Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Analysis ID:1447597
MD5:1295db15df2d7db394255d69e08d4b75
SHA1:e5b50acdc09fca94f7e9c0a7fc7e57ade9670607
SHA256:1d679b6434ca87e87c226ff908f19221a09a885d1c0a33f8c868e5d45a440e7f
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe (PID: 6800 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe" MD5: 1295DB15DF2D7DB394255D69E08D4B75)
    • conhost.exe (PID: 5552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeAvira: detected
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeVirustotal: Detection: 47%Perma Link
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe, 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_0a66293d-0
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: Binary string: C:\Users\Datahost\Desktop\Fantastic\x64\Release\Usermode.pdb source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: http://ocsp.thawte.com0
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34008C0: DeviceIoControl,0_2_00007FF7B34008C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33F88400_2_00007FF7B33F8840
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34070A00_2_00007FF7B34070A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33D00B00_2_00007FF7B33D00B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33F23900_2_00007FF7B33F2390
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33F77F00_2_00007FF7B33F77F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33DD8000_2_00007FF7B33DD800
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33DABB00_2_00007FF7B33DABB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33DFBD00_2_00007FF7B33DFBD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33D1A900_2_00007FF7B33D1A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33CA2300_2_00007FF7B33CA230
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33D16500_2_00007FF7B33D1650
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33EBEF00_2_00007FF7B33EBEF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33D61600_2_00007FF7B33D6160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33E0D800_2_00007FF7B33E0D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33C55300_2_00007FF7B33C5530
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33C89400_2_00007FF7B33C8940
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33F6DA00_2_00007FF7B33F6DA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33ECDD00_2_00007FF7B33ECDD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: String function: 00007FF7B3403610 appears 32 times
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe, 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe, 00000000.00000000.1998743552.00007FF7B34AE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeBinary string: \Device\Nal
Source: classification engineClassification label: mal60.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5552:120:WilError_03
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeReversingLabs: Detection: 47%
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeVirustotal: Detection: 47%
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: d3dx9_43.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeSection loaded: wldp.dllJump to behavior
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic file information: File size 1368576 > 1048576
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: Binary string: C:\Users\Datahost\Desktop\Fantastic\x64\Release\Usermode.pdb source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34A9CDC memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7B34A9CDC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34A9CDC memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7B34A9CDC
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B33C5010 GetProcessHeap,_Init_thread_footer,_Init_thread_footer,0_2_00007FF7B33C5010
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34A8F58 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7B34A8F58
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exeCode function: 0_2_00007FF7B34A9AD8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7B34A9AD8
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory3
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe47%ReversingLabsWin64.Trojan.Generic
SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe48%VirustotalBrowse
SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe100%AviraHEUR/AGEN.1317117
SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exefalse
  • URL Reputation: safe
unknown
http://ocsp.thawte.com0SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exefalse
  • URL Reputation: safe
unknown
https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447597
Start date and time:2024-05-26 02:24:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 29s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Detection:MAL
Classification:mal60.winEXE@2/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 47
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe, PID 6800 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.64388099087652
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
File size:1'368'576 bytes
MD5:1295db15df2d7db394255d69e08d4b75
SHA1:e5b50acdc09fca94f7e9c0a7fc7e57ade9670607
SHA256:1d679b6434ca87e87c226ff908f19221a09a885d1c0a33f8c868e5d45a440e7f
SHA512:6f48eb81f7898f8a87ee87cf3a5e07d15b8edc2c2e05735ed5b8774785a8dc5e5d655af416a0999248cc5c555eaa84d05eafe5d7b0523c2c20ed6dd5fbe6dcb6
SSDEEP:24576:faTpb4mknNnXCMZu+3caswaSd/OWYreOCghC2D8vjwiCk6sLvj8PUY0Y3jIqnmJ0:5CSBOWYreOXREwP3A4XIqnmJyDepSjBR
TLSH:46558D1A52AC00E9D1ABA27CD15B5A03F2F57C4903208FEB17F84DB41F676E15ABEB11
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........gZ.G.4IG.4IG.4IN~.IS.4I.s5HA.4I!i.IO.4I.s1Hc.4I.s0HM.4I.s7HC.4I.v0H..4I.}0HE.4I.}1HE.4ISm5Ha.4I.T.ID.4IG.5IC.4I.s=HW.4I.s.IF.4
Icon Hash:00928e8e8686b000
Entrypoint:0x1400f94c8
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x664C9B11 [Tue May 21 13:01:05 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:95621895602803ceecb416d0d9f95395
Instruction
dec eax
sub esp, 28h
call 00007F980491F06Ch
dec eax
add esp, 28h
jmp 00007F980491E8D7h
int3
int3
dec eax
sub esp, 28h
dec ebp
mov eax, dword ptr [ecx+38h]
dec eax
mov ecx, edx
dec ecx
mov edx, ecx
call 00007F980491EA72h
mov eax, 00000001h
dec eax
add esp, 28h
ret
int3
int3
int3
inc eax
push ebx
inc ebp
mov ebx, dword ptr [eax]
dec eax
mov ebx, edx
inc ecx
and ebx, FFFFFFF8h
dec esp
mov ecx, ecx
inc ecx
test byte ptr [eax], 00000004h
dec esp
mov edx, ecx
je 00007F980491EA75h
inc ecx
mov eax, dword ptr [eax+08h]
dec ebp
arpl word ptr [eax+04h], dx
neg eax
dec esp
add edx, ecx
dec eax
arpl ax, cx
dec esp
and edx, ecx
dec ecx
arpl bx, ax
dec edx
mov edx, dword ptr [eax+edx]
dec eax
mov eax, dword ptr [ebx+10h]
mov ecx, dword ptr [eax+08h]
dec eax
mov eax, dword ptr [ebx+08h]
test byte ptr [ecx+eax+03h], 0000000Fh
je 00007F980491EA6Dh
movzx eax, byte ptr [ecx+eax+03h]
and eax, FFFFFFF0h
dec esp
add ecx, eax
dec esp
xor ecx, edx
dec ecx
mov ecx, ecx
pop ebx
jmp 00007F980491DD9Eh
int3
dec eax
mov eax, esp
dec eax
mov dword ptr [eax+08h], ebx
dec eax
mov dword ptr [eax+10h], ebp
dec eax
mov dword ptr [eax+18h], esi
dec eax
mov dword ptr [eax+20h], edi
inc ecx
push esi
dec eax
sub esp, 20h
dec ecx
mov ebx, dword ptr [ecx+38h]
dec eax
mov esi, edx
dec ebp
mov esi, eax
dec eax
mov ebp, ecx
dec ecx
mov edx, ecx
dec eax
mov ecx, esi
dec ecx
mov edi, ecx
dec esp
lea eax, dword ptr [ebx+04h]
call 00007F980491E9D1h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x141b600x280.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1520000x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1490000x8394.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1530000x658.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x131c600x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x131e800x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x131cd00x138.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0xfe0000xe60.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xfcfcc0xfd0008b57defe85e36a8ad267cb8e7c5828e2False0.4725973860548419data6.468382320700018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0xfe0000x473f20x47400e71b093b1ce3a72244a2b124c4537958False0.5657209429824561data6.608613723886367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1460000x24580xc0058469bc1cbeaa379e4d19e7746bc964cFalse0.18977864583333334data3.8698159446630442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x1490000x83940x84000d7524f023c6af9b39a7e20c12e23fdeFalse0.4881628787878788data6.090464654710249IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1520000x1e80x20071927b404fb4db38df8106d023460c58False0.5390625data4.758721582235538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1530000x6580x800e585a8db87b976bd60202c90ed004a00False0.45849609375data4.739801765346825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x1520600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
d3dx9_43.dllD3DXCreateTextureFromFileA
KERNEL32.dllProcess32Next, DeleteFileA, SetConsoleCursorInfo, GetLastError, Sleep, OutputDebugStringW, InitializeSListHead, GetSystemTimeAsFileTime, CreateToolhelp32Snapshot, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleHandleW, CreateEventW, ResetEvent, SetEvent, InitializeCriticalSectionAndSpinCount, GetFileSizeEx, HeapSize, InitializeCriticalSectionEx, GetStdHandle, SetConsoleScreenBufferSize, GetCurrentProcess, SetConsoleTitleA, SetPriorityClass, SetLastError, HeapFree, GetConsoleScreenBufferInfo, GetTempPathW, GetCurrentProcessId, CloseHandle, CreateThread, HeapAlloc, GetCurrentThread, GetConsoleWindow, GetCurrentThreadId, CreateFileW, VirtualAlloc, DeviceIoControl, VirtualFree, QueryPerformanceCounter, FreeLibrary, VerSetConditionMask, GetProcAddress, QueryPerformanceFrequency, LoadLibraryA, GetModuleHandleA, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GlobalAlloc, MultiByteToWideChar, GetProcessHeap, DeleteCriticalSection, LocalFree, HeapDestroy, HeapReAlloc, FormatMessageA, EnterCriticalSection, LeaveCriticalSection, SleepEx, GetSystemDirectoryA, GetModuleFileNameA, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetEnvironmentVariableA, WaitForSingleObjectEx, MoveFileExA, GetTickCount, VerifyVersionInfoA, CreateFileA
USER32.dllSetCursorPos, EmptyClipboard, GetClipboardData, SetClipboardData, CloseClipboard, GetCursorPos, GetClientRect, GetForegroundWindow, SetCursor, OpenClipboard, FindWindowA, GetWindowThreadProcessId, GetWindow, DispatchMessageA, GetWindowRect, DestroyWindow, SetWindowPos, ShowWindow, GetAsyncKeyState, SetWindowLongA, GetWindowLongA, SetWindowDisplayAffinity, MoveWindow, SetMenu, EnumWindows, SetLayeredWindowAttributes, TranslateMessage, SendMessageA, PeekMessageA, GetDesktopWindow, SetWindowLongPtrA, ClientToScreen, UpdateWindow, GetKeyState, LoadCursorA, ScreenToClient, MessageBoxA
ADVAPI32.dllCryptEncrypt, CryptDestroyKey, CryptDestroyHash, CryptHashData, CryptCreateHash, QueryServiceStatus, ConvertSidToStringSidA, OpenSCManagerA, CopySid, IsValidSid, OpenProcessToken, GetLengthSid, OpenServiceA, GetTokenInformation, RegSetKeyValueW, RegCloseKey, RegDeleteTreeW, RegCreateKeyW, RegOpenKeyW, CryptGenRandom, CryptImportKey, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA
SHELL32.dllSHGetFolderPathA, ShellExecuteA
IMM32.dllImmSetCompositionWindow, ImmSetCandidateWindow, ImmAssociateContextEx, ImmReleaseContext, ImmGetContext
dwmapi.dllDwmExtendFrameIntoClientArea
MSVCP140.dll?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, _Query_perf_frequency, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?_Xbad_alloc@std@@YAXXZ, ?_Xbad_function_call@std@@YAXXZ, ?_Throw_C_error@std@@YAXH@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, _Mtx_destroy_in_situ, _Mtx_lock, _Mtx_init_in_situ, _Thrd_sleep, _Query_perf_counter, _Xtime_get_ticks, _Mtx_unlock, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_N@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@M@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEA_N@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAH@Z, ??5?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@AEAM@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPEBD@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z
ntdll.dllRtlInitUnicodeString, RtlVirtualUnwind, RtlCaptureContext, RtlLookupFunctionEntry, NtRaiseHardError, RtlAdjustPrivilege, NtQuerySystemInformation
SHLWAPI.dllPathFileExistsA, PathAppendA
USERENV.dllUnloadUserProfile
d3d9.dllDirect3DCreate9Ex
urlmon.dllURLDownloadToFileA
Normaliz.dllIdnToAscii
WLDAP32.dll
CRYPT32.dllCertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertOpenStore, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFindCertificateInStore, CertFindExtension, CertEnumCertificatesInStore, CertCloseStore, CertFreeCertificateContext
WS2_32.dllntohl, gethostname, sendto, recvfrom, freeaddrinfo, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, listen, htonl, accept, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, closesocket, socket, setsockopt, recv, ntohs, htons, send, getsockopt, getsockname, getpeername, WSAGetLastError, connect, bind
RPCRT4.dllUuidToStringA, UuidCreate, RpcStringFreeA
PSAPI.DLLGetModuleInformation
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dllstrrchr, memset, memmove, memcpy, memcmp, __current_exception_context, __current_exception, memchr, _CxxThrowException, __C_specific_handler, wcsstr, __std_exception_copy, __std_exception_destroy, strstr, __std_terminate, strchr
api-ms-win-crt-stdio-l1-1-0.dll_read, _write, _close, _open, __stdio_common_vsprintf, fread, __stdio_common_vsscanf, fputs, fopen, feof, _wfopen, fputc, fwrite, __p__commode, fseek, _popen, _pclose, fgets, _set_fmode, fclose, __stdio_common_vsnprintf_s, fflush, __acrt_iob_func, ftell, __stdio_common_vfprintf, _lseeki64, _get_stream_buffer_pointers, _fseeki64, fsetpos, ungetc, fgetc, fgetpos, setvbuf
api-ms-win-crt-string-l1-1-0.dllstrcspn, strspn, isupper, strcmp, strncmp, strpbrk, strncpy, _stricmp, tolower, _strdup
api-ms-win-crt-utility-l1-1-0.dllqsort, srand, rand
api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, realloc, calloc, _callnewh
api-ms-win-crt-convert-l1-1-0.dllstrtod, strtoul, atoi, strtol, strtoull, strtoll
api-ms-win-crt-runtime-l1-1-0.dll_getpid, _beginthread, _invalid_parameter_noinfo, system, terminate, _errno, _configure_narrow_argv, _initialize_narrow_environment, _initialize_onexit_table, _register_onexit_function, _crt_atexit, _cexit, _seh_filter_exe, _set_app_type, _beginthreadex, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, abort, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, strerror, exit, _resetstkoflw, __sys_nerr, _invalid_parameter_noinfo_noreturn
api-ms-win-crt-filesystem-l1-1-0.dll_access, _stat64, _lock_file, _unlock_file, _fstat64, _wremove, _unlink
api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
api-ms-win-crt-math-l1-1-0.dllsin, _dclass, sinf, asinf, acosf, _fdclass, sqrtf, fmodf, cosf, cos, __setusermatherr, atan2f, ceilf
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:20:25:00
Start date:25/05/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.TrojanX-gen.8144.20316.exe"
Imagebase:0x7ff7b33b0000
File size:1'368'576 bytes
MD5 hash:1295DB15DF2D7DB394255D69E08D4B75
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:20:25:00
Start date:25/05/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >
    APIs
      • Part of subcall function 00007FF7B3403610: memmove.VCRUNTIME140(?,-00000228,?,00007FF7B33C82CC), ref: 00007FF7B340364B
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9D7F
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9DD2
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9E25
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9E78
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9ECE
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9F2D
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9F8F
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33C9FF1
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CA053
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CA0B5
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CA117
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CA179
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CA1DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn$memmove
    • String ID: 1$1$1$1$1$2$2$2$2$2$3$3$3$3$3$4$4$4$4$4$5$5$5$5$5$6$6$6$7$7$7$8$8$9$9$HR>$YO>
    • API String ID: 15630516-3449924272
    • Opcode ID: 339f6761f7120691d7235b5f4a7db7554966016342a571aa9d3e4943b20d73ae
    • Instruction ID: f40f163a7f971a0dc927c559128db095ac45b955f3924ff9f11a25ea45877922
    • Opcode Fuzzy Hash: 339f6761f7120691d7235b5f4a7db7554966016342a571aa9d3e4943b20d73ae
    • Instruction Fuzzy Hash: 1DD2DA22D25BD689E7529F39D8013F9A320FF67784F419326E65C769A9EF38A1C1C300
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB56C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB5C0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB613
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB666
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB6B9
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB70C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB75F
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB7B2
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB808
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B33CB867
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: 1$1$2$2$3$3$4$4$5$5$6$6$7$7$8$8$9$9$IS>$PX>$TM:$qvB
    • API String ID: 3668304517-1403544154
    • Opcode ID: d349bbe1263f31aa772aaf03a6f96d427dc673823e3d6bec817a05839da74732
    • Instruction ID: 6e94c0b5ddbab09b6f0827d6ccfea54049568820f4a7b045349441c28bdcb869
    • Opcode Fuzzy Hash: d349bbe1263f31aa772aaf03a6f96d427dc673823e3d6bec817a05839da74732
    • Instruction Fuzzy Hash: 16C2EB26D25BD689E7529B39D8012F9F324EF77784F80D326EA5C75969EF38A1C18300
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free$acosfceilfcosffclosefwritememmove
    • String ID: Click to break in debugger!$Debug##Default$HoveredId: 0x%08X$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.
    • API String ID: 496961473-269453832
    • Opcode ID: 65069ef2b237027dc8661c87992cef2cd888d279e6f7ff1825011d914c10e7a3
    • Instruction ID: d2e7dcee1f758b13bedd624e4a90d8a807cf2e20d71d8dde7824886522215e6d
    • Opcode Fuzzy Hash: 65069ef2b237027dc8661c87992cef2cd888d279e6f7ff1825011d914c10e7a3
    • Instruction Fuzzy Hash: 1FB21B72E046C586D795DF39C4402BAB7A0FF66B84F488239DB4DA7299DF38E581C720
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: malloc
    • String ID: 1$2$3$4$5$6$7$8$9$C
    • API String ID: 2803490479-3489961393
    • Opcode ID: 688264186ea72a0a7ab7980dbb3d6ad65729f535980cd0b847bec4e7cd4e0260
    • Instruction ID: 4b188ae00c43ade93161871b08485fd2817865de90514d69d4c69e28b0e52ace
    • Opcode Fuzzy Hash: 688264186ea72a0a7ab7980dbb3d6ad65729f535980cd0b847bec4e7cd4e0260
    • Instruction Fuzzy Hash: 00C1FE12E08BD198F383DBB8D4143AE6F74AB5739CF488599DB583998ADBBC0384C711
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,?,?,00000010,00007FF7B3406F1A), ref: 00007FF7B340729E
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7B34072A5
    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000010,00007FF7B3406F1A), ref: 00007FF7B3407411
    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000010,00007FF7B3406F1A), ref: 00007FF7B3407424
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000010,00007FF7B3406F1A), ref: 00007FF7B34074BE
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7B34074CB
      • Part of subcall function 00007FF7B34A8C90: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33B100E), ref: 00007FF7B34A8CAA
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmemmove$malloc
    • String ID:
    • API String ID: 2852859160-0
    • Opcode ID: 8320745f29e060d67b0b54436cae0ce1341f17e46368f8de42882e1316147bb1
    • Instruction ID: 9d525548fc861bf80eb3f7e211be98dbc8cc93a3a1eb50c55888ebb0e8f2eb2c
    • Opcode Fuzzy Hash: 8320745f29e060d67b0b54436cae0ce1341f17e46368f8de42882e1316147bb1
    • Instruction Fuzzy Hash: 11A104B6B14B8A42DD48DF1AD4401B9A7A0FB5ABC0F808536DF9D5BB88DF3CE1918310
    APIs
    Strings
    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7B34A9D5F
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
    • API String ID: 1848478996-631824599
    • Opcode ID: 551d2c1513270e98f46049a502db601fbb03bb1a4557d789e21c25087d674cfa
    • Instruction ID: 4ca92a24276feb5d61ab30c4f4b9599a2b9be909cef904b065a34ec3be18adf6
    • Opcode Fuzzy Hash: 551d2c1513270e98f46049a502db601fbb03bb1a4557d789e21c25087d674cfa
    • Instruction Fuzzy Hash: C5118F32A14B4297F784AB2AE6443B9B2A4FF65345F804035C75D92A58EF3CE4F4C720
    APIs
    • GetProcessHeap.KERNEL32 ref: 00007FF7B3408AF9
    • _Init_thread_footer.LIBCMT ref: 00007FF7B3408B2E
      • Part of subcall function 00007FF7B34A8B20: EnterCriticalSection.KERNEL32(?,?,?,00007FF7B3403B6F), ref: 00007FF7B34A8B30
      • Part of subcall function 00007FF7B34A8B20: LeaveCriticalSection.KERNEL32(?,?,?,00007FF7B3403B6F), ref: 00007FF7B34A8B70
    • _Init_thread_footer.LIBCMT ref: 00007FF7B3408BAA
      • Part of subcall function 00007FF7B34A8B80: EnterCriticalSection.KERNEL32(?,?,?,00007FF7B3403AD3), ref: 00007FF7B34A8B90
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalSection$EnterInit_thread_footer$HeapLeaveProcess
    • String ID:
    • API String ID: 3391058595-0
    • Opcode ID: e9db3e2efb65cdad415b9674d5d4b241253e7fe47a990090509df21284d96711
    • Instruction ID: eddbfe359cc5d530493c70aeef9426e5da7e099bd62be923ea1a33ddcf9908a6
    • Opcode Fuzzy Hash: e9db3e2efb65cdad415b9674d5d4b241253e7fe47a990090509df21284d96711
    • Instruction Fuzzy Hash: F531BC60E08B0385EA80AB5CE850171B2A0AF77754FC81135E72CEA2B9DF3DB5D5C320
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memchr
    • String ID:
    • API String ID: 3297308162-0
    • Opcode ID: 6e12d426faab02818e157ab52a7e19cb1cb62f52aa147f10945016926abca174
    • Instruction ID: f50bac89975743fc6a4ad3b8d153f2db319fd8744fa18fdfa5837333ebcf88f8
    • Opcode Fuzzy Hash: 6e12d426faab02818e157ab52a7e19cb1cb62f52aa147f10945016926abca174
    • Instruction Fuzzy Hash: 6C22E932D08BC985E6529B3A91412BAF350EF7A384F589735EB8D335A9DF38E1C58710
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: <NULL>$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequestForward %d
    • API String ID: 0-568746515
    • Opcode ID: 6cbca7fb06a48606b8a02988ec8c079f9feb995a00513a34a66f7485bca07d1c
    • Instruction ID: 90739db30d691937c21f413d0bc9c9f06c2d35d8ba23f7726d88060dbc081f9b
    • Opcode Fuzzy Hash: 6cbca7fb06a48606b8a02988ec8c079f9feb995a00513a34a66f7485bca07d1c
    • Instruction Fuzzy Hash: 7EF1D532C1469982E296AB3A80402FAF350EF7B744F58C736DF5C375A9DB2975D08720
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memmovememset
    • String ID:
    • API String ID: 1288253900-0
    • Opcode ID: 434400e10bcc9dd791643bc86dc71e8294915aca5ada6619dd87304a09d46a38
    • Instruction ID: b601a5eab3db43c8f1100f173adf4ff8c734e2cc4c50c42b960307bfe273bd4c
    • Opcode Fuzzy Hash: 434400e10bcc9dd791643bc86dc71e8294915aca5ada6619dd87304a09d46a38
    • Instruction Fuzzy Hash: 70220BB290C6C186D7B1AF3D955036BB7A0EB66704F984239CB4D6B25CCB3DE584CB20
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: #RESIZE
    • API String ID: 0-1383961720
    • Opcode ID: e5b176c49ee7dfdac478947ef76e49bdd94df623d02f90b77cda778b79c1cc5e
    • Instruction ID: fdda6613f5bc214c5adafe6a31b15d5fed839db65bbb45779f47b5193ef077fb
    • Opcode Fuzzy Hash: e5b176c49ee7dfdac478947ef76e49bdd94df623d02f90b77cda778b79c1cc5e
    • Instruction Fuzzy Hash: FD52C732D1868995E392DB3B904117AF760EF6F384F988726EB4C775A5DB38B4C48B10
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: (
    • API String ID: 0-3887548279
    • Opcode ID: c9b5e38202d73fc9c5ce6e5e78e73db68e4b6cf79f0beeaa6a8905a632746612
    • Instruction ID: 8d6dc58be033b3b5e41df1de9d0778989c946b9cf05be2cce3e29d5eca65066a
    • Opcode Fuzzy Hash: c9b5e38202d73fc9c5ce6e5e78e73db68e4b6cf79f0beeaa6a8905a632746612
    • Instruction Fuzzy Hash: 2EF19032A25B988AC702CF3BC48116CB760FF6EB88B19D716EE1823764DB35E495D700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ControlDevice
    • String ID:
    • API String ID: 2352790924-0
    • Opcode ID: 10ae8f029d4ee54b33d4563859059525396320dfab1e334fc317e2c0b04b4f14
    • Instruction ID: f7b938d39d37192b622d3316710f37be90aa180b5244007a237aee7376029c8d
    • Opcode Fuzzy Hash: 10ae8f029d4ee54b33d4563859059525396320dfab1e334fc317e2c0b04b4f14
    • Instruction Fuzzy Hash: 23118E36B08B4082E780DF24E05976D33E8BB15380FD24139CBAC8B214DF3A9995CB10
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 8b122f35993568f4cf1216438dc028219eecfc3bea93ec70c233c3dd6e47985e
    • Instruction ID: 0dbc020d7390bbd0f3d297cb2909c05aa7931bd8fd456c5804e234bad2480be4
    • Opcode Fuzzy Hash: 8b122f35993568f4cf1216438dc028219eecfc3bea93ec70c233c3dd6e47985e
    • Instruction Fuzzy Hash: 62924D33924B988AC756CF3BC4810ADB760FFAAB88719D716DB0823765DB35E594DB00
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 309f3a85291b53a3935e91e072c2aa37c7316657ba7c892e52622a707f670737
    • Instruction ID: 97c57a4b4705f0dca65715ae4934d5c318b75be91c088c8c8ea1a5e917ec4f21
    • Opcode Fuzzy Hash: 309f3a85291b53a3935e91e072c2aa37c7316657ba7c892e52622a707f670737
    • Instruction Fuzzy Hash: 5F12CC62E0869585E791AB3AC0402BBA790EF67B44F998339DF4D3729DDF3864C58730
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bfbc40cc124c6dae716a7b6ed3ed0393285826ce31f11320b5fde17795961e13
    • Instruction ID: c93eedf15313b92cd4283a7dc2d67a4c3f23a3d6e6b476cb3a1923e20e4dde32
    • Opcode Fuzzy Hash: bfbc40cc124c6dae716a7b6ed3ed0393285826ce31f11320b5fde17795961e13
    • Instruction Fuzzy Hash: 7D02B82AD0818645EFE6AB2D904527FA691AF72B88FC94539DF4C272DDCA3D65C08720
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ccf042cd46707abc51550feb47a11f428be840570ad2935d060b5939a04e5486
    • Instruction ID: dbedd66090533072c24693695ac6f85768e5061536916e512b8e821fc9c87e4b
    • Opcode Fuzzy Hash: ccf042cd46707abc51550feb47a11f428be840570ad2935d060b5939a04e5486
    • Instruction Fuzzy Hash: 8CF1D322D18BDD85E653D73B90411BAE750AFBF384F5C8B26FE5836665DB28B0C18B10
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 832ff10c1b94feaf486a109a3700d37c3f7f5fb767710fad40b3019d38ead908
    • Instruction ID: c854cb80b7f59979ba37563e174792db2d1e99556ebd7343b20db44d81c2e917
    • Opcode Fuzzy Hash: 832ff10c1b94feaf486a109a3700d37c3f7f5fb767710fad40b3019d38ead908
    • Instruction Fuzzy Hash: FCD19022C0C68E81E2A2B63F50420BAF2909F7F345F59DB36EB4D335A5DB2975C99710
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 14a8fc1429a81961bf1554a91a6a11a65cd82140a19b4bae357f6106697c85b1
    • Instruction ID: d0c044133a495cd04ded1b7ef6708f93d04c4f5bef1ea861066d7e9e4db846bf
    • Opcode Fuzzy Hash: 14a8fc1429a81961bf1554a91a6a11a65cd82140a19b4bae357f6106697c85b1
    • Instruction Fuzzy Hash: 1DC1B512E0D6D157EBE3AA3941003BBA6959F23748F884139DF5E2B2DDCB2D69858330
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2294f10a66c7cb53e7062bde4c2ec192ab3317ef1dc1dded3af4abb52d4fd49d
    • Instruction ID: a2af4de0ec56be5cdd94756d5acece11b0c952195614ada1bba39d1d0eb7780b
    • Opcode Fuzzy Hash: 2294f10a66c7cb53e7062bde4c2ec192ab3317ef1dc1dded3af4abb52d4fd49d
    • Instruction Fuzzy Hash: E2412525A0DB5981E961A72B508017AE251AFB7B80FD8C73AEE4C77A8CDB7CE4C14710
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2c828c775ad95e4aed4123b486d9fd52e7a664482e9836ace2f425a731eadcc7
    • Instruction ID: b4cf64739e96b406ac8130986455c5ffb59928b291ef14d91810ea9f1db5044b
    • Opcode Fuzzy Hash: 2c828c775ad95e4aed4123b486d9fd52e7a664482e9836ace2f425a731eadcc7
    • Instruction Fuzzy Hash: 3F01F7E1A0029647EA88D7EA8CE55BA3351D366346F89503BDF4C5B389C93C915BC770
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: b5d21a527f7a2e930dd092e76c6fab75a792ca50503b6cb9dec75e58aed122f0
    • Instruction ID: 98ad08f93c601286af36530331266f8a93c610dce62bd4c4556697fbb759de72
    • Opcode Fuzzy Hash: b5d21a527f7a2e930dd092e76c6fab75a792ca50503b6cb9dec75e58aed122f0
    • Instruction Fuzzy Hash: AE020625A1AA4580FEC4AF19D44067AD760BF66F84FC8953ADF4D673A9CE2DE4818330
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: ammo.handmade.shell$ammo.nailgun.nails$ammo.pistol$ammo.pistol.fire$ammo.pistol.hv$ammo.rifle$ammo.rifle.explosive$ammo.rifle.hv$ammo.rifle.incendiary$ammo.shotgun$ammo.shotgun.fire$ammo.shotgun.slug$arrow.bone$arrow.fire$arrow.hv$arrow.wooden
    • API String ID: 0-3011946814
    • Opcode ID: 25ef0535a8770d9e63a2caa23f5affbb4808866f8015c336232d4325ad437a7f
    • Instruction ID: 8d4147b384274f3fa74ca4c44212406d34a7d54e32d4d51e88db6397855c921b
    • Opcode Fuzzy Hash: 25ef0535a8770d9e63a2caa23f5affbb4808866f8015c336232d4325ad437a7f
    • Instruction Fuzzy Hash: C2E18232904BC299E7A0DF28DC407EDB760FB56348F805624DB4C6BA68DF78A6C9C714
    APIs
    • memmove.VCRUNTIME140(?,?,00000010,00007FF7B3406DC3), ref: 00007FF7B3403841
    • memcpy.VCRUNTIME140(?,?,00000010,00007FF7B3406DC3), ref: 00007FF7B3403906
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000010,00007FF7B3406DC3), ref: 00007FF7B340395A
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7B3403961
      • Part of subcall function 00007FF7B34A8C90: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33B100E), ref: 00007FF7B34A8CAA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B34039A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmallocmemcpymemmove
    • String ID: NtAddAtom$invalid string position$ntdll.dll
    • API String ID: 3998274896-278859925
    • Opcode ID: c78ef0244570bcff4226bb904c2b1541525aa33fa888220b691ff94b72622440
    • Instruction ID: d61bc118ca7ab063f9d052da0edbb482aa00da37cf476af33f1585a028b09f14
    • Opcode Fuzzy Hash: c78ef0244570bcff4226bb904c2b1541525aa33fa888220b691ff94b72622440
    • Instruction Fuzzy Hash: 2BB1E922F0964644FE84EB6D944027CA7A1AF26BE4F840631DF6DAB7D9DE3CE4C18714
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: fclose$fseekftell$freadfreemalloc
    • String ID:
    • API String ID: 1549146309-0
    • Opcode ID: 51046a44f9b48b155441e47f0858cc3ac56ccbe00512cee28ad6d3de9166df09
    • Instruction ID: 501d33bae3fb7aeb5ca7645adb73c423fa49b83e0673136303740f71934bb1ff
    • Opcode Fuzzy Hash: 51046a44f9b48b155441e47f0858cc3ac56ccbe00512cee28ad6d3de9166df09
    • Instruction Fuzzy Hash: EE310A21A08B1241FAD4AB1E954023AE290AF66BD0FC84535DF6E637DCDE3DE4D18320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memset$cosfmalloc
    • String ID: .
    • API String ID: 2754591348-248832578
    • Opcode ID: 5ef3acc4f08f0e01bf195f13afc4dbe7d76e946baa24aabb405e54400445cde1
    • Instruction ID: 80a0892c5136adaf8e854bcf04dc8c40051ee2ebab59b913c0c4a6aebb1188d1
    • Opcode Fuzzy Hash: 5ef3acc4f08f0e01bf195f13afc4dbe7d76e946baa24aabb405e54400445cde1
    • Instruction Fuzzy Hash: E052CEB3404BC186D301DF35A8401DA77E8F755F59F695B38DFA41BA98CB7082A1AB38
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ceilf$cosfsinf
    • String ID:
    • API String ID: 125261001-0
    • Opcode ID: 3469d4e06a46ef03ad75912cbf992b0b018880deb8e7666b0f969763afd84f33
    • Instruction ID: 3331aad2b0f20ca05ec173468ff8b1fb2e5cdb9183508aaacaf105b512e1b90f
    • Opcode Fuzzy Hash: 3469d4e06a46ef03ad75912cbf992b0b018880deb8e7666b0f969763afd84f33
    • Instruction Fuzzy Hash: 71B1FA3291869989E3529B3DD4412B9F390EF6A345F588336FA4C73669EF28F4C58710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Virtual$Free$AllocControlDevice_invalid_parameter_noinfo_noreturn_stricmpmemset
    • String ID:
    • API String ID: 2498276250-0
    • Opcode ID: f5d567e864ca52a747c30cbb85eae3e5c8499c548f936799e65ddf684f8dc24a
    • Instruction ID: 842f035a13f9b4e519d191cc5c3ea7526d3dd28d50c1d2b85b20ea1faeda21ac
    • Opcode Fuzzy Hash: f5d567e864ca52a747c30cbb85eae3e5c8499c548f936799e65ddf684f8dc24a
    • Instruction Fuzzy Hash: 2D719522B08A4146EB90EB2AD540779A361FB977D4F404231DBAD9BAD9DF7CE4C1C710
    APIs
    • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00007FF7B33F670F), ref: 00007FF7B33EEE0C
    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00007FF7B33F670F), ref: 00007FF7B33EEE45
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00007FF7B33F670F), ref: 00007FF7B33EEFAC
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00007FF7B33F670F), ref: 00007FF7B33EEFCC
    • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00007FF7B33F670F), ref: 00007FF7B33EF079
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memcmpmemcpy$memmove
    • String ID:
    • API String ID: 1544231926-3916222277
    • Opcode ID: 5665809ca391bfab7a4da2535abdd006d2832fbce826a855d29264d09c6991fd
    • Instruction ID: 22969191ce2255facbef46f3b8f08e284e65ce6078d11fdd87582586756c8089
    • Opcode Fuzzy Hash: 5665809ca391bfab7a4da2535abdd006d2832fbce826a855d29264d09c6991fd
    • Instruction Fuzzy Hash: 91B12672B0465587DBA0DF1CD44476AB3A5FB95B80F828239DB5C53B58DF38E881CB20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: malloc$freememcpy
    • String ID: Table$Window
    • API String ID: 4259248891-616867329
    • Opcode ID: 3ce8d42ba1eb67061210945a1cb5fbb3674afd31731b788932b00cd46b9e0428
    • Instruction ID: c42bf692198fa92f45b781fa88bf6ad5f4291e5c7b407b59fb16f1b44adb513d
    • Opcode Fuzzy Hash: 3ce8d42ba1eb67061210945a1cb5fbb3674afd31731b788932b00cd46b9e0428
    • Instruction Fuzzy Hash: D1B1A336A04B4195FB80DF28D4802B9B7A5FB69744F84423ADF4DA3798DF38E4A5C360
    APIs
    • MultiByteToWideChar.KERNEL32 ref: 00007FF7B33CDEC9
    • MultiByteToWideChar.KERNEL32 ref: 00007FF7B33CDEE9
    • MultiByteToWideChar.KERNEL32 ref: 00007FF7B33CDF35
    • MultiByteToWideChar.KERNEL32 ref: 00007FF7B33CDF59
    • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7B33CDF65
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CDF8F
      • Part of subcall function 00007FF7B33E38F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000008,00007FF7B33EBD6A,?,?,?,00007FF7B33F2943), ref: 00007FF7B33E3929
      • Part of subcall function 00007FF7B33E38F0: memcpy.VCRUNTIME140(?,?,00000008,00007FF7B33EBD6A,?,?,?,00007FF7B33F2943), ref: 00007FF7B33E3943
      • Part of subcall function 00007FF7B33E38F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000008,00007FF7B33EBD6A,?,?,?,00007FF7B33F2943), ref: 00007FF7B33E396A
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ByteCharMultiWide$free$_wfopenmallocmemcpy
    • String ID:
    • API String ID: 4257096054-0
    • Opcode ID: 48071f8f472f00ecba25f2c8001e22ac609b4dd093bdd9c66d5e8bfe30fc74fc
    • Instruction ID: 2983aba28286ed0aa9b8dd1833e7b32f0f8e845e3caac82a8e8149c027520af3
    • Opcode Fuzzy Hash: 48071f8f472f00ecba25f2c8001e22ac609b4dd093bdd9c66d5e8bfe30fc74fc
    • Instruction Fuzzy Hash: F9319635608B4186D360AF1AE55006AF7A1FBD9BC0F484239EB9D53B6CCF3CD1518B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: daae81dab448ce4e89ced726df347f90e589408b6a4ec49df2f22aa98229ae38
    • Instruction ID: 601efe41f818fa203046f82fb0484896afe92c408caca8607a761708f14aa205
    • Opcode Fuzzy Hash: daae81dab448ce4e89ced726df347f90e589408b6a4ec49df2f22aa98229ae38
    • Instruction Fuzzy Hash: 8F418525B1AA4681FE84AB19D44037AE760FF52B84FC8953ADF4D63369CF3DE4918320
    APIs
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB724
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB753
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB782
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB7BD
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB7EC
      • Part of subcall function 00007FF7B33EB6F0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33CC392), ref: 00007FF7B33EB81E
      • Part of subcall function 00007FF7B33EEBD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7B33CC392), ref: 00007FF7B33EEC44
      • Part of subcall function 00007FF7B33EEBD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF7B33CC392), ref: 00007FF7B33EEC7A
      • Part of subcall function 00007FF7B33EEBD0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33EECD1
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC3C5
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC3F0
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC418
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC440
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC468
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC490
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33CC4B8
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: aded3f5d1981e920d7cef63f54bacd01d7d8f837665dfff7d5ef4297263a6e50
    • Instruction ID: ab80a9d7542bdbf0231a1f9ba2accae3fd00714e89c192969e240f11e974f58f
    • Opcode Fuzzy Hash: aded3f5d1981e920d7cef63f54bacd01d7d8f837665dfff7d5ef4297263a6e50
    • Instruction Fuzzy Hash: 2D314634B1AA4581FD95AB1DD45067AD760BF66B80FCC943ACF4E63369CE2DE4C18320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memset$mallocmemcpy
    • String ID: #MOVE
    • API String ID: 1726687030-3098322713
    • Opcode ID: d3a9ba0798450badd289c00accd241157c2c78858d5b3404ffbd17a0e2d42dd6
    • Instruction ID: 896dc91a03fff7fafceb0d2a80f41d77be745f1fc2836cf57d99e0f1c0795c99
    • Opcode Fuzzy Hash: d3a9ba0798450badd289c00accd241157c2c78858d5b3404ffbd17a0e2d42dd6
    • Instruction Fuzzy Hash: F6C14E32505B8186D750DF29E8883DD77A8F749B58FA88239D7AD8B7A4CF369093C700
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7B33CC263), ref: 00007FF7B3431AE3
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7B33CC263), ref: 00007FF7B3431AEA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7B33CC263), ref: 00007FF7B3431AF1
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7B33CC263), ref: 00007FF7B3431AF8
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00000000,00007FF7B33CC263), ref: 00007FF7B3431AFF
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 3668304517-0
    • Opcode ID: 4401d6de708e55088d9bdb80a4736f2b0517bc05bb16c3728b36de0436acac18
    • Instruction ID: 2d920b833dfbacd99fc67fee8fcd452d024a454d9268f5710b0f7569f0bb03a6
    • Opcode Fuzzy Hash: 4401d6de708e55088d9bdb80a4736f2b0517bc05bb16c3728b36de0436acac18
    • Instruction Fuzzy Hash: 3461AC62A08A8684EB44FB19E85837DB761EB22BC0FC54030CB5D9769ADF7CE4D0C350
    APIs
    • memmove.VCRUNTIME140(?,-00000228,?,00007FF7B33C82CC), ref: 00007FF7B340364B
    • memcpy.VCRUNTIME140(?,-00000228,?,00007FF7B33C82CC), ref: 00007FF7B340372C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,-00000228,?,00007FF7B33C82CC), ref: 00007FF7B3403775
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7B3403782
    • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00007FF7B33C82CC), ref: 00007FF7B34037D4
      • Part of subcall function 00007FF7B34A8C90: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33B100E), ref: 00007FF7B34A8CAA
      • Part of subcall function 00007FF7B3403810: ?_Xout_of_range@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF7B3403A1B
      • Part of subcall function 00007FF7B3403810: GetModuleHandleA.KERNEL32 ref: 00007FF7B3403A6C
      • Part of subcall function 00007FF7B3403810: GetProcAddress.KERNEL32 ref: 00007FF7B3403A85
      • Part of subcall function 00007FF7B3403810: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B3403B56
      • Part of subcall function 00007FF7B3403810: _Init_thread_footer.LIBCMT ref: 00007FF7B3403B6A
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturnmemmove$AddressConcurrency::cancel_current_taskHandleInit_thread_footerModuleProcXout_of_range@std@@mallocmemcpy
    • String ID:
    • API String ID: 2424940784-0
    • Opcode ID: 4109c343ecfb5d58e586d653e4054342fbf9cd0a8d116cadd8aae58d379bb915
    • Instruction ID: 95c0d4ba2d20afd97bf7253df394a75425031ca430ed47f88f893f76a1b0139e
    • Opcode Fuzzy Hash: 4109c343ecfb5d58e586d653e4054342fbf9cd0a8d116cadd8aae58d379bb915
    • Instruction Fuzzy Hash: 074104A2B0568654ED94AB5E94401BCA650EB16FF0F984B30CF3D6B3D9DE3CE4D28314
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 8e23541a4973b1b2f1644744b859863e94e92a9efcde3b1d3e62bb75db8c7d17
    • Instruction ID: 9457768d035f97d54588b94e643df97fe38d88af107e843daf00c69bb87c4fc2
    • Opcode Fuzzy Hash: 8e23541a4973b1b2f1644744b859863e94e92a9efcde3b1d3e62bb75db8c7d17
    • Instruction Fuzzy Hash: AE413D35609B4580EB85AF29D54063AA7A4FF25B84F88853ADF8D537A8CF3DD4818360
    APIs
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D2FEF,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33EF6AF
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D2FEF,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33EF74B
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D2FEF,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33EF77A
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33EF7E1
    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7B33EF826
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 3a21b95c1fcd81f0ddba6b1a2a3637880f1dfc4d4faf4ec52ada33d698dad4ce
    • Instruction ID: e5895f1b17198cb8f60420129a041cecd2c6ddc323235ec93bd45f942077fece
    • Opcode Fuzzy Hash: 3a21b95c1fcd81f0ddba6b1a2a3637880f1dfc4d4faf4ec52ada33d698dad4ce
    • Instruction Fuzzy Hash: 2A517036A19B4581EB90AF19D040279B760FB55F84F89423ADF4D637A9CF3EE481C360
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memset
    • String ID: imgui.ini$imgui_log.txt
    • API String ID: 2221118986-3179804127
    • Opcode ID: cc2f3562b2d7d9df156c989548b8eb2d65760aa4976764998dcf2ff4aa279ea6
    • Instruction ID: 0079353b9d0c159bf0f85b5b7780dac8b7298738b33aa5a25d9942745d349289
    • Opcode Fuzzy Hash: cc2f3562b2d7d9df156c989548b8eb2d65760aa4976764998dcf2ff4aa279ea6
    • Instruction Fuzzy Hash: 0171BDB21057819AC751EF39D86038A7B68F716F08FA84139DB580F31CCB369259CBA8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: qsort
    • String ID: $...
    • API String ID: 1928336220-3450965881
    • Opcode ID: 3254285c188d5e0017e9b8a80aee3e9adc530db659d513b9c26c19fb0c9465c4
    • Instruction ID: 19423318ec4e38eee42835886b72499c2392e3fe67615bb1d9cad3d5f320b048
    • Opcode Fuzzy Hash: 3254285c188d5e0017e9b8a80aee3e9adc530db659d513b9c26c19fb0c9465c4
    • Instruction Fuzzy Hash: 91B1A272A08AC186D791EF29D4441AEBBA5FB56B44F884139DF4D57389DF78E4C0C720
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7B3407696
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: gfffffff$gfffffff
    • API String ID: 3668304517-161084747
    • Opcode ID: 1d4407ea3c223e9c4969e6b7e566a86147ab5e8715f5021d50820c23962c8fff
    • Instruction ID: f7000c48683601d93b38c72ec16ff846464ac5405a93de72a4ed6c01f3f0d9ca
    • Opcode Fuzzy Hash: 1d4407ea3c223e9c4969e6b7e566a86147ab5e8715f5021d50820c23962c8fff
    • Instruction Fuzzy Hash: B841D0A2700B8982DE54DB1BF5445AEA756E759FC4B808132DF4DDB758DE3CE181C302
    APIs
    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF7B340396C,?,?,00000010,00007FF7B3406DC3), ref: 00007FF7B33FF73B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Xlength_error@std@@
    • String ID: bad cast$string too long
    • API String ID: 1004598685-856079951
    • Opcode ID: 654754c7106afa2bab835c18429d1a7422642b6167c57ea5598be6b73f788402
    • Instruction ID: 3a49bf94e8a48205a4054a667cc5dd831bcc89cbc1fe3cca0fd35f69ff3d517a
    • Opcode Fuzzy Hash: 654754c7106afa2bab835c18429d1a7422642b6167c57ea5598be6b73f788402
    • Instruction Fuzzy Hash: BBD0E231906B0190DA81AF08E8903A47274AB66718FA00935C20D92374DF3D999BC350
    APIs
    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF7B34087CE), ref: 00007FF7B34077DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: Xlength_error@std@@
    • String ID: gfffffff$vector too long
    • API String ID: 1004598685-3666171535
    • Opcode ID: 731a1893d361173976770038ce68167f3941cc5baa5ee50469249af20f652ee5
    • Instruction ID: e5fb3b4b38a2c6976764ea4b2712a7ff5fa479f78df44ce760a920bbbe1a0d2a
    • Opcode Fuzzy Hash: 731a1893d361173976770038ce68167f3941cc5baa5ee50469249af20f652ee5
    • Instruction Fuzzy Hash: 45B00220915946D1D5C4FF19DD9507452347F76715FD00C35C22D915745E1C55DFC710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: memchrmemcpy
    • String ID:
    • API String ID: 3039221550-0
    • Opcode ID: a5b52792b697437822d2244be445e6c98c6d41238c77342b265eb25d541571d8
    • Instruction ID: 09206307859dccfb5c8ec6d66bf0a1b0fb1ff11148c8b2ffa6a073977f07a867
    • Opcode Fuzzy Hash: a5b52792b697437822d2244be445e6c98c6d41238c77342b265eb25d541571d8
    • Instruction Fuzzy Hash: 1E611862B0969245EA95AA19C8402BBA781FB1ABC1FC44339DF5C97389DF3CE5C1C330
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: freemallocmemcpymemmove
    • String ID:
    • API String ID: 2074075965-0
    • Opcode ID: 59f2062b9f09829446702eb93bd05cee8925571e965431062fea56568dacbfd8
    • Instruction ID: 4a3fd0b72fed5f4dac49ce4a0043c337c568d06e77590dc8aa38f6a9ed2de838
    • Opcode Fuzzy Hash: 59f2062b9f09829446702eb93bd05cee8925571e965431062fea56568dacbfd8
    • Instruction Fuzzy Hash: BE31E076B08B8681EB44AF19D440179F760FB15BD4B48C13ADB4D6775DDE2CE482C760
    APIs
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D351A,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E2E3E
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D351A,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E2E66
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D351A,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E2E9D
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33D351A,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E2ECB
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: a7e9acb76972f70db487b58759ceab05e884499be57cb398e4c5644ad69fa6f9
    • Instruction ID: bb2c50e837a5ea732e23303e43e4466ad9c6285f5d54bfd0b8a06a875d7e6049
    • Opcode Fuzzy Hash: a7e9acb76972f70db487b58759ceab05e884499be57cb398e4c5644ad69fa6f9
    • Instruction Fuzzy Hash: 7B318331605B5581EA84AF29D48013AB760FF99B84F88953ADF8D67769CF3CE4918360
    APIs
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33E2FB0,?,?,00000000,00007FF7B33D3622,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E39BB
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33E2FB0,?,?,00000000,00007FF7B33D3622,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E39E6
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33E2FB0,?,?,00000000,00007FF7B33D3622,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E3A11
    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7B33E2FB0,?,?,00000000,00007FF7B33D3622,?,?,?,00007FF7B33D04E2), ref: 00007FF7B33E3A3C
    Memory Dump Source
    • Source File: 00000000.00000002.3271976153.00007FF7B33B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7B33B0000, based on PE: true
    • Associated: 00000000.00000002.3271957062.00007FF7B33B0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272082911.00007FF7B34AE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272105198.00007FF7B34AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272155727.00007FF7B34F6000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3272176419.00007FF7B34F9000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7b33b0000_SecuriteInfo.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: b30362e0108bdc3326a8b2b35bc5cf3f7291787cbe2accbe1d8b6ff6074d281e
    • Instruction ID: ee716e2fde549e02403d01c0d1cc79fef28de3d9a3fe84c158dcb44993e8ccc9
    • Opcode Fuzzy Hash: b30362e0108bdc3326a8b2b35bc5cf3f7291787cbe2accbe1d8b6ff6074d281e
    • Instruction Fuzzy Hash: AA110324B1A64580FEC46B19D440779E760AF66F84F8C953ADE4D673A9CF2DE4C19330