Instruction ID: 7e6471b4c72a574d05d651b981a00a27a4c7fe50f12510f63cda1dbaef1c10b6
                              • Opcode Fuzzy Hash: e30c70cfefc003a510cba7a34f1d4a2bb4dd1f46899496e40998442cd5b393ba
                              • Instruction Fuzzy Hash: A621D1B1900B08DFD724CF64DC81B6BB7B8FF4A318F204A1DE45A5B691C775A945CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?,?), ref: 6CD28DEC
                              • HeapAlloc.KERNEL32(00000000,00000000,?,?), ref: 6CD28E22
                              • GetProcessHeap.KERNEL32(?), ref: 6CD28E66
                              • HeapAlloc.KERNEL32(?,00000000,?,?), ref: 6CD28E84
                              • memcpy.MSVCRT ref: 6CD28EA7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,?), ref: 6CD28EBB
                              • GetProcessHeap.KERNEL32(?), ref: 6CD28EC5
                              • HeapAlloc.KERNEL32(00000000,00000000,?,?), ref: 6CD28EE5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: e1ed04b3049941f6a5f005295e885678d1b01ffc8b9af4b8304afb72ce167dc3
                              • Instruction ID: 632b87302f9d985bdf2fde729a114bd61ddd7e873849428bf1a85b93fdb3010a
                              • Opcode Fuzzy Hash: e1ed04b3049941f6a5f005295e885678d1b01ffc8b9af4b8304afb72ce167dc3
                              • Instruction Fuzzy Hash: 0951A372700701DFEB14DF55CC80B6AB7B6BF55308F24812EEA149BA61EB79D8448750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?), ref: 6CCE5C5C
                              • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CCE5C92
                              • GetProcessHeap.KERNEL32 ref: 6CCE5CD6
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CCE5CF4
                              • memcpy.MSVCRT ref: 6CCE5D17
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000), ref: 6CCE5D2B
                              • GetProcessHeap.KERNEL32 ref: 6CCE5D35
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CCE5D55
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: ab6f0aca4eec7f8c15ec325f6ff9a937789324b2a3dbe604982bd5b6293498eb
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: D541CF71B417029FE700CF6AC9C4B6AB7B6BB8E308F24812ED4158BB50FBB4D9448B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,00000008,00000008,00000001,?,00000001), ref: 6CE19FBC
                              • HeapAlloc.KERNEL32(00000000,00000000,00000008,00000008,00000001,?,00000001), ref: 6CE19FF2
                              • GetProcessHeap.KERNEL32(00000008,00000001,?,00000001), ref: 6CE1A036
                              • HeapAlloc.KERNEL32(?,00000000,?,00000008,00000001,?,00000001), ref: 6CE1A054
                              • memcpy.MSVCRT ref: 6CE1A077
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,00000008,00000001,?,00000001), ref: 6CE1A08B
                              • GetProcessHeap.KERNEL32(00000008,00000001,?,00000001), ref: 6CE1A095
                              • HeapAlloc.KERNEL32(00000000,00000000,?,00000008,00000001,?,00000001), ref: 6CE1A0B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: 496190b2f18f839cca21f9b334c93f7f6cb9237267020977bfc2a775f2e229a8
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: 364180717893029FEB10CF69C880B7AB7B6AB89308F34812DE5158BF51EB75E818D751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?), ref: 6CD22A1C
                              • HeapAlloc.KERNEL32(00000000,00000000,?), ref: 6CD22A52
                              • GetProcessHeap.KERNEL32 ref: 6CD22A96
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CD22AB4
                              • memcpy.MSVCRT ref: 6CD22AD7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000), ref: 6CD22AEB
                              • GetProcessHeap.KERNEL32 ref: 6CD22AF5
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD22B15
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: 8b089df4755fbe46e94347eedcbeab43a61da947296e977277cca4db55e301d8
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: 4141B570765302DFE710CF69C8C8B6A77B6AB8931CF24822DE6148BB65EB78D904C710
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?,?,?), ref: 6CDFFBEC
                              • HeapAlloc.KERNEL32(00000000,00000000,?,?,?), ref: 6CDFFC22
                              • GetProcessHeap.KERNEL32(?,?), ref: 6CDFFC66
                              • HeapAlloc.KERNEL32(?,00000000,?,?,?), ref: 6CDFFC84
                              • memcpy.MSVCRT ref: 6CDFFCA7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,?,?), ref: 6CDFFCBB
                              • GetProcessHeap.KERNEL32(?,?), ref: 6CDFFCC5
                              • HeapAlloc.KERNEL32(00000000,00000000,?,?,?), ref: 6CDFFCE5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: cae3590009e4decb932df8e6dde5afc8e8e9da8af3a1f930baf862ab831118ea
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: DA418E707453429BE700CF69C8C0B6AB7F6FB85348F29812DD9258BB61EB74D806C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,00000008,00000008,?,?,?), ref: 6CD0C5FC
                              • HeapAlloc.KERNEL32(00000000,00000000,00000008,00000008,?,?,?), ref: 6CD0C632
                              • GetProcessHeap.KERNEL32(00000008,?,?,?), ref: 6CD0C676
                              • HeapAlloc.KERNEL32(?,00000000,?,00000008,?,?,?), ref: 6CD0C694
                              • memcpy.MSVCRT ref: 6CD0C6B7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,00000008,?,?,?), ref: 6CD0C6CB
                              • GetProcessHeap.KERNEL32(00000008,?,?,?), ref: 6CD0C6D5
                              • HeapAlloc.KERNEL32(00000000,00000000,?,00000008,?,?,?), ref: 6CD0C6F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: 79b8988fb744ea5da9eb0b979e00c8157be045805548e67ed4877fa3cff534e5
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: D04173B0745302DBE710EFADC880B6A77B6ABC9308F64812DD9158B761EB74E8048762
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,-000000FE,-000000FE,?), ref: 6CD2453C
                              • HeapAlloc.KERNEL32(00000000,00000000,-000000FE,-000000FE,?), ref: 6CD24572
                              • GetProcessHeap.KERNEL32(-000000FE,?), ref: 6CD245B6
                              • HeapAlloc.KERNEL32(?,00000000,?,-000000FE,?), ref: 6CD245D4
                              • memcpy.MSVCRT ref: 6CD245F7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,-000000FE,?), ref: 6CD2460B
                              • GetProcessHeap.KERNEL32(-000000FE,?), ref: 6CD24615
                              • HeapAlloc.KERNEL32(00000000,00000000,?,-000000FE,?), ref: 6CD24635
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: 2ce9253a5105b7b890517991f850636d89bfe913cc930acaf23cb67c071e33f1
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: 2E4176B1745301DFEB14CF69C880FAA77B6AB8530CF24852DDA658B761EB7CD8488750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,00000008,00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE66BC
                              • HeapAlloc.KERNEL32(00000000,00000000,00000008,00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE66F2
                              • GetProcessHeap.KERNEL32(00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE6736
                              • HeapAlloc.KERNEL32(?,00000000,?,00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE6754
                              • memcpy.MSVCRT ref: 6CDE6777
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,00000000,?,00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE678B
                              • GetProcessHeap.KERNEL32(00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE6795
                              • HeapAlloc.KERNEL32(00000000,00000000,?,00000008,6CDEC2B4,?,6CDEC2B4), ref: 6CDE67B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Process$Freememcpy
                              • String ID:
                              • API String ID: 4102440617-0
                              • Opcode ID: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction ID: df236f0bf1e84d2667797599e9c8adb9fce07d01164c24131d8b6cc2c00559b9
                              • Opcode Fuzzy Hash: 99d770f75089fffb0e278910f4bee980386273a3f82251ea31eb23052ebe862d
                              • Instruction Fuzzy Hash: CF418274755309DBE700EF6AC880B5E77B6AF89304F24852DD615CBE61EB74E809C750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD0CBF7
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD0CC0F
                              • GetProcessHeap.KERNEL32 ref: 6CD0CCB1
                              Strings
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CD0CE53
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$Alloc
                              • String ID: assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 651230671-1130412906
                              • Opcode ID: 6fe571576baea11d2491fe22c520cbc0f4a38ea55dbb909576d903cc98dbe597
                              • Instruction ID: 03026c5a473f7012f307d2f6d50c4bcb59c15e9d1a1633ed7e3a5ccdbf0dabf0
                              • Opcode Fuzzy Hash: 6fe571576baea11d2491fe22c520cbc0f4a38ea55dbb909576d903cc98dbe597
                              • Instruction Fuzzy Hash: EB81D2B6A012158BEB149F6DC880BBEB7B5EFC5318F25412DD805AB7A0E7349C05C7B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE25C75
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CE267A2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 3298025750-2333694755
                              • Opcode ID: 386a5dfb80145493eae5aa3875e70a554a58f191471603c64166a394e0626f1c
                              • Instruction ID: 6871e69b08c45974ece276abf692c89128c738f8de451f6f300235ee8a1ddf30
                              • Opcode Fuzzy Hash: 386a5dfb80145493eae5aa3875e70a554a58f191471603c64166a394e0626f1c
                              • Instruction Fuzzy Hash: 5AA127B18097809BE721CF24C445B9BBBF5BF89308F204A1DE5A95B660E7789549CF83
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6CD0E9D8
                              • GetProcessHeap.KERNEL32(?), ref: 6CD0EC2E
                              • HeapAlloc.KERNEL32(?,00000000,?,6CF8B0E0,00000000), ref: 6CD0EC47
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocExclusiveLockProcessRelease
                              • String ID:
                              • API String ID: 2870571564-0
                              • Opcode ID: e664424f3bc88422dc87183c76f3e4e23f45fbaec0e8e66582ba14b7a257c8c3
                              • Instruction ID: 8ae0239cc68eeb57d06d954bbbee486de1bc7f2827c588618f7e3597c783cb56
                              • Opcode Fuzzy Hash: e664424f3bc88422dc87183c76f3e4e23f45fbaec0e8e66582ba14b7a257c8c3
                              • Instruction Fuzzy Hash: ACA17B75A09B80CFD361DF28D840BABB7F4BF9A348F044A1DE8E957661DB30A544CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD01BF4
                              • HeapAlloc.KERNEL32(00000001,00000000,0000040C), ref: 6CD01C0B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess
                              • String ID: `NlI
                              • API String ID: 1617791916-3352512153
                              • Opcode ID: a93a0a2add40e9ddeb5cf50e2cd99f5e20ad67bacd8941b3208d3f846f832855
                              • Instruction ID: 181214223096e511dd18882b22d8ec78b192021e79da0ad9bc5d3d6a5082ebef
                              • Opcode Fuzzy Hash: a93a0a2add40e9ddeb5cf50e2cd99f5e20ad67bacd8941b3208d3f846f832855
                              • Instruction Fuzzy Hash: 0391B171909B84DAD722CF29C8027EBB7F4BF9A348F04461DED985B261EB35C505CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • memcpy.MSVCRT ref: 6CD10AF6
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD10B2E
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD11669
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeapmemcpy
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 673829100-2333694755
                              • Opcode ID: cf65056961b12341e2f75b1d31a0435e9f336f782d8f5a0737a036ba03553689
                              • Instruction ID: 07771925578359b285234ab0bc4d9a42d3d37f4df6d25a84a2b0da1d39161dc0
                              • Opcode Fuzzy Hash: cf65056961b12341e2f75b1d31a0435e9f336f782d8f5a0737a036ba03553689
                              • Instruction Fuzzy Hash: 3881AD716087409BD710DF28D880BABF7F5BF8A304F104A2DE59957B60EB31E959CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateSemaphoreW.KERNEL32 ref: 6CE2EA70
                              • WaitForSingleObject.KERNEL32 ref: 6CE2EAB0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateObjectSemaphoreSingleWait
                              • String ID:
                              • API String ID: 1168595426-0
                              • Opcode ID: 69d78f881d925da9f919390377920ed8fb8890a51c1e1a7701b1e43ae0ff8a28
                              • Instruction ID: b1c058da68d4507915038019e122cee85d9c680e46d25a13ce0cee624bcd1b39
                              • Opcode Fuzzy Hash: 69d78f881d925da9f919390377920ed8fb8890a51c1e1a7701b1e43ae0ff8a28
                              • Instruction Fuzzy Hash: F2716A70B05F298BDB549F39C48431677F1BB4771AF248A6AD8698B790D738E805CBC1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD11631
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heapmemcpy$AllocFree
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 1496448200-2333694755
                              • Opcode ID: 5cd95a7f8adf96fc5dfad15af45583fd55cc68918ae6b8be8f5d9aa67b94e626
                              • Instruction ID: a735f0d13573696d53056be17904d753eafb88f2fa5c6465e791205e48664006
                              • Opcode Fuzzy Hash: 5cd95a7f8adf96fc5dfad15af45583fd55cc68918ae6b8be8f5d9aa67b94e626
                              • Instruction Fuzzy Hash: E0716D756087809FD720DF24D880B9BF7F5BF99304F104A2DE4D957A60EB30A959CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetLastError.KERNEL32(00000000), ref: 6CDC2E96
                              • GetLastError.KERNEL32 ref: 6CDC2EAA
                              • GetLastError.KERNEL32 ref: 6CDC2EBB
                              • HeapFree.KERNEL32(00000000,00000002), ref: 6CDC2F3B
                              • GetLastError.KERNEL32 ref: 6CDC2F87
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CDC2FD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$FreeHeap
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 3197834085-2333694755
                              • Opcode ID: c76af5b182c750b4c26070805c1a214ffce7432b4ba0fb48008c7e3259beb6fc
                              • Instruction ID: 69066b35524e08c6961892d5692fda13d04f6548c06185658342ae526da9a11d
                              • Opcode Fuzzy Hash: c76af5b182c750b4c26070805c1a214ffce7432b4ba0fb48008c7e3259beb6fc
                              • Instruction Fuzzy Hash: CA51D9B2E0422C9BDB108F99C8847DEFBF8AF05318F154169E85477751D7799A04CBE2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CDD9F50: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,6CDCF016,?), ref: 6CDD9FA0
                                • Part of subcall function 6CDD9F50: HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,6CDCF016,?), ref: 6CDD9FBB
                                • Part of subcall function 6CDD9F50: HeapFree.KERNEL32(00000000,?), ref: 6CDDA083
                              • MoveFileExW.KERNEL32(?,?,00000001,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?,?,?), ref: 6CDCFB4A
                              • HeapFree.KERNEL32(00000000,?,?,?,00000001,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?), ref: 6CDCFB68
                              • HeapFree.KERNEL32(00000000,?,?,?,00000001,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?), ref: 6CDCFB7A
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?,?,?,00000000), ref: 6CDCFBA5
                              • GetLastError.KERNEL32(?,?,00000001,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?,?,?), ref: 6CDCFBB4
                              • HeapFree.KERNEL32(00000000,?,?,?,00000001,?,?,?,?,?,00000001,00000000,?,6CD1232B,?,?), ref: 6CDCFBD3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocErrorFileLastMoveProcess
                              • String ID:
                              • API String ID: 263320699-0
                              • Opcode ID: a22889fde1d63c1d7db205621a4077a09e8da3e6fdb3f4530828ae2f8ef92f9b
                              • Instruction ID: 8d5dcebae78ba3522a53d2d7895dd0dbfd0454a5eec091dcb19ab248b851a416
                              • Opcode Fuzzy Hash: a22889fde1d63c1d7db205621a4077a09e8da3e6fdb3f4530828ae2f8ef92f9b
                              • Instruction Fuzzy Hash: 91416AB1E0120ADBDF00CF94C851BEEBBB9AF58318F244119E9147B760D771AA44CBE2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE161,?,6CE04D41), ref: 6CDFD85D
                              • FindClose.KERNEL32(?,?,6CDFE161,?,6CE04D41), ref: 6CDFD873
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE161,?,6CE04D41), ref: 6CDFD8C9
                                • Part of subcall function 6CDFECE0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,6CDFD82E,?,6CDFE161,?,6CE04D41), ref: 6CDFED12
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE161,?,6CE04D41), ref: 6CDFD8B2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE161,?,6CE04D41), ref: 6CDFF628
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE161,?,6CE04D41), ref: 6CDFF642
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$CloseFind
                              • String ID:
                              • API String ID: 2995094047-0
                              • Opcode ID: c858b6c2c5c0d51ab458a9ff59c5f23c9afd44c565a7857e7c9ec3f358e0cc0b
                              • Instruction ID: be70c09b7c5f971366fbf87fe48d2e347498fefe43ce372c39de1975d595526d
                              • Opcode Fuzzy Hash: c858b6c2c5c0d51ab458a9ff59c5f23c9afd44c565a7857e7c9ec3f358e0cc0b
                              • Instruction Fuzzy Hash: D431E131640644DFDB219F15C840BA6F7B2FB02319F25452EE5754BAB0CB32A84ACB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6CD0B25F,00000000,?,?,?,?,6CD0690C), ref: 6CD078AC
                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,?,?,6CD0B25F,00000000), ref: 6CD07987
                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,?,?,6CD0B25F,00000000), ref: 6CD07A57
                              • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,6CD0B25F,00000000,?,?,?,?,6CD0690C), ref: 6CD07A94
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD07ACD
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExclusiveHandleLock$AcquireRelease
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 4244960811-2333694755
                              • Opcode ID: 020f8cffb5cdfcbcfe920a21892703240bdb1498d3a04211c77c1f2fe1f17e48
                              • Instruction ID: ac21eddbd6208a232e36a2e7d50306b82f0465d03b97a62f4f44cc1e4293d4db
                              • Opcode Fuzzy Hash: 020f8cffb5cdfcbcfe920a21892703240bdb1498d3a04211c77c1f2fe1f17e48
                              • Instruction Fuzzy Hash: 7B910171E05218EBDB10CF6CCC81BEE77B4AF49328F250618E465AF7A1D774A905CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD93FA1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,6CD94B0A), ref: 6CD93FC2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,?,?,6CF8B0E0,00000000,6CD94B0A), ref: 6CD93FD9
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,00000000,?,?,?), ref: 6CD940FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 576b3be98d7f9a7799f908bcbd1ba8b4c60c09ec22a150fe7ae9df580c4c6b8c
                              • Instruction ID: 129bda9b81411c252c1e7071798c89a3ea083cfb0c3404594869a5f73c6a2361
                              • Opcode Fuzzy Hash: 576b3be98d7f9a7799f908bcbd1ba8b4c60c09ec22a150fe7ae9df580c4c6b8c
                              • Instruction Fuzzy Hash: 1231E175654240EFDB209F48CC44B56B7F2FB06318F28016DF52A0BA71CB32A85CCB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BB5B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BB92
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BBAE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BBE2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BBFE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BC32
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD06999), ref: 6CD0BC4E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: a54a482f26f4ebc381618093ab896d61d991cc91a789536f14d382924260025c
                              • Instruction ID: ae3433d0d339cbb44150596221fc2b11260fda854ec5eeb7eb0e2e897856a53b
                              • Opcode Fuzzy Hash: a54a482f26f4ebc381618093ab896d61d991cc91a789536f14d382924260025c
                              • Instruction Fuzzy Hash: 7E318D72A49614EFEB118F48CC80F65B7B1FB05718F280958E5612BAF4C772E848CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE16F75
                              • GetFileAttributesW.KERNEL32(?), ref: 6CE16F7B
                              • SetFileAttributesW.KERNEL32(?,00000000,?), ref: 6CE16F98
                              • GetLastError.KERNEL32(?), ref: 6CE16FB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AttributesFile$ErrorFreeHeapLast
                              • String ID: $l
                              • API String ID: 3275664389-3142327803
                              • Opcode ID: f39ea0bb7ab8d97c664644da5574ee3c2da5c5aaafb49ef824e5984f097b8028
                              • Instruction ID: 901826d6a07070113ef3d1c1368bf0c3b9944d967ced55099816724fd2036325
                              • Opcode Fuzzy Hash: f39ea0bb7ab8d97c664644da5574ee3c2da5c5aaafb49ef824e5984f097b8028
                              • Instruction Fuzzy Hash: 1431B8B1C002599ECF10CF94D8467DEBBB8FF48218F244569D424B7B50E7359A5ACBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/ahocorasick.rs, xrefs: 6CCE9241
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/ahocorasick.rs
                              • API String ID: 0-3096438005
                              • Opcode ID: 1802bfcb78eea0bb2cb49ce2c45cbcb69456cf3b05685855a6dbecbb4dac0c12
                              • Instruction ID: c0662898ba248a9494f7ba79b3a3d9403f0d1d4b67858051143a95bb6afadb3e
                              • Opcode Fuzzy Hash: 1802bfcb78eea0bb2cb49ce2c45cbcb69456cf3b05685855a6dbecbb4dac0c12
                              • Instruction Fuzzy Hash: B9B13471E453068BEF00CB68CC41BEDB7B6AF5B308F240569D419ABB82F7749949CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CE09C6A
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CE09C79
                              • GetProcessHeap.KERNEL32 ref: 6CE09D01
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CE09D10
                                • Part of subcall function 6CDD1130: HeapFree.KERNEL32(00000000,00000000), ref: 6CDD11F3
                                • Part of subcall function 6CDD1130: HeapFree.KERNEL32(00000000,?), ref: 6CDD1201
                              • memcpy.MSVCRT ref: 6CE09EA6
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE09EFA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcess$memcpy
                              • String ID:
                              • API String ID: 288019571-0
                              • Opcode ID: c490fd9c285bb34c64dd6e48ae79d838bab0faf9c32998279bf9c387cddd5712
                              • Instruction ID: bd6034e57d5549b6931922f4ba68d10e571372a041aeb0adeba735ab77b86e3b
                              • Opcode Fuzzy Hash: c490fd9c285bb34c64dd6e48ae79d838bab0faf9c32998279bf9c387cddd5712
                              • Instruction Fuzzy Hash: C1D19DB5908745AFC700CF25C4816AAFBF5FF8A308F248A5EE89857711D730E955CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • memset.MSVCRT ref: 6CD17928
                                • Part of subcall function 6CD17DC0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD1B00F), ref: 6CD17DCD
                              • GetProcessHeap.KERNEL32 ref: 6CD179D2
                              • HeapAlloc.KERNEL32(00000000,00000000,00000020), ref: 6CD179E6
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,00000000,00000020), ref: 6CD17A58
                              • GetProcessHeap.KERNEL32(?,?,?,00000000,00000020), ref: 6CD17AC8
                              • HeapAlloc.KERNEL32(?,00000000,00000070,?,?,?,00000000,00000020), ref: 6CD17ADC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcess$memset
                              • String ID:
                              • API String ID: 3858697463-0
                              • Opcode ID: d356ee7e4ffc249b0c8e57627634467d4d252873ded850960bddd9e55d87c571
                              • Instruction ID: d07c87d2fd9e2f57272d0ca9961205716dcecda6280a6dd951783e25d85d5f4f
                              • Opcode Fuzzy Hash: d356ee7e4ffc249b0c8e57627634467d4d252873ded850960bddd9e55d87c571
                              • Instruction Fuzzy Hash: CB81F375C24B859AE311CF39C841BA6B7B4BF9B344F104719F9886BA62FB70E184C751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0C580: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD125A1,?), ref: 6CD0C58D
                              • memcpy.MSVCRT ref: 6CD067BC
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0693D
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0696C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD069A5
                                • Part of subcall function 6CE051E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CE051F5
                                • Part of subcall function 6CE051E0: HeapAlloc.KERNEL32(00000000,00000000,00000068), ref: 6CE05209
                                • Part of subcall function 6CE051E0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,00000068), ref: 6CE0544F
                                • Part of subcall function 6CE051E0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,?,?,?,00000068), ref: 6CE0545F
                              Strings
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD067EF, 6CD0686E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcessmemcpy
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs
                              • API String ID: 3951801138-1569620981
                              • Opcode ID: 8a51adb819cb1c60996182899de0c0f19c86861ede4c9b835e1b25177945f0ee
                              • Instruction ID: aa04fc35d7af6d35ac0edfd8474b13bd1dcfc7ef468b89e8e7109abb6cf9223c
                              • Opcode Fuzzy Hash: 8a51adb819cb1c60996182899de0c0f19c86861ede4c9b835e1b25177945f0ee
                              • Instruction Fuzzy Hash: 7F51B4B5A08340DBD7209F54D845BDFB7B4AF84308F14042CD98987BA1EB75A58DCBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,6CDFE758,?,6CE086B6), ref: 6CDFE54F
                                • Part of subcall function 6CDFA730: AcquireSRWLockExclusive.KERNEL32 ref: 6CDFA98C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE758,?,6CE086B6), ref: 6CDFE5C2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CDFE758,?,6CE086B6), ref: 6CDFE612
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,6CDFE758,?,6CE086B6), ref: 6CDFE67B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,6CDFE758,?,6CE086B6), ref: 6CDFE6B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$AcquireExclusiveLock
                              • String ID:
                              • API String ID: 2371024757-0
                              • Opcode ID: 505ce58588b847ad310ae40fd6476994dffe8960974779d20315b2c1bc241b92
                              • Instruction ID: 5a96add4042ecc7749117d2156b4a7ac456205a0ce924f494fcb52d91c84f7bf
                              • Opcode Fuzzy Hash: 505ce58588b847ad310ae40fd6476994dffe8960974779d20315b2c1bc241b92
                              • Instruction Fuzzy Hash: AB518D31501604DBDB22CF14C840BAAB3B1FF01318F6A091DD5BA5BEA1DB32B94ACBD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • memcpy.MSVCRT ref: 6CD0D50A
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0D53F
                              • memcpy.MSVCRT ref: 6CD0D595
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?), ref: 6CD0D5CE
                              Strings
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD0D62A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heapmemcpy$AllocFree
                              • String ID: called `Result::unwrap()` on an `Err` value
                              • API String ID: 1496448200-2333694755
                              • Opcode ID: 7a3e04be13c7e23385341d26c778ee5e084ca9e723c26e085cc860eb3527d97a
                              • Instruction ID: 896a117d88d8d17f96ed22aa6f13c4a2a03aeb8a0e618038b4332ec6cfcdc607
                              • Opcode Fuzzy Hash: 7a3e04be13c7e23385341d26c778ee5e084ca9e723c26e085cc860eb3527d97a
                              • Instruction Fuzzy Hash: E351FAB2F002059BDB10DF5CC884BAE7776AB4632CF25462ED919A77B0E731E805C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Allocmemcpy$Process
                              • String ID:
                              • API String ID: 3580954859-0
                              • Opcode ID: 06b2c0b044f5eecccc3dd8de0c4ccb9b967ab0314dfe0ea3a7ad47692afc7697
                              • Instruction ID: 45f53ce74bbce758a8932bd2094b3150f613c73a8c015eaf3355d46f506b5fa1
                              • Opcode Fuzzy Hash: 06b2c0b044f5eecccc3dd8de0c4ccb9b967ab0314dfe0ea3a7ad47692afc7697
                              • Instruction Fuzzy Hash: 72516D71A08B459BD714DF34D840BABF7F4BF99304F04462DE8AA57660EB30E919CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD21E90: GetComputerNameExW.KERNEL32(00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EA8
                                • Part of subcall function 6CD21E90: GetProcessHeap.KERNEL32(00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EED
                                • Part of subcall function 6CD21E90: HeapAlloc.KERNEL32(00000000,00000008,?,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21EFC
                                • Part of subcall function 6CD21E90: GetComputerNameExW.KERNEL32(00000005,00000000,00000000,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21F0E
                                • Part of subcall function 6CD21E90: HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,00000005,00000000,00000000,?,?,00000000,?), ref: 6CD21F55
                              • GetProcessHeap.KERNEL32 ref: 6CE28163
                              • HeapAlloc.KERNEL32(?,00000000,?), ref: 6CE28174
                              • memcpy.MSVCRT ref: 6CE28196
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE281B8
                              Strings
                              • <unknown>[WARNING] Cannot service compile regex: , xrefs: 6CE281C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocComputerFreeNameProcess$memcpy
                              • String ID: <unknown>[WARNING] Cannot service compile regex:
                              • API String ID: 206058342-518872989
                              • Opcode ID: c57dd0204176bc64d26f62a16bb699e11d09354ec417cb644ca06d273002bd30
                              • Instruction ID: 63c1467368dff478a8dd939169a59098de494d19a153d4e7c981b33ce826280a
                              • Opcode Fuzzy Hash: c57dd0204176bc64d26f62a16bb699e11d09354ec417cb644ca06d273002bd30
                              • Instruction Fuzzy Hash: CB410773E012158BEF248E688C40BBEB7B5BF56318F3C422AD415A7B81EB3498448791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?,?,?,?,00000001,00000000,?,?,6CE08AF6,?,?), ref: 6CE00C37
                              • HeapAlloc.KERNEL32(6CE08AF6,00000000,BEC35D5B,?,?,?,?,00000001,00000000,?,?,6CE08AF6,?,?), ref: 6CE00C46
                              • memcpy.MSVCRT ref: 6CE00C69
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00000001,00000000,?), ref: 6CE00C99
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 6CE00CFE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,6CE08AF6,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 6CE00D17
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcessmemcpy
                              • String ID:
                              • API String ID: 3951801138-0
                              • Opcode ID: 75e8a169c23330a0ceeb62a8a7fdfde314f9bd6da1219f8165f7590f4300ed04
                              • Instruction ID: a912c6ee627c779a43ee136d7fded226e511cb53e568a14531dddc83fecb624b
                              • Opcode Fuzzy Hash: 75e8a169c23330a0ceeb62a8a7fdfde314f9bd6da1219f8165f7590f4300ed04
                              • Instruction Fuzzy Hash: 913166B1E01248AFEB009F95DC85BEE77B8EF0531CF240029E904AB751E775A958CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0A9F0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD06773), ref: 6CD0AA01
                                • Part of subcall function 6CD0AAD0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0AAEE
                                • Part of subcall function 6CD0AAD0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0AB0A
                                • Part of subcall function 6CD0AAD0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0AB21
                                • Part of subcall function 6CD0C580: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD125A1,?), ref: 6CD0C58D
                              • memcpy.MSVCRT ref: 6CD067BC
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0693D
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0696C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD069A5
                                • Part of subcall function 6CE051E0: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CE051F5
                                • Part of subcall function 6CE051E0: HeapAlloc.KERNEL32(00000000,00000000,00000068), ref: 6CE05209
                                • Part of subcall function 6CE051E0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,00000068), ref: 6CE0544F
                                • Part of subcall function 6CE051E0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,?,?,?,00000068), ref: 6CE0545F
                              Strings
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD067EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcessmemcpy
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs
                              • API String ID: 3951801138-1569620981
                              • Opcode ID: 871b7d67b96ea97542d439cd0b09b2b58d6ebc1218db23e532395ae659658bc0
                              • Instruction ID: ad20ed74410ec5e6ec0568737b1855a5c0846df23601e80de1ea0af8d550883f
                              • Opcode Fuzzy Hash: 871b7d67b96ea97542d439cd0b09b2b58d6ebc1218db23e532395ae659658bc0
                              • Instruction Fuzzy Hash: 9C41A171A08240DBD720DF54D845BEFB7B4BF84308F14082CE98947AA1DB75A58DCB93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • assertion failed: !bytes.is_empty()/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/packed/pattern.rs, xrefs: 6CCE8631
                              • assertion failed: self.by_id.len() <= u16::MAX as usize, xrefs: 6CCE863F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpy
                              • String ID: assertion failed: !bytes.is_empty()/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/packed/pattern.rs$assertion failed: self.by_id.len() <= u16::MAX as usize
                              • API String ID: 4164033339-2214136678
                              • Opcode ID: 86ef5e8ba7330024056c63078afaeddc747fb40bd1f0125533f0e2bce98c1859
                              • Instruction ID: 9842dd2c303286a433403ae3484ef5993313a45987c5f0e5c679e992ffd5a2bc
                              • Opcode Fuzzy Hash: 86ef5e8ba7330024056c63078afaeddc747fb40bd1f0125533f0e2bce98c1859
                              • Instruction Fuzzy Hash: 7B31D271A007059BD720DF19D880D9BB7F9EF8A318B20462ED85957B41FB30F948CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/ahocorasick.rs, xrefs: 6CCE8C47
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpymemset
                              • String ID: internal error: entered unreachable code/usr/local/cargo/registry/src/index.crates.io-6f17d22bba15001f/aho-corasick-0.7.18/src/ahocorasick.rs
                              • API String ID: 471586229-3096438005
                              • Opcode ID: 3e542eef404a5903e8bae209c396d09c778b65dea7a00a3186f434e55699a3ce
                              • Instruction ID: f07d09c00165d57c2d24aa48dac5fea8dd47e1b0ced5e939ef3182090351382e
                              • Opcode Fuzzy Hash: 3e542eef404a5903e8bae209c396d09c778b65dea7a00a3186f434e55699a3ce
                              • Instruction Fuzzy Hash: 70314671946F889AD712DF34DC097DBBBB0AF1B304F14055DE89D2B282E7756108C792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: _lock_unlockcalloc
                              • String ID:
                              • API String ID: 3876498383-0
                              • Opcode ID: a15d06f66e0568002a2804e2ffa3ac256ab696c3f8dc9fcffda5940dadc68fb0
                              • Instruction ID: b0a772ff983965e60ddfc5828fcd0f9042620660f30d213a6f9406522531e052
                              • Opcode Fuzzy Hash: a15d06f66e0568002a2804e2ffa3ac256ab696c3f8dc9fcffda5940dadc68fb0
                              • Instruction Fuzzy Hash: E0118E706086618BE7009F78C48575A7BF0EF85315F68C969D4988B788EB78C445CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AcquireExclusiveLockmemmove
                              • String ID: Index out of bounds
                              • API String ID: 3602945785-3064291191
                              • Opcode ID: 110122a1ba352c3d1e2d2c4131cca8363749d1f1f1c4d5e96f6642efc9b7a4f2
                              • Instruction ID: b658d72070efafd561a10278baf70863bca4d41bda993a5ddd9a3159b1f81342
                              • Opcode Fuzzy Hash: 110122a1ba352c3d1e2d2c4131cca8363749d1f1f1c4d5e96f6642efc9b7a4f2
                              • Instruction Fuzzy Hash: E081AF71A01619CBCB14CF54C880BEEB7B5FF45318F664519D829ABBA1D731A90BCBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,6CDCA0F3,00000000,00000000), ref: 6CDD9729
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,6CDCA0F3,00000000,00000000), ref: 6CDD9805
                              Strings
                              • attempt to divide by zero, xrefs: 6CDD97F6
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CDD9827
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFrequencyLastPerformanceQuery
                              • String ID: attempt to divide by zero$called `Result::unwrap()` on an `Err` value
                              • API String ID: 3362413890-3035377958
                              • Opcode ID: d1bb809595d3dca38b4dbf16ff50380c482f39a2197125156340d248ce92899e
                              • Instruction ID: 495f05bd2f7a73391f6a243cc354280caf7a2d5a5b993cbd155df0f3c782b602
                              • Opcode Fuzzy Hash: d1bb809595d3dca38b4dbf16ff50380c482f39a2197125156340d248ce92899e
                              • Instruction Fuzzy Hash: CD31F5B2A003006FDB08DF28CC02BAFB7B99FC5614F15892DF4599B751E77599088792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy$memset
                              • String ID:
                              • API String ID: 438689982-0
                              • Opcode ID: c007157f527a6214d6dad92da9ef8b9fd7dc684178129dddce1eec9f09733d18
                              • Instruction ID: 4f51591915c429d0a8386b5f48f62782d4157d589e5b7c4196aad64c2163eaa8
                              • Opcode Fuzzy Hash: c007157f527a6214d6dad92da9ef8b9fd7dc684178129dddce1eec9f09733d18
                              • Instruction Fuzzy Hash: 57D1A5B1B006249FCF14CF98D880AAEB7B5AF89304F15852DD85EA7B51D731ED09CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD10666
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CD10683
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                              • memcpy.MSVCRT ref: 6CD11E0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Processmemcpy
                              • String ID:
                              • API String ID: 3827299791-0
                              • Opcode ID: ec18459d8610e18c14975c79c5a1cfefa3920a65a3dfaf7bc4c2b466373deaec
                              • Instruction ID: cfb556befd2693b71e115e3bc15b0e0c7b490e1487fa03f78fd1c1dbb063d12b
                              • Opcode Fuzzy Hash: ec18459d8610e18c14975c79c5a1cfefa3920a65a3dfaf7bc4c2b466373deaec
                              • Instruction Fuzzy Hash: 68B1BF7190CB818BD310DF28D88079BF7F1BF9A344F148A2DE8D957661EB31A855CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: memcpy$Heap$AllocProcess
                              • String ID:
                              • API String ID: 3823808316-0
                              • Opcode ID: 9566f1806ef3fe1fd56e75b772bc84103f42df3ba20cca99d00914e990935d73
                              • Instruction ID: 5198a353aa78751ca89e4d943fdb345eedb3ca6858160d2acef661b295756119
                              • Opcode Fuzzy Hash: 9566f1806ef3fe1fd56e75b772bc84103f42df3ba20cca99d00914e990935d73
                              • Instruction Fuzzy Hash: DED126BAD21FAD86DB61CE508C457EAB276BFEF344F1063D9A54829111DF700AC4AB44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD01370: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD013D8
                                • Part of subcall function 6CD01370: memmove.MSVCRT ref: 6CD013FA
                                • Part of subcall function 6CD01370: HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CD0148C
                              • memcpy.MSVCRT ref: 6CD0228C
                              • memcpy.MSVCRT ref: 6CD022BB
                              • GetProcessHeap.KERNEL32 ref: 6CD022DA
                              • HeapAlloc.KERNEL32(00000000,00000000,0000041C), ref: 6CD022ED
                              • memcpy.MSVCRT ref: 6CD02312
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$Free$AllocProcessmemmove
                              • String ID:
                              • API String ID: 2150248107-0
                              • Opcode ID: b1848057e47b209d1537171c1584ba15112d02328d9c58746796fd10f3524179
                              • Instruction ID: 6d57aa194793f200daceade8c8ae6006506179a3450663a23e8f1c51037dbac3
                              • Opcode Fuzzy Hash: b1848057e47b209d1537171c1584ba15112d02328d9c58746796fd10f3524179
                              • Instruction Fuzzy Hash: 20C1257AD20FAD86DB61CF208C857EAB276BFEF344F1063D9A54829111DF704AC4AB44
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?), ref: 6CD0EC2E
                              • HeapAlloc.KERNEL32(?,00000000,?,6CF8B0E0,00000000), ref: 6CD0EC47
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                              • memcpy.MSVCRT ref: 6CD11E0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$Processmemcpy
                              • String ID:
                              • API String ID: 3827299791-0
                              • Opcode ID: 05fe160a082a981b6d99ce0334904add8828a17474ba1fc5ce5be203210d5e7e
                              • Instruction ID: 576a7cf102d2c1338afb5de510cc5934ace0065aa803e6652edb9c4f50094611
                              • Opcode Fuzzy Hash: 05fe160a082a981b6d99ce0334904add8828a17474ba1fc5ce5be203210d5e7e
                              • Instruction Fuzzy Hash: AC918A75A09B808BD361DF28C840BABB7F4BF9A344F004A1DE8ED57621EB30A544CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$AllocFreeProcess
                              • String ID:
                              • API String ID: 2458105893-0
                              • Opcode ID: d1c04aa60a3fca9a03b369a6a91a02e22641e5f2ba6af2b4daa3c8fe75b42c46
                              • Instruction ID: a9edab7de2c3f2d81c356e86538277f6b5e9a951b2249fd4720c907085020227
                              • Opcode Fuzzy Hash: d1c04aa60a3fca9a03b369a6a91a02e22641e5f2ba6af2b4daa3c8fe75b42c46
                              • Instruction Fuzzy Hash: 8B410BB26043509BD7209F5E8890637B7EAEF4F318B24851ED4A947B62F730D4A5C751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD019E0: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD00E7D,?), ref: 6CD019FA
                                • Part of subcall function 6CD01A10: HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,6CD00E88), ref: 6CD01A1D
                              • GetProcessHeap.KERNEL32 ref: 6CD01BF4
                              • HeapAlloc.KERNEL32(00000001,00000000,0000040C), ref: 6CD01C0B
                              • GetProcessHeap.KERNEL32 ref: 6CD01DBB
                              • HeapAlloc.KERNEL32(?,00000000,00000180), ref: 6CD01DCE
                              • memcpy.MSVCRT ref: 6CD01DF0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcess$memcpy
                              • String ID:
                              • API String ID: 2967287086-0
                              • Opcode ID: 484a067e07bb16a19980e7dec34aaa7c4c7ea27b46607eb79f376f99601a9657
                              • Instruction ID: 651c144005f758d6e6ec9fe1428ff4c2d980862393f08b74fce336adc3f2bae2
                              • Opcode Fuzzy Hash: 484a067e07bb16a19980e7dec34aaa7c4c7ea27b46607eb79f376f99601a9657
                              • Instruction Fuzzy Hash: CC514C7190DBC48AE732CF2988027DBB7F4BF9A348F049A1DEDC85A161DB358546CB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CD01BF4
                              • HeapAlloc.KERNEL32(00000001,00000000,0000040C), ref: 6CD01C0B
                              • GetProcessHeap.KERNEL32 ref: 6CD01DBB
                              • HeapAlloc.KERNEL32(?,00000000,00000180), ref: 6CD01DCE
                              • memcpy.MSVCRT ref: 6CD01DF0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcess$memcpy
                              • String ID:
                              • API String ID: 1759892863-0
                              • Opcode ID: 5a0f3cef646120f7f47b206e9e9be1f652b4c4811b43ef510c726c7f9b663578
                              • Instruction ID: 1eb4ebdb80d99e4c8655de7d83ca9b614a55203fcac0391e855be514e440ff0a
                              • Opcode Fuzzy Hash: 5a0f3cef646120f7f47b206e9e9be1f652b4c4811b43ef510c726c7f9b663578
                              • Instruction Fuzzy Hash: FB51E87080DFC49AE732CF2988027DBB3F4BF9A389F005A1DEDD85A161DB7585469B42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$memcpy$AllocFreeProcess
                              • String ID:
                              • API String ID: 2458105893-0
                              • Opcode ID: 458aaa2c8fee914a166d070e774e7a85fddf8fca395c34f1eb98d8700c256edb
                              • Instruction ID: 53ec7e1b1f6c6f42434369481b4b8d2027dbc8c1507c40f7b7b279c221b2c028
                              • Opcode Fuzzy Hash: 458aaa2c8fee914a166d070e774e7a85fddf8fca395c34f1eb98d8700c256edb
                              • Instruction Fuzzy Hash: 4F31F3B2D01215AFEB009F55CC40ABFBB79EF46708F190029E9186B701F7359915CBE2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,00000000,?,?,6CE186F3,?,00000000,?,?,6CF8B0E0,00000000,?), ref: 6CE19C32
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,0F2E66C3), ref: 6CE19C57
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,006A36FF), ref: 6CE19C9A
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,841F0F66), ref: 6CE19CC6
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,6CE186F3), ref: 6CE19CFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: ce8e253c150aa8fd0582ccb2dc0d289851449328e7355931d1bebc7ce52bcc46
                              • Instruction ID: a3b4b260b584aca74a4449d0a75775d1eb83ebae018b6f85c71a97004bf02fde
                              • Opcode Fuzzy Hash: ce8e253c150aa8fd0582ccb2dc0d289851449328e7355931d1bebc7ce52bcc46
                              • Instruction Fuzzy Hash: 35318E32519600DBDB219B64C840BEAB7F6FB4531CF34092DD1AA17BA0CF317868CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE5672
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE568E
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE56A5
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE56E2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE56FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 5c18e6de6feb670661c2d93bcdad120ec93035b4bfd303b97e9ba5916185b160
                              • Instruction ID: bf7dfa76e73b9e4eed787a68a9ab795da915e9668fced2ec545e159180f4f2f9
                              • Opcode Fuzzy Hash: 5c18e6de6feb670661c2d93bcdad120ec93035b4bfd303b97e9ba5916185b160
                              • Instruction Fuzzy Hash: D7218C36251600EFEB118F05CC44F5177BAFB4A728F284459E9141BBA0E772E954CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(6CF8B0E0,00000000,?,?), ref: 6CCE15F0
                              • GetProcessHeap.KERNEL32 ref: 6CCE1603
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CCE1616
                              • memcpy.MSVCRT ref: 6CCE163A
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE164E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Alloc$FreeProcessmemcpy
                              • String ID:
                              • API String ID: 1403710057-0
                              • Opcode ID: de7f6910c870b61d1208748c13f465fd9c7a7e76e885ccccbc7e669b3199dacf
                              • Instruction ID: 49cec0d154e1babae4073cbabf6a58e4da9f0c30827c643ca7bd9414500e1e6e
                              • Opcode Fuzzy Hash: de7f6910c870b61d1208748c13f465fd9c7a7e76e885ccccbc7e669b3199dacf
                              • Instruction Fuzzy Hash: FA1104716142409FDB109F6ACC84F5AB7BDFB8A308F18052DF81597642EB35E818CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD05983
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD05995
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD059A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD059B8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,?,?,?,6CD05548), ref: 6CD059D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 9aa2defe1d37e75dca8f4dd4ae0825c269a96c9a1b10e9a6fc3dea074c31bd42
                              • Instruction ID: 6f35d861b8f2776f8d9b29c954279bc3ee3c379a9a231cf8501d2c16c2d303a9
                              • Opcode Fuzzy Hash: 9aa2defe1d37e75dca8f4dd4ae0825c269a96c9a1b10e9a6fc3dea074c31bd42
                              • Instruction Fuzzy Hash: D311CE31A41600EFEF124F48DC88B69BB72FF01328F34006DE9601A6B4D772A854CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD09E9A
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD09EB7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD09ED7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD09EF4
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD09F2C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 1233276996128ccdd2045cf8f0b4b011756964a408d0d7eca8c6588bad702564
                              • Instruction ID: fb8fca81fdb8265e015ed5ccfd5595f70b852c968d3b5f1590595f06cb3ca0b4
                              • Opcode Fuzzy Hash: 1233276996128ccdd2045cf8f0b4b011756964a408d0d7eca8c6588bad702564
                              • Instruction Fuzzy Hash: A8114C31351542FFDB159F6ACC44BA4B7B2FF41309F240119E2280B9B0CB75B868CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs, xrefs: 6CD07EA4, 6CD07EAB
                              • cannot access a Thread Local Storage value during or after destruction/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\local.rs, xrefs: 6CD07D24
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandlememmove
                              • String ID: PUBLIC KEY0123456789abcdef/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\io\mod.rs$cannot access a Thread Local Storage value during or after destruction/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\std\src\thread\local.rs
                              • API String ID: 3356666258-2951893513
                              • Opcode ID: 9411906ca11e8a161df540edb65dfcf0691b0b0973058b9695a9ba8cdecbd90a
                              • Instruction ID: cf08274887173ca25851e0beb795e80f0a090f90ba138db057c307c977b13fdd
                              • Opcode Fuzzy Hash: 9411906ca11e8a161df540edb65dfcf0691b0b0973058b9695a9ba8cdecbd90a
                              • Instruction Fuzzy Hash: 12919F71E0161AEFCB10CF58C880BAEB7B4FF48318F224569D825AB761D731E945CBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,?,?), ref: 6CDDAF87
                              Strings
                              • TOl, xrefs: 6CDDAEC3, 6CDDB043
                              • assertion failed: len as usize >= mem::size_of::<c::sockaddr_in>(), xrefs: 6CDDB155
                              • called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs, xrefs: 6CDDAFB0
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle
                              • String ID: TOl$assertion failed: len as usize >= mem::size_of::<c::sockaddr_in>()$called `Option::unwrap()` on a `None` value/rustc/473f916d836cc662c5bdbb0d40af9fb4678fab9e\library\alloc\src\collections\btree\navigate.rs
                              • API String ID: 2962429428-2307415883
                              • Opcode ID: cfe1e62777d6a9d4f6cd2ee4dcd26efbc2bbfcba5c0c20a57a89dd494ca2f169
                              • Instruction ID: 8169745e6b33a218b8111ed12357cc163f75920f5cdb63d974aba49fc8c4bfd2
                              • Opcode Fuzzy Hash: cfe1e62777d6a9d4f6cd2ee4dcd26efbc2bbfcba5c0c20a57a89dd494ca2f169
                              • Instruction Fuzzy Hash: A481F0B1D00218DBCB14CF59C881BAEB7F4FF49318F25815AE9286B7A1D335E901CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CCEE4F0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCEE508
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?), ref: 6CCF3F1E
                              • HeapAlloc.KERNEL32(?,00000000), ref: 6CCF3F35
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CCF3FE0
                              Strings
                              • assertion failed: edelta >= 0library\core\src\num\diy_float.rs, xrefs: 6CCF4246
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$AllocFree
                              • String ID: assertion failed: edelta >= 0library\core\src\num\diy_float.rs
                              • API String ID: 756756679-1130412906
                              • Opcode ID: 4622ac3edd4cff11027e0c734d3f7563c3f635453aa40526bbf738eab867cfed
                              • Instruction ID: 6f1fe2e7373b6968a31047f23cd651ac9dcebb28e2a6a51d5fc735c3f9e89dec
                              • Opcode Fuzzy Hash: 4622ac3edd4cff11027e0c734d3f7563c3f635453aa40526bbf738eab867cfed
                              • Instruction Fuzzy Hash: EB515476A002168FEB14CF29C841BBAB7B5AF84308F148179ED289B781F734ED06C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CE2D030: strlen.MSVCRT ref: 6CE2D03D
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA7C
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA81
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA86
                              • abort.MSVCRT(?,?,?,?,?,E589550B,6CE2D0F4), ref: 6CE2FA8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: abort$strlen
                              • String ID:
                              • API String ID: 2656325428-0
                              • Opcode ID: 24a2893d99caaf6fb5bad906a0040e59e762907fa504e6da9d3ab7df7584aaca
                              • Instruction ID: dae2e4a6b4c340075de16ed89c0563613898505460cb5abc2f2bd2e5b796763b
                              • Opcode Fuzzy Hash: 24a2893d99caaf6fb5bad906a0040e59e762907fa504e6da9d3ab7df7584aaca
                              • Instruction Fuzzy Hash: 6F51A1B99093158FD710CF29C0407AAB7F1AF8570CF344A1AE9949BB45D378DA4AC7D2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • file_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF2224
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: file_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-100071840
                              • Opcode ID: e461571f6154bdd909df5736c5efa6dbe4895a96585371454f9c80d151e68ab6
                              • Instruction ID: ab5692fb03393b2900747df85ec20f6bf36f966487a6c961958a440a29f42ed8
                              • Opcode Fuzzy Hash: e461571f6154bdd909df5736c5efa6dbe4895a96585371454f9c80d151e68ab6
                              • Instruction Fuzzy Hash: A0616C349093C18FD3A0CF28C450B9AB7F1BF95748F145A1DE8A997650FB70A989DB42
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • directory_black_listfile_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF2233
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: directory_black_listfile_black_listfile_pattern_black_listprocess_black_listwin_services_black_listaccountsstepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-865618785
                              • Opcode ID: 17f0b9b405df6ad53fb637f71955ef30ce2c883d3c1f7f1484b6572214ab9070
                              • Instruction ID: b2f276a4915b0d7f163031a234545d5f82e95fbeb3ed50a6fad614afde12c673
                              • Opcode Fuzzy Hash: 17f0b9b405df6ad53fb637f71955ef30ce2c883d3c1f7f1484b6572214ab9070
                              • Instruction Fuzzy Hash: 55516D34909381CFD3A0CF14C450B9AB7F1BF85748F24591DE8A99B750E771E98ADB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • called `Option::unwrap()` on a `None` value, xrefs: 6CCEB6C5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemcpy
                              • String ID: called `Option::unwrap()` on a `None` value
                              • API String ID: 4164033339-836832528
                              • Opcode ID: d4b7600a030a240f06a60e914d60626033a04a5db55c0d40d7dd9a52ba207a92
                              • Instruction ID: df913b35de9c3a79b178b1330f0e3cc8841761e846027ccb83afb671889c8f7d
                              • Opcode Fuzzy Hash: d4b7600a030a240f06a60e914d60626033a04a5db55c0d40d7dd9a52ba207a92
                              • Instruction Fuzzy Hash: 0A41E1B69017058BDB089F6688A0BBA77F8AF4A318F28513DD85987B45F730D844CB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              • called `Option::unwrap()` on a `None` value, xrefs: 6CCE672A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcessmemset
                              • String ID: called `Option::unwrap()` on a `None` value
                              • API String ID: 2903515874-836832528
                              • Opcode ID: 016ed8cf54d9f438b08735dc9c5a4a2f813328d449c7ed19f6fb2a5724d5b140
                              • Instruction ID: b777b387fb1473858dad3edfae01d2deee0ecf30dff4931ae19167bfb96cef2a
                              • Opcode Fuzzy Hash: 016ed8cf54d9f438b08735dc9c5a4a2f813328d449c7ed19f6fb2a5724d5b140
                              • Instruction Fuzzy Hash: EA41D471614759AFDB108F25CC81FA57BA9EF4A318F248068EE589B782E771E844C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CD0B0D0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0B0ED
                                • Part of subcall function 6CD0B0D0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0B104
                                • Part of subcall function 6CD0A8A0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0C033
                                • Part of subcall function 6CD0A8A0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0A952
                                • Part of subcall function 6CD0A8A0: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0A9A7
                                • Part of subcall function 6CD0B440: HeapFree.KERNEL32(6CF8B0E0,00000000), ref: 6CD0B477
                                • Part of subcall function 6CD0D960: GetProcessHeap.KERNEL32 ref: 6CD0D9A4
                                • Part of subcall function 6CD0D960: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0D9B7
                                • Part of subcall function 6CD0D960: memcpy.MSVCRT ref: 6CD0D9D0
                                • Part of subcall function 6CD0D960: GetProcessHeap.KERNEL32(?,00000000,?), ref: 6CD0D9FF
                                • Part of subcall function 6CD0D960: HeapAlloc.KERNEL32(?,00000000,?), ref: 6CD0DA18
                                • Part of subcall function 6CD0D960: memcpy.MSVCRT ref: 6CD0DA2F
                              • HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD11DF5
                              • memcpy.MSVCRT ref: 6CD11E0C
                                • Part of subcall function 6CD0CBA0: GetProcessHeap.KERNEL32 ref: 6CD0CBF7
                                • Part of subcall function 6CD0CBA0: HeapAlloc.KERNEL32(00000000,00000000), ref: 6CD0CC0F
                                • Part of subcall function 6CD0CBA0: GetProcessHeap.KERNEL32 ref: 6CD0CCB1
                              • memcpy.MSVCRT ref: 6CD11EE7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Free$AllocProcessmemcpy
                              • String ID: capacity overflow
                              • API String ID: 3951801138-2273299319
                              • Opcode ID: 14fb982632a8d43c187ffbebf54c23363ca36f0d4ae1c77a44d95bce4c432a90
                              • Instruction ID: 25b76388a8f66b4c807d67a6e7f3b9273f66f9065443f534c50092c74027109a
                              • Opcode Fuzzy Hash: 14fb982632a8d43c187ffbebf54c23363ca36f0d4ae1c77a44d95bce4c432a90
                              • Instruction Fuzzy Hash: 79517D75A08B409BD714DF24D840BEBF7F4BF99304F004A2DE8AD57651EB30A519CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CE20930: HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE209CB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CE20BE0
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE20BEF
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,8B2A74FF), ref: 6CE20C3F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: Rl
                              • API String ID: 3298025750-1566955819
                              • Opcode ID: 3c5a8b1c034fde5f31c8d937a0720663df07481bb8fad3801ece2ec57ee67380
                              • Instruction ID: 590586a9cb8074dc37c0d3ac4130bda15883ed746e0d951f7936c0f56fc9733c
                              • Opcode Fuzzy Hash: 3c5a8b1c034fde5f31c8d937a0720663df07481bb8fad3801ece2ec57ee67380
                              • Instruction Fuzzy Hash: 524146B5E002589FDB10CF88C894BAEBBB1FF49318F248059E919AB790D735AD45CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6CDCF230: GetFileInformationByHandle.KERNEL32(?,?), ref: 6CDCF257
                                • Part of subcall function 6CDCF230: GetFileInformationByHandleEx.KERNEL32(?,00000009,00000000,00000008,?,?), ref: 6CDCF288
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CD1AF03
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD1AF12
                              Strings
                              • 0ql", xrefs: 6CD1AFBA
                              • called `Result::unwrap()` on an `Err` value, xrefs: 6CD1AFD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFreeHandleHeapInformation
                              • String ID: 0ql"$called `Result::unwrap()` on an `Err` value
                              • API String ID: 2833491096-1722008994
                              • Opcode ID: 60527d8f6e2e1f5645cd4fb4e1ea838135d05430f844813ed4bfbfc5b5e6d141
                              • Instruction ID: bd8e7626003e2ecc021d13ecec1240069f8f06b6da13653a16fd4f83eab2956f
                              • Opcode Fuzzy Hash: 60527d8f6e2e1f5645cd4fb4e1ea838135d05430f844813ed4bfbfc5b5e6d141
                              • Instruction Fuzzy Hash: 7D41AF71908B40ABD701CF24D841A6BBBF5FF8A344F108A1CF8994B761DB31D809CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE209CB
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CE20A74
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CE20A85
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: Rl
                              • API String ID: 3298025750-1566955819
                              • Opcode ID: f0f49af6e6cfbce01ff06f3511606e56465e4aa2dcdd30b8d4ffc3b5593f5938
                              • Instruction ID: a89492bbe203569593b6daa00c8c291e2eee36737f0dc945953904160cd3982f
                              • Opcode Fuzzy Hash: f0f49af6e6cfbce01ff06f3511606e56465e4aa2dcdd30b8d4ffc3b5593f5938
                              • Instruction Fuzzy Hash: D64157B1E01249DFEB00CF94D880BDEBBB5FF49308F248019E4156B790D77AA945CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • stepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF2215
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: stepskipfastnpcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-659839540
                              • Opcode ID: 0728d22c230e8e024038a0369915d4afb457d32cf8d9c7538e96f58c8335da39
                              • Instruction ID: 308cc324cfe04b64eb19ee93fd8952557267b9fd08739c995adc993e591970a5
                              • Opcode Fuzzy Hash: 0728d22c230e8e024038a0369915d4afb457d32cf8d9c7538e96f58c8335da39
                              • Instruction Fuzzy Hash: BE418A70509381CFD7A0CF14C450B9ABBE1BF85748F20881DE8A88B750E771A98ADF93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • pcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF2630
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: pcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-3284833337
                              • Opcode ID: 1a583a81deed59e6b4e3e21e72b6b36ebcc9611b1ec7186b84b8a84b0407c610
                              • Instruction ID: bbefd2951d0e8ac030989839e72ec64c2d0791f702de6bdb17d9f159aad0fb99
                              • Opcode Fuzzy Hash: 1a583a81deed59e6b4e3e21e72b6b36ebcc9611b1ec7186b84b8a84b0407c610
                              • Instruction Fuzzy Hash: B0414A70509381CFD7A0CF15C450B9ABBE1BF85B48F20481DE8A99B750E771A94ADF93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C18
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CCF0C44
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCF0CA6
                              Strings
                              • npcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements, xrefs: 6CCF263C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID: npcompany_idnotestruct EncryptorEmbedConfigurationstruct EncryptorEmbedConfiguration with 15 elements
                              • API String ID: 3298025750-2106740068
                              • Opcode ID: 0eb303c5523e05f477c9e0224917c506361eb74e518af65f422755a8f976f6b2
                              • Instruction ID: add778626e54ebe2f1c0fcf48b285ca939c23ced06c5a4cef7d7492d59114006
                              • Opcode Fuzzy Hash: 0eb303c5523e05f477c9e0224917c506361eb74e518af65f422755a8f976f6b2
                              • Instruction Fuzzy Hash: FA414A70509381CFD7A0CF15C450B9ABBE1BF85748F20881DE8A99B750E771A98ADF93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AcquireSRWLockExclusive.KERNEL32(00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6CDC5098
                              • HeapFree.KERNEL32(00000000,00000000,?,?,?,00000008), ref: 6CDC510F
                              • HeapFree.KERNEL32(00000000,?,?,?,?,00000008), ref: 6CDC511D
                              • ReleaseSRWLockExclusive.KERNEL32(00000008), ref: 6CDC512B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExclusiveFreeHeapLock$AcquireRelease
                              • String ID:
                              • API String ID: 808636619-0
                              • Opcode ID: c06a64d59c402eda50007b93236fe234fe05b591164bcbe1560a4aef1c0496af
                              • Instruction ID: 1bcab1bd435b6c2aa861c21e8ca286580aa88fbf4a5549337b161513a570142e
                              • Opcode Fuzzy Hash: c06a64d59c402eda50007b93236fe234fe05b591164bcbe1560a4aef1c0496af
                              • Instruction Fuzzy Hash: 8B31D370702245DFDF008F65CC84BAA77BDAF42318F244169D8658B7A1E735D809EBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SysAllocString.OLEAUT32(root\WMI), ref: 6CDEAFB5
                              • SysFreeString.OLEAUT32(00000000), ref: 6CDEAFDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: String$AllocFree
                              • String ID: root\WMI
                              • API String ID: 344208780-2712063579
                              • Opcode ID: ef2344f31053d1ded439f9088867510a3a28f1240c1eb3eebb5e1c569f2da414
                              • Instruction ID: 4cf2b2766544f1f894a2f6dbe58e4d3b89cb341d7e75e43cf8f230f970d3ecc5
                              • Opcode Fuzzy Hash: ef2344f31053d1ded439f9088867510a3a28f1240c1eb3eebb5e1c569f2da414
                              • Instruction Fuzzy Hash: FE11AFB1900B069FC315CF69D880B67B3F9FF8A314F208A1DE46A5B651DB75B845CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heapmemset$AllocProcess
                              • String ID:
                              • API String ID: 1204105928-0
                              • Opcode ID: 022916ef51c0d97beed55bed5de6201b8d24752f022fb50de3d29ad107e3ca54
                              • Instruction ID: a022febe534d7083d1d45526f6e9a0012acb6a8639294790ec1b41c4e9aad2c8
                              • Opcode Fuzzy Hash: 022916ef51c0d97beed55bed5de6201b8d24752f022fb50de3d29ad107e3ca54
                              • Instruction Fuzzy Hash: D791F275D257429BE7118F3AC841796BBB0BF96384F108B0EF89467A62E371E194CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SwitchToThread.KERNEL32 ref: 6CD06E82
                              • GetProcessHeap.KERNEL32 ref: 6CD06EDA
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06EF7
                              • memset.MSVCRT ref: 6CD06F0E
                              • GetProcessHeap.KERNEL32 ref: 6CD06F8D
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06FAA
                              • memset.MSVCRT ref: 6CD06FC1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,00000000,00000178), ref: 6CD07004
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD07096
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD070F8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD07161
                              • SwitchToThread.KERNEL32 ref: 6CD071C1
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD0748A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$ExclusiveLock$AllocFreeProcessReleaseSwitchThreadmemset$Acquire
                              • String ID:
                              • API String ID: 3437745887-0
                              • Opcode ID: 02dc74ac61772d9f4583b9b8e3735501a17f98d43a70b1b9b50b1ff9b8207725
                              • Instruction ID: 2533c0a7abdf621abb19390e7a26839fa1a6f80507d9fbca9c66c3851de8727b
                              • Opcode Fuzzy Hash: 02dc74ac61772d9f4583b9b8e3735501a17f98d43a70b1b9b50b1ff9b8207725
                              • Instruction Fuzzy Hash: 3151BF75B087019BD714CF2DC44076AB7F5AFC8318F19862DE9A9DB761DB30E8458B82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocHeap$memcpy
                              • String ID:
                              • API String ID: 1551716280-0
                              • Opcode ID: b77ab4d331c2d3b03e1442d5a311eb6aafe0be1e27cf094775b366ea65527a78
                              • Instruction ID: 25c46adf69fde10dcb1e7dfd3c2d7392bda65346aafaea83305965984f94a0ca
                              • Opcode Fuzzy Hash: b77ab4d331c2d3b03e1442d5a311eb6aafe0be1e27cf094775b366ea65527a78
                              • Instruction Fuzzy Hash: A7616B71A08B819FD710DF28D880B9AF7F5BF99304F004A2DE5DD57661EB30A918CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SwitchToThread.KERNEL32 ref: 6CD06E82
                              • GetProcessHeap.KERNEL32 ref: 6CD06EDA
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06EF7
                              • memset.MSVCRT ref: 6CD06F0E
                              • GetProcessHeap.KERNEL32 ref: 6CD06F8D
                              • HeapAlloc.KERNEL32(?,00000000,00000178), ref: 6CD06FAA
                              • memset.MSVCRT ref: 6CD06FC1
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,00000000,00000178), ref: 6CD07004
                              • AcquireSRWLockExclusive.KERNEL32(?), ref: 6CD07096
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD070F8
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD07161
                              • SwitchToThread.KERNEL32 ref: 6CD071C1
                              • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6CD0748A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$ExclusiveLock$AllocFreeProcessReleaseSwitchThreadmemset$Acquire
                              • String ID:
                              • API String ID: 3437745887-0
                              • Opcode ID: 258c3b65b47953ae9517154657e1e958f91878221c0007d3695ad902c789dccc
                              • Instruction ID: 42bb841246d467184afbfe85166b31b514d89cc0c1cee419d4a175f07c172794
                              • Opcode Fuzzy Hash: 258c3b65b47953ae9517154657e1e958f91878221c0007d3695ad902c789dccc
                              • Instruction Fuzzy Hash: F5519D717087019BD714CF2DC48075AB7F5ABC8318F25862DE9A9DB7A1DB70E8418B82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCE8E00
                              • HeapAlloc.KERNEL32(?,00000000,00000002), ref: 6CCE8E14
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE8F74
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcess
                              • String ID:
                              • API String ID: 2113670309-0
                              • Opcode ID: 6baf19000e6cb14fea78b51de45be5fabd7c60711c248c115ac6ac0899cb4a01
                              • Instruction ID: 31686e67aa7eca4658dd0e4c8baac4f9408d2bf2151d20a8da9f4e5fc2bd84f5
                              • Opcode Fuzzy Hash: 6baf19000e6cb14fea78b51de45be5fabd7c60711c248c115ac6ac0899cb4a01
                              • Instruction Fuzzy Hash: 2841F371A453459FDB11CB69C881BEEB7B5AF0F304F18006AD815AB782F735A948CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCE8EB1
                              • HeapAlloc.KERNEL32(?,00000000,00000103), ref: 6CCE8EC8
                              • memcpy.MSVCRT ref: 6CCE8EE4
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE8F74
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcessmemcpy
                              • String ID:
                              • API String ID: 3455684755-0
                              • Opcode ID: 1de95416180626f3c1d024d3dcfdc5f3f1918f4156fddcbab63e69c8bda8c3e6
                              • Instruction ID: b92924feb7b9d5a57e82b01dc9fe584892d6e144bef09483d548d76daad28200
                              • Opcode Fuzzy Hash: 1de95416180626f3c1d024d3dcfdc5f3f1918f4156fddcbab63e69c8bda8c3e6
                              • Instruction Fuzzy Hash: F6412371E403559FDB018B74DC51BEEBBB4AF0B304F18006AD854AB782F775A948C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32 ref: 6CCE8E49
                              • HeapAlloc.KERNEL32(?,00000000,00000102), ref: 6CCE8E60
                              • memcpy.MSVCRT ref: 6CCE8E7C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CCE8F74
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcessmemcpy
                              • String ID:
                              • API String ID: 3455684755-0
                              • Opcode ID: 34c5aa2d5f98d727796db2cc77a638f47263533d206272e456015626804320b9
                              • Instruction ID: 47088bac4c30b87e4e1f95780f2655d0bee1747b4c1256e9ea480e91eb688166
                              • Opcode Fuzzy Hash: 34c5aa2d5f98d727796db2cc77a638f47263533d206272e456015626804320b9
                              • Instruction Fuzzy Hash: 76310071E403559BEB008B74DC41BEEB7B5AF0B308F18006AD815AB782F775A848C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(?,?,?,?,?,6CE0A479,?,?), ref: 6CDC39F4
                              • HeapAlloc.KERNEL32(?,00000000,?,?,?,?,?,?,6CE0A479,?,?), ref: 6CDC3A06
                              • memcpy.MSVCRT ref: 6CDC3A2E
                              • HeapFree.KERNEL32(00000000,?), ref: 6CDC3A61
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocFreeProcessmemcpy
                              • String ID:
                              • API String ID: 3455684755-0
                              • Opcode ID: e7b71fe99c32277a7829fda1846d432d859190e62b1ecca667232762fab6efb7
                              • Instruction ID: 926313ddec71c347b79ff3291ea0b8dedb8a85498d3bb4087e47e66147b7efeb
                              • Opcode Fuzzy Hash: e7b71fe99c32277a7829fda1846d432d859190e62b1ecca667232762fab6efb7
                              • Instruction Fuzzy Hash: F641C5B1E01205DFDB00CF65C881BEABBB8EF49358F148159D9089B722E375E955CBE1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(/CPowerShell.exe (Get-ADComputer -filter *).name[WARNING] Cannot enumerate domain computers: ,00000002,?,00000000,00000003), ref: 6CDD461F
                              • HeapAlloc.KERNEL32(?,00000000,00000002,/CPowerShell.exe (Get-ADComputer -filter *).name[WARNING] Cannot enumerate domain computers: ,00000002,?,00000000,00000003), ref: 6CDD4631
                              • memcpy.MSVCRT ref: 6CDD4656
                              • CloseHandle.KERNEL32(C35D0CC4,00000000,00000002,6CD06A2E,?,?,/CPowerShell.exe (Get-ADComputer -filter *).name[WARNING] Cannot enumerate domain computers: ,00000002,?,00000000,00000003), ref: 6CDD46F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocCloseHandleProcessmemcpy
                              • String ID:
                              • API String ID: 2850982947-0
                              • Opcode ID: 9ff375d35f4ee44a241f45279aa560257b31b78ff5daa8d5dd4dd85227fb7148
                              • Instruction ID: 6ab7d2458f9eed0d03d6d3b073010a859223c40e4afa85a9952026198c96d0f6
                              • Opcode Fuzzy Hash: 9ff375d35f4ee44a241f45279aa560257b31b78ff5daa8d5dd4dd85227fb7148
                              • Instruction Fuzzy Hash: B831AFB2D006199BDB00DF69CC81ADEB778FF86358F124169ED096B711EB35A904CBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CDFE874
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,6CF8B0E0,00000000,?), ref: 6CDFE8A7
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,00000000,?,6CE08175), ref: 6CDFE8EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: c49d9cdc3108d50ca9f68ba524c30f7e1f2a5a85349fbadd551fba8903edbfe2
                              • Instruction ID: efba0efc59bd3d1f30750940702c35da5dd69a2de24ea4da64f80124026c9632
                              • Opcode Fuzzy Hash: c49d9cdc3108d50ca9f68ba524c30f7e1f2a5a85349fbadd551fba8903edbfe2
                              • Instruction Fuzzy Hash: 6221A632A01209DFDB01EF88C880B79FBB6FB85318F25412DD5255BA71C772A916CBD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD0A564
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?), ref: 6CD0A589
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000), ref: 6CD0A5FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: f21ee67f3ca34cd6d35e63cfc1142f7d174d6c7e440a0f371b542e9c6fc305aa
                              • Instruction ID: 55a5274f05b2d06270925be4f0863162055e2a111e6800023ebeb8ff2dd4ddca
                              • Opcode Fuzzy Hash: f21ee67f3ca34cd6d35e63cfc1142f7d174d6c7e440a0f371b542e9c6fc305aa
                              • Instruction Fuzzy Hash: 1D213672B11104DFDB00CF9CC989B69B7B5FB45318F284169E6199F6B1CB32AD18CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,00000000,?,6CDFF99F), ref: 6CDFD694
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,00000000,?,6CDFF99F), ref: 6CDFD6B9
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,00000000,?,?,?,6CDFF99F,?,?,?,?,?,?,?,?,6CE086C4), ref: 6CDFD72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 28db970a6d66d11656a45e263fd3881f8b7febc24be4dc8f299de0fd1d153d9e
                              • Instruction ID: ea01c56471586d89572992608b4aef768114de24b290cafcdd05c5e93dff384d
                              • Opcode Fuzzy Hash: 28db970a6d66d11656a45e263fd3881f8b7febc24be4dc8f299de0fd1d153d9e
                              • Instruction Fuzzy Hash: EF21AF72A01104DFDB00DF88C984B69B7B5FF45308F294069EA299F7B1CB32AD19CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CE04D41), ref: 6CDFDA4B
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,6CE9D228,?,?,?,?,?,6CE04D41), ref: 6CDFDA68
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,6CE04D41), ref: 6CDFDAB2
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,6CE04D41), ref: 6CDFDACE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: edb186e13498e6856d1b4e8a414c71a2992fb58dc972667fa88b1e2b1338c557
                              • Instruction ID: c12093e744ea5cb3c593e2503a1e98ddf427ded04b2480e95aad2304bb3bea52
                              • Opcode Fuzzy Hash: edb186e13498e6856d1b4e8a414c71a2992fb58dc972667fa88b1e2b1338c557
                              • Instruction Fuzzy Hash: EA219D71605640DFEB11CF41C884B66B7B2FB45B08F25046CE5260BAB0CB32E94ACB69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0AFAC
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,?,?,?,?,?,?,?,6CF8B0E0,00000000), ref: 6CD0AFC3
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?), ref: 6CD0AFDE
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000), ref: 6CD0AFF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: 4649ae08b3bde27d1d2a9de896deaa64e9f19e1b75c056b0b49591294f2db7e9
                              • Instruction ID: 2535e6a89d26c3366a2faf76f3c482b9daa2be2a2e87c33939a3fccc4f3ae5e4
                              • Opcode Fuzzy Hash: 4649ae08b3bde27d1d2a9de896deaa64e9f19e1b75c056b0b49591294f2db7e9
                              • Instruction Fuzzy Hash: A0116DB1754204DFDB119F48C884B597BF2FF06318F2941A9F9194FA75CB329848CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • memmove.MSVCRT ref: 6CDAA064
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,6CDC4224,?,?,?,?,?,?,?,?,00000000), ref: 6CDAA0A7
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,6CDC4224,?,?,?,?,?,?,?,?,00000000), ref: 6CDAA0BC
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,6CDC4224,?,?,?,?,?,?,?,?,00000000), ref: 6CDAA0D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap$memmove
                              • String ID:
                              • API String ID: 2650465384-0
                              • Opcode ID: 5d00327b0598d9bdac7de6b66ebeb50f5f7af45d5702a84df9cf232c0f5ff293
                              • Instruction ID: fbdf24e5babe55cb3c2fbcccbaa2975f0f19c5d3a351d17daa05afe430d99f6a
                              • Opcode Fuzzy Hash: 5d00327b0598d9bdac7de6b66ebeb50f5f7af45d5702a84df9cf232c0f5ff293
                              • Instruction Fuzzy Hash: 5E012631501300ABDB301B55DC01FA277BAEB81709F34893CF55C06A70EB729845CAA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,?,?,?,?,6CDE39A0,00000000,?,6CDEF2DD), ref: 6CDE4E73
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,?,?,?,6CDE39A0,00000000,?,6CDEF2DD), ref: 6CDE4E85
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?,?,?,?,6CDE39A0,00000000), ref: 6CDE4E97
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,6CF8B0E0,00000000,?,?), ref: 6CDE4EA8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: a7a0b4e83cb655fc9744c48ffc63a60c3bac40cea81adfbf272a479beb2a9b70
                              • Instruction ID: 4bd6d9426a865bec38e1150b94d11e025de07dd60425a8c62f18fd241ebfb072
                              • Opcode Fuzzy Hash: a7a0b4e83cb655fc9744c48ffc63a60c3bac40cea81adfbf272a479beb2a9b70
                              • Instruction Fuzzy Hash: 5101F432142211EBEF121B84CC40FA9F773FB89F28F388169F214159B0CBB68464DB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,6CDEF2EF), ref: 6CDE4B58
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,6CDEF2EF), ref: 6CDE4B75
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,6CDEF2EF), ref: 6CDE4B8C
                              • HeapFree.KERNEL32(6CF8B0E0,00000000,?,00000000,?,6CDEF2EF), ref: 6CDE4BA3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1686050545.000000006CCE1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CCE0000, based on PE: true
                              • Associated: 00000000.00000002.1686039815.000000006CCE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686131150.000000006CE3B000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686142666.000000006CE3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686218377.000000006CF8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686228872.000000006CF8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1686239458.000000006CF91000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6cce0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FreeHeap
                              • String ID:
                              • API String ID: 3298025750-0
                              • Opcode ID: ca494dd31be77a2673a5dc86e6e79d448ed699c546b90c69b6ffe71b2475e9fe
                              • Instruction ID: 2d2ac53db1e7b5f665518f663690f2a2fddac8260ff696d4982c5671e7dee04d
                              • Opcode Fuzzy Hash: ca494dd31be77a2673a5dc86e6e79d448ed699c546b90c69b6ffe71b2475e9fe
                              • Instruction Fuzzy Hash: 26016D31651600EBEB61AB81C904B71B7F2FB09708F24452CF6664BDB0CB76A848DB51
                              Uniqueness

                              Uniqueness Score: -1.00%