Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6Pk1nTmcHN.exe

Overview

General Information

Sample name:6Pk1nTmcHN.exe
renamed because original name is a hash value
Original sample name:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe
Analysis ID:1509585
MD5:d0d55a8f4965a4d3f661b3ea268f578b
SHA1:a063be1a85bba3ffc65554d3b4c0ae1a45638451
SHA256:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda
Tags:62-192-173-45exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to debug other processes
Contains functionality to delete services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • 6Pk1nTmcHN.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\6Pk1nTmcHN.exe" MD5: D0D55A8F4965A4D3F661B3EA268F578B)
    • WerFault.exe (PID: 7988 cmdline: C:\Windows\system32\WerFault.exe -u -p 7532 -s 1304 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6Pk1nTmcHN.exeReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 RegOpenKeyExW,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GlobalMemoryStatusEx,GetDiskFreeSpaceExW,GetSystemTimes,QueryPerformanceCounter,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,0_2_000000014005A7A0
Source: Binary string: C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\avDump.pdb source: 6Pk1nTmcHN.exe
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: weblineinfo.com
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000607000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/b3
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues(
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues:
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesU
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesl
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_3_0053D65A NtAllocateVirtualMemory,0_3_0053D65A
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_3_0053D6CA NtProtectVirtualMemory,0_3_0053D6CA
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400026F0 GetFileAttributesW,CreateFileW,NtSystemDebugControl,CloseHandle,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_00000001400026F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400597D0 NtOpenKey,NtQueryKey,NtDeleteKey,NtClose,RegCloseKey,SetLastError,0_2_00000001400597D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140059900 NtQueryKey,NtDeleteKey,NtClose,RegCloseKey,SetLastError,0_2_0000000140059900
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140059C10 RegCloseKey,SetLastError,RegSetValueExW,RegCloseKey,SetLastError,NtClose,0_2_0000000140059C10
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00558149 NtSetContextThread,0_2_00558149
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005751C0 NtReadVirtualMemory,0_2_005751C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005745F0 NtDuplicateObject,0_2_005745F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005471B0 NtClose,0_2_005471B0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00557A50 NtSetContextThread,0_2_00557A50
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00574740 NtFreeVirtualMemory,0_2_00574740
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00574360 NtCreateThreadEx,0_2_00574360
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00574FF0 NtQueueApcThread,0_2_00574FF0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,0_2_0055F3A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140029200: CreateFileW,GetLastError,DeviceIoControl,GetLastError,CloseHandle,0_2_0000000140029200
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014006F0E00_2_000000014006F0E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400991100_2_0000000140099110
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000C2000_2_000000014000C200
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400482300_2_0000000140048230
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400263B00_2_00000001400263B0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005F3E00_2_000000014005F3E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400914200_2_0000000140091420
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400144700_2_0000000140014470
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000B5C00_2_000000014000B5C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400896080_2_0000000140089608
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400016700_2_0000000140001670
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400146990_2_0000000140014699
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400087000_2_0000000140008700
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014009A7380_2_000000014009A738
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400997900_2_0000000140099790
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A00_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400367A00_2_00000001400367A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400597D00_2_00000001400597D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400897F00_2_00000001400897F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014001D7F00_2_000000014001D7F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400768100_2_0000000140076810
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400158600_2_0000000140015860
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000F8D00_2_000000014000F8D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014002D9400_2_000000014002D940
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400429D00_2_00000001400429D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400899DC0_2_00000001400899DC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008BA280_2_000000014008BA28
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008AA440_2_000000014008AA44
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140040A500_2_0000000140040A50
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC00_2_0000000140048AC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140018AF00_2_0000000140018AF0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140032B000_2_0000000140032B00
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000CB800_2_000000014000CB80
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089BC40_2_0000000140089BC4
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140097BEC0_2_0000000140097BEC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140098C600_2_0000000140098C60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014002FD100_2_000000014002FD10
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089DB00_2_0000000140089DB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008BDF40_2_000000014008BDF4
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005EE200_2_000000014005EE20
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140092E140_2_0000000140092E14
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140094E300_2_0000000140094E30
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED00_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400A3F0C0_2_00000001400A3F0C
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140072F200_2_0000000140072F20
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140042F800_2_0000000140042F80
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089F980_2_0000000140089F98
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000AFE00_2_000000014000AFE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005728120_2_00572812
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055B4E00_2_0055B4E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005714900_2_00571490
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005645500_2_00564550
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00545D600_2_00545D60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005495000_2_00549500
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055A1000_2_0055A100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005591200_2_00559120
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005499D00_2_005499D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005555C00_2_005555C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0056B5E00_2_0056B5E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005655E00_2_005655E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00554DB00_2_00554DB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005702100_2_00570210
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005672200_2_00567220
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055BED00_2_0055BED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005466C00_2_005466C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005666E00_2_005666E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005516A00_2_005516A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005542A00_2_005542A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005682A00_2_005682A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00571F400_2_00571F40
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00572F600_2_00572F60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0054A7300_2_0054A730
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0056FBC00_2_0056FBC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055CBE00_2_0055CBE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00562BB00_2_00562BB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_005613A30_2_005613A3
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: String function: 00000001400142A0 appears 74 times
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7532 -s 1304
Source: 6Pk1nTmcHN.exeBinary or memory string: OriginalFilename vs 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeBinary or memory string: OriginalFilenameavDump.exe* vs 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeBinary string: Unable to retrieve the path of the module!Unable to store the path of the module!Unable to get the path of the module!SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppDataUnable to retrieve a path of the known folder ({})!%LOCALAPPDATA%%APPDATA%ProgramFilesSOFTWARE\Microsoft\Windows\CurrentVersionProgramFilesDirCommonProgramFilesCommonFilesDir\\?\Unable to convert NT path '{}' to a volume GUID path!Unable to enumerate volumes!\Device\LanmanRedirector\Unable to retrieve volume paths for volume '{}'!\SystemRoot\\Device\Mup\WSL ProcessString environment expansion failed due to unexpected buffer sizeString environment expansion failedCannot open registry keyCannot create registry keyUnable to open registry key handle using NtOpenKeyCannot delete registry keyCannot query kernel mode registry key pathCannot delete registry valueCannot delete registry key treeCannot write key valueCannot query registry valueCannot query registry value dataCannot query registry value sizeCannot query registry data due to value changed too oftenbad variant access0
Source: classification engineClassification label: mal60.evad.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 RegOpenKeyExW,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GlobalMemoryStatusEx,GetDiskFreeSpaceExW,GetSystemTimes,QueryPerformanceCounter,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0055F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,0_2_0055F3A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC0 OpenSCManagerW,OpenServiceW,QueryServiceStatus,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,ControlService,StartServiceW,GetLastError,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,0_2_0000000140048AC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7532
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f2325650-8642-4095-b9f6-a35fd7316fe7Jump to behavior
Source: 6Pk1nTmcHN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 6Pk1nTmcHN.exeReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Users\user\Desktop\6Pk1nTmcHN.exe "C:\Users\user\Desktop\6Pk1nTmcHN.exe"
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7532 -s 1304
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 6Pk1nTmcHN.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 6Pk1nTmcHN.exeStatic file information: File size 1461248 > 1048576
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\avDump.pdb source: 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: real checksum: 0x12d7e1 should be: 0x168df2
Source: 6Pk1nTmcHN.exeStatic PE information: section name: .didat
Source: 6Pk1nTmcHN.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC0 OpenSCManagerW,OpenServiceW,QueryServiceStatus,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,ControlService,StartServiceW,GetLastError,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,0_2_0000000140048AC0
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 rdtsc 0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_00564D00
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-51771
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeAPI coverage: 3.4 %
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000629000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 rdtsc 0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0054CCE0 LdrGetProcedureAddress,0_2_0054CCE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140088100 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000140088100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140015860 OpenProcess,K32GetProcessImageFileNameW,CloseHandle,DebugActiveProcess,DebugSetProcessKillOnExit,WaitForDebugEvent,SetEvent,RtlEnterCriticalSection,RtlLeaveCriticalSection,CloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,OpenProcess,DebugBreakProcess,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle,ContinueDebugEvent,CloseHandle,OpenProcess,ReadProcessMemory,OpenThread,GetThreadContext,DebugSetProcessKillOnExit,CloseHandle,CloseHandle,OpenThread,SetThreadToken,CloseHandle,GetThreadContext,GetSystemTimeAsFileTime,GetFileAttributesExW,CloseHandle,DebugActiveProcessStop,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_0000000140015860
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140088100 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000140088100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140079AD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140079AD8

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: target process: unknownJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: target process: unknownJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: unknown 1Jump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140079FFC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0000000140079FFC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00564D00 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_00564D00
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
14
Windows Service
14
Windows Service
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
22
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
21
Process Injection
21
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Image File Execution Options Injection
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Image File Execution Options Injection
1
Obfuscated Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
6Pk1nTmcHN.exe16%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://weblineinfo.com/0%Avira URL Cloudsafe
https://weblineinfo.com/b30%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
weblineinfo.com
62.192.173.45
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.6.drfalse
    • URL Reputation: safe
    unknown
    https://weblineinfo.com/b36Pk1nTmcHN.exe, 00000000.00000002.2267377258.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000607000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://weblineinfo.com/6Pk1nTmcHN.exe, 00000000.00000002.2267377258.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.0000000000607000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000002.2267377258.00000000005A7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000003.2134580309.00000000005E5000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    62.192.173.45
    weblineinfo.comLithuania
    25780HUGESERVER-NETWORKSUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1509585
    Start date and time:2024-09-11 20:21:12 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 48s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:6Pk1nTmcHN.exe
    renamed because original name is a hash value
    Original Sample Name:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe
    Detection:MAL
    Classification:mal60.evad.winEXE@2/5@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 83%
    • Number of executed functions: 19
    • Number of non-executed functions: 185
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.42.73.29
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: 6Pk1nTmcHN.exe
    TimeTypeDescription
    14:23:04API Interceptor1x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    62.192.173.4510kmr9d7.dllGet hashmaliciousUnknownBrowse
      10kmr9d7.dllGet hashmaliciousUnknownBrowse
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        weblineinfo.com10kmr9d7.dllGet hashmaliciousUnknownBrowse
        • 62.192.173.45
        10kmr9d7.dllGet hashmaliciousUnknownBrowse
        • 62.192.173.45
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        HUGESERVER-NETWORKSUSsbuvJk8Zn8.exeGet hashmaliciousXenoRATBrowse
        • 2.58.85.196
        10kmr9d7.dllGet hashmaliciousUnknownBrowse
        • 62.192.173.45
        10kmr9d7.dllGet hashmaliciousUnknownBrowse
        • 62.192.173.45
        mirai.spc.elfGet hashmaliciousMiraiBrowse
        • 171.22.79.159
        ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
        • 2.58.84.229
        https://denizfirsatgsmtektikbuo.xyz/Get hashmaliciousHTMLPhisherBrowse
        • 2.58.85.5
        x86.elfGet hashmaliciousMirai, MoobotBrowse
        • 107.161.53.91
        lKXAJFq3ih.exeGet hashmaliciousAsyncRATBrowse
        • 2.58.85.145
        peign94sXb.elfGet hashmaliciousUnknownBrowse
        • 171.22.79.111
        jSlv5GLHad.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
        • 185.133.35.50
        No context
        No context
        Process:C:\Windows\System32\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.9441706309359755
        Encrypted:false
        SSDEEP:192:C1LWCicAnq6dQy0FfeciIYj4vOzuiF+Z24lO82w0:rCWnqYQ5FfeciIYjRzuiF+Y4lO82w0
        MD5:0BD45F07EAD2B34BC5BFD41CD9A073E5
        SHA1:F21C3216F90C97AE5946BE872AF14A9157C9C408
        SHA-256:A546BBD8F1643F34F3E3B141E1220D62182208D25A446D35AA5F977B7B0009CB
        SHA-512:263A78863132F2676832B0439CD8DCF0D5ED0813F35CA98138BBFC358BCB7CD6C1CD9350839DA1F40262687D44DC440C411F8BED7E5B9B1A985D02476085A3BF
        Malicious:true
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.5.5.2.5.7.2.1.4.4.9.0.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.5.5.2.5.7.2.5.5.1.1.5.3.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.9.b.f.1.5.4.d.-.c.f.0.5.-.4.a.4.7.-.b.f.6.2.-.2.7.8.d.1.1.8.2.1.6.0.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.c.1.a.d.6.5.-.b.6.1.b.-.4.6.1.7.-.a.d.e.9.-.9.2.e.7.f.c.7.5.6.4.0.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.6.P.k.1.n.T.m.c.H.N...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.v.D.u.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.c.-.0.0.0.1.-.0.0.1.4.-.8.e.5.4.-.d.5.8.7.7.7.0.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.8.9.d.6.e.4.a.b.5.e.c.c.d.1.6.a.2.8.7.1.6.a.6.4.f.2.6.2.0.f.2.0.0.0.0.0.9.0.4.!.0.0.0.0.a.0.6.3.b.e.1.a.8.5.b.b.a.3.f.f.c.6.5.5.5.4.d.3.b.4.c.0.a.e.1.a.4.5.6.3.8.4.5.1.!.6.P.k.1.n.T.m.c.H.N...e.
        Process:C:\Windows\System32\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Wed Sep 11 18:22:52 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):135962
        Entropy (8bit):1.445783875494318
        Encrypted:false
        SSDEEP:192:gAbXe4MKndg8gOK33yxtztf3Oo+j5TRKZl381D+Dty4sEzSDVLmPTvO:DbFn+83K3ixd1y1KZl3++D8Am6LO
        MD5:160067CDDB801D424A4B041CDDD13E1D
        SHA1:EAB7206EA70C59F6C5E9580E0C24D290C2E71C0E
        SHA-256:5526583B80842EAD03C5F35596AC26891D73C13E7F2F699E667CF1F0C3C6E43B
        SHA-512:ACC0F00DB10078C9A2823CDEEE913B1F26942FA0F60D388439E12C1CDA786D7C160797D5B01E6DDEAB1197FF868C0713172FF53E5CEAF4ADD9CA8B5862B9B7AB
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ..........f........................D...............8U..........T.......8...........T............2..B.......................................................................................................eJ..............Lw......................T.......l......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8790
        Entropy (8bit):3.705096949442672
        Encrypted:false
        SSDEEP:192:R6l7wVeJqX7W6Y9fQPgmf6Hc+yprM89bh5sfJrm:R6lXJqrW6Y1QPgmf6Hc++hifI
        MD5:8DAAFD6E480D619A51F9EFB7E2E88A97
        SHA1:692C426B12C8D6A66AF8BAF65A7E87E46868F7D2
        SHA-256:547306A36A0C7BFF8EA4E50C10A152841C49B7B067C4ABC49E686CBE5BAE1FD3
        SHA-512:0670E56A34947A0937CB226A65F7AE8255BECA89F26F71B10715B7CFB5B577D41D2A2DAC11ACC7D8D3038559D39483BCB147281133FE89B20F7563DFC221A4AD
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.3.2.<./.P.i.
        Process:C:\Windows\System32\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4717
        Entropy (8bit):4.466429905670633
        Encrypted:false
        SSDEEP:48:cvIwWl8zseJg771I9g3rWpW8VYvYm8M4JASHFWMyq85qZgLUIaWK0d:uIjfUI7j3a7V7JAgJ+UIaWK0d
        MD5:4CA07DD3D4600112735C90BFDF98AEC6
        SHA1:E073C4026BBCEB886BDC7D0CC3A4FE3312FC1554
        SHA-256:C9C90BFC8A3ECD19CA2A1061BBF2BABF3170B7793EC71776F049C5B3C0371323
        SHA-512:699D5F3BAB34DAFC5F5D7418F5BFF231BF12EABFAE7A89A0FAF573BDBE42FEDFB4B0E135CA96C8860D33568342C10C688BBFDD6A7FD33EBA986948F550E003F3
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="495925" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\System32\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.466059481422838
        Encrypted:false
        SSDEEP:6144:DIXfpi67eLPU9skLmb0b4/WSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbt:UXD94/WlLZMM6YFHt+t
        MD5:837A4F303B02936073530B0D8C6E90DA
        SHA1:C91812599701F39900D1E18E1C38EE89E9B44B83
        SHA-256:CBD27781FE440BBC33E7A88B459FB0BFDCDFE22F1A6D74A7F98B0B6BEF6FC808
        SHA-512:5F06E2A176DDB07A97E55EDCD9A85F599468DD1F2AAC9F5D4828F0C3B71134B2188AAC980C837237995A24BFE20D82270C41A261ADBC066C77B622269C1678A8
        Malicious:false
        Reputation:low
        Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmF...w................................................................................................................................................................................................................................................................................................................................................\..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.9455237392770535
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:6Pk1nTmcHN.exe
        File size:1'461'248 bytes
        MD5:d0d55a8f4965a4d3f661b3ea268f578b
        SHA1:a063be1a85bba3ffc65554d3b4c0ae1a45638451
        SHA256:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda
        SHA512:3f63e14ba2b4dfee860ca307a9e5b18cc7119cda03a474f8820cdfd1ac15d003a7f3e6d95af26e08f2d367c7f9b38f64028a234fadb6b54b5c5d5582a45a3a07
        SSDEEP:24576:tCAMa2xF/U2MtmHZD+4of1c2OhTP4KOqh0lhSMXlCTgnbGJkdV4KN7zc01Octq:VMa2xFs2MgHo4of1cPhbLeKgnbGJIV4w
        TLSH:E065BE1A7BAC00F8D1BEC0B88D67591AEA72785543219BDF57E0DE161F63AE05E3E700
        File Content Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........i.;..oh..oh..oh.zli..oh.zjix.oh.zki..oh...h..oh..ki..oh..li..oh.|ji..oh..ji..oh.p.h..oh..oh..oh.zni..oh..nhX.oh..fi..oh..oi..o
        Icon Hash:cc8d0d191e1e107c
        Entrypoint:0x14005e280
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, GUARD_CF
        Time Stamp:0x65BBAE0A [Thu Feb 1 14:43:22 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:30c7d68b242fb27be994b0b3521d918b
        Signature Valid:
        Signature Issuer:
        Signature Validation Error:
        Error Number:
        Not Before, Not After
          Subject Chain
            Version:
            Thumbprint MD5:
            Thumbprint SHA-1:
            Thumbprint SHA-256:
            Serial:
            Instruction
            dec eax
            sub esp, 28h
            call 00007F277CBCD9C8h
            dec eax
            add esp, 28h
            jmp 00007F277CBB1A93h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            dec eax
            mov dword ptr [esp+10h], ebx
            dec eax
            mov dword ptr [esp+08h], ecx
            push edi
            dec eax
            sub esp, 20h
            dec eax
            mov edi, dword ptr [esp+30h]
            dec eax
            lea edx, dword ptr [0008B7E5h]
            dec eax
            mov ecx, edi
            call 00007F277CBB3032h
            dec eax
            lea eax, dword ptr [0008B856h]
            dec eax
            mov dword ptr [edi], eax
            dec eax
            lea ecx, dword ptr [edi+28h]
            xor eax, eax
            dec eax
            mov dword ptr [edi+28h], eax
            dec eax
            mov dword ptr [edi+30h], eax
            call 00007F277CBB59D1h
            dec eax
            lea ecx, dword ptr [edi+28h]
            call 00007F277CBB59D4h
            dec eax
            mov ebx, dword ptr [esp+38h]
            dec eax
            mov eax, edi
            dec eax
            add esp, 20h
            pop edi
            ret
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            dec eax
            mov dword ptr [esp+08h], ecx
            dec eax
            sub esp, 68h
            dec eax
            mov eax, dword ptr [esp+70h]
            dec eax
            mov ecx, dword ptr [eax+38h]
            dec eax
            test ecx, ecx
            je 00007F277CBB1C65h
            dec eax
            mov eax, dword ptr [ecx]
            dec eax
            mov eax, dword ptr [eax+10h]
            call dword ptr [000553ACh]
            nop
            dec eax
            add esp, 68h
            ret
            call 00007F277CBB49C6h
            nop
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            mov dword ptr [esp+10h], edx
            dec eax
            mov dword ptr [esp+00h], ecx
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x1017500xe4.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1018340x8c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1190000x530cc.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10e0000x8538.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x1274480x2978.rsrc
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x16d0000x14c0.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xe9dd40x8c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xea0000x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xd4ae00x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xb30000x6c0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x1014bc0x40.rdata
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xb145c0xb16001eaabf70aff8e3cc929bbdbf2e5aad9dFalse0.46967219432699087data6.381906257673845IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xb30000x500280x50200ff07adedf636d6bc3ffbc263edcd3727False0.40760591361154447data5.894067518653125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x1040000x91f80x5e0091ca1c15198d6861a02e90789db46d34False0.14261968085106383DOS executable (block device driver)4.538365175655119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x10e0000x85380x8600d733668419143445c8b94be87defbb16False0.49577308768656714data5.949404504623925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .didat0x1170000x500x200701067eceeac6e2ef2c50b8ee0c87575False0.080078125data0.68918657910872IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            _RDATA0x1180000x1f40x2000683c4b4834a30f99b0319cb260168dbFalse0.53515625data4.234704000558715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x1190000x530cc0x532004a91685c811c0b0ca3dacd69b1653b02False0.9509163533834587data7.921776188107435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x16d0000x14c00x1600fe11f6a0fd50e632ba0e66abf1859a99False0.3915127840909091data5.329570431313898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x1193280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.3108108108108108
            RT_ICON0x1194500x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.8648843930635838
            RT_ICON0x1199b80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.25806451612903225
            RT_ICON0x119ca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7454873646209387
            RT_ICON0x11a5480xb6d0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.999423076923077
            RT_ICON0x125c180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7659574468085106
            RT_ICON0x1260800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7971311475409836
            RT_ICON0x126a080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7448405253283302
            RT_ICON0x127ab00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6373443983402489
            RT_ICON0x12a0580x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5634152102031176
            RT_GROUP_ICON0x12e2800x92dataEnglishUnited States0.6917808219178082
            RT_VERSION0x12e3140x374dataEnglishUnited States0.4592760180995475
            RT_ANICURSOR0x12e6880x3d74adata0.9980295723059566
            RT_MANIFEST0x16bdd40x2f6XML 1.0 document, ASCII text, with very long lines (719)EnglishUnited States0.5158311345646438
            DLLImport
            RPCRT4.dllNdrClientCall3, NdrServerCall2, RpcStringBindingComposeW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcServerUseProtseqEpW, I_RpcBindingInqLocalClientPID, RpcStringFreeW, RpcBindingFromStringBindingW, NdrServerCallAll
            SHELL32.dllSHGetFolderPathW
            ntdll.dllNtSystemDebugControl, VerSetConditionMask, RtlPcToFileHeader, RtlCaptureContext, NtClose, NtOpenKey, NtQueryKey, RtlNtStatusToDosError, NtDeleteKey, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlUnwindEx, RtlUnwind
            KERNEL32.dllGetProcessHeap, HeapFree, SetLastError, GetModuleHandleExW, GetCurrentThreadId, Sleep, LocalFree, SetFilePointerEx, UnlockFileEx, LockFileEx, GetFileSizeEx, ReadFile, CompareStringW, GetCurrentThread, WriteFile, InitializeCriticalSectionEx, FlushFileBuffers, GetFileInformationByHandle, GetFullPathNameW, OutputDebugStringA, FileTimeToSystemTime, GetCurrentProcessId, TlsAlloc, TlsGetValue, TlsSetValue, FreeLibrary, GetSystemInfo, QueryPerformanceFrequency, QueryPerformanceCounter, ExpandEnvironmentStringsW, GetFileAttributesW, LoadLibraryExW, GetWindowsDirectoryW, GetSystemDirectoryW, HeapAlloc, VirtualProtect, HeapReAlloc, GlobalMemoryStatusEx, GetExitCodeThread, TlsFree, MoveFileExW, FindClose, CreateDirectoryW, FindFirstFileExW, FindNextFileW, QueryDosDeviceW, GetEnvironmentVariableW, ReleaseSRWLockExclusive, SetFileInformationByHandle, GetDiskFreeSpaceExW, K32GetMappedFileNameW, FindFirstVolumeW, FindNextVolumeW, GetVolumePathNamesForVolumeNameW, FindVolumeClose, VirtualQuery, GetSystemTimes, GetTickCount64, RaiseException, SleepConditionVariableSRW, GetCommandLineA, GetStdHandle, FreeLibraryAndExitThread, ExitThread, CreateThread, InitializeCriticalSectionAndSpinCount, InterlockedPushEntrySList, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleFileNameW, SetConsoleCtrlHandler, SetDllDirectoryW, WaitForSingleObject, GetProcessId, GetNamedPipeServerProcessId, GetFileTime, MultiByteToWideChar, ContinueDebugEvent, DebugActiveProcessStop, GetFileAttributesExW, GetSystemTimeAsFileTime, ReadProcessMemory, OpenThread, DebugBreakProcess, SetEvent, WaitForDebugEvent, DebugSetProcessKillOnExit, DebugActiveProcess, WideCharToMultiByte, VirtualQueryEx, GetThreadContext, K32GetProcessImageFileNameW, K32GetModuleBaseNameW, K32EnumProcessModules, WaitForMultipleObjects, CreateEventW, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, DeleteFileW, VerifyVersionInfoW, K32GetPerformanceInfo, DeviceIoControl, CreateFileW, GetLastError, CloseHandle, OpenProcess, GetProcAddress, GetModuleHandleW, GetCurrentProcess, TerminateProcess, GetCommandLineW, ExitProcess, GetFileType, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleOutputCP, GetConsoleMode, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, HeapSize, WriteConsoleW, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetLocaleInfoEx, LCMapStringEx, EncodePointer, DecodePointer, WakeAllConditionVariable, WakeConditionVariable, GetCPInfo, LoadLibraryExA, GetStringTypeW, WaitForSingleObjectEx, FormatMessageA
            USER32.dllRegisterClassExW, GetClassInfoExW
            ADVAPI32.dllCryptReleaseContext, CryptGenRandom, CryptAcquireContextW, RegDeleteTreeW, RegQueryInfoKeyW, RegDeleteValueW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyExW, StartServiceW, QueryServiceStatus, RevertToSelf, ImpersonateSelf, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, CloseServiceHandle, ControlService, ChangeServiceConfigW, CreateServiceW, DeleteService, OpenServiceW, OpenSCManagerW, StartServiceCtrlDispatcherW, ChangeServiceConfig2W, QueryServiceConfig2W, RegisterServiceCtrlHandlerExW, SetServiceStatus, SetThreadToken
            NameOrdinalAddress
            asw_process_storage_allocate_connector10x14005cbe0
            asw_process_storage_deallocate_connector20x14005cc10
            on_avast_dll_unload30x140056660
            onexit_register_connector_avast_240x14005c9e0
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Sep 11, 2024 20:22:20.168585062 CEST49730443192.168.2.462.192.173.45
            Sep 11, 2024 20:22:20.168622971 CEST4434973062.192.173.45192.168.2.4
            Sep 11, 2024 20:22:20.168690920 CEST49730443192.168.2.462.192.173.45
            Sep 11, 2024 20:22:20.181600094 CEST49730443192.168.2.462.192.173.45
            Sep 11, 2024 20:22:20.181617022 CEST4434973062.192.173.45192.168.2.4
            Sep 11, 2024 20:22:52.234149933 CEST49730443192.168.2.462.192.173.45
            TimestampSource PortDest PortSource IPDest IP
            Sep 11, 2024 20:22:20.124002934 CEST6191553192.168.2.41.1.1.1
            Sep 11, 2024 20:22:20.160938978 CEST53619151.1.1.1192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Sep 11, 2024 20:22:20.124002934 CEST192.168.2.41.1.1.10x62a7Standard query (0)weblineinfo.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Sep 11, 2024 20:22:20.160938978 CEST1.1.1.1192.168.2.40x62a7No error (0)weblineinfo.com62.192.173.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:14:22:16
            Start date:11/09/2024
            Path:C:\Users\user\Desktop\6Pk1nTmcHN.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\6Pk1nTmcHN.exe"
            Imagebase:0x140000000
            File size:1'461'248 bytes
            MD5 hash:D0D55A8F4965A4D3F661B3EA268F578B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:6
            Start time:14:22:52
            Start date:11/09/2024
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 7532 -s 1304
            Imagebase:0x7ff7754b0000
            File size:570'736 bytes
            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:2.1%
              Dynamic/Decrypted Code Coverage:99.2%
              Signature Coverage:29.9%
              Total number of Nodes:923
              Total number of Limit Nodes:35
              execution_graph 51437 547bf0 51438 547c06 51437->51438 51454 542930 51438->51454 51440 547c24 51593 548ed0 51440->51593 51442 547d64 51626 547f70 51442->51626 51444 547d8c 51767 564d00 GetUserNameW GetComputerNameExW 51444->51767 51446 547f54 51447 547da4 51447->51446 51799 574740 51447->51799 51451 547e3b 51451->51446 51452 558c60 CreateFiber 51451->51452 51453 554700 RtlFreeHeap 51451->51453 51803 553d90 7 API calls 51451->51803 51804 548bc0 9 API calls 51451->51804 51452->51451 51453->51451 51805 54ffe0 51454->51805 51460 54f5f5 51460->51440 51461 542943 51461->51460 51877 54cce0 51461->51877 51464 54cce0 LdrGetProcedureAddress 51465 54ee2b 51464->51465 51466 54cce0 LdrGetProcedureAddress 51465->51466 51467 54ee54 51466->51467 51468 54cce0 LdrGetProcedureAddress 51467->51468 51469 54ee73 51468->51469 51470 54cce0 LdrGetProcedureAddress 51469->51470 51471 54ee92 51470->51471 51472 54cce0 LdrGetProcedureAddress 51471->51472 51473 54eeb1 51472->51473 51474 54cce0 LdrGetProcedureAddress 51473->51474 51475 54eed0 51474->51475 51476 54cce0 LdrGetProcedureAddress 51475->51476 51477 54eeef 51476->51477 51478 54cce0 LdrGetProcedureAddress 51477->51478 51479 54ef0e 51478->51479 51480 54cce0 LdrGetProcedureAddress 51479->51480 51481 54ef2d 51480->51481 51482 54cce0 LdrGetProcedureAddress 51481->51482 51483 54ef4c 51482->51483 51484 54cce0 LdrGetProcedureAddress 51483->51484 51485 54ef6b 51484->51485 51486 54cce0 LdrGetProcedureAddress 51485->51486 51487 54ef8a 51486->51487 51488 54cce0 LdrGetProcedureAddress 51487->51488 51489 54efa9 51488->51489 51490 54cce0 LdrGetProcedureAddress 51489->51490 51491 54efc8 51490->51491 51492 54cce0 LdrGetProcedureAddress 51491->51492 51493 54efe7 51492->51493 51494 54cce0 LdrGetProcedureAddress 51493->51494 51495 54f006 51494->51495 51496 54cce0 LdrGetProcedureAddress 51495->51496 51497 54f025 51496->51497 51498 54cce0 LdrGetProcedureAddress 51497->51498 51499 54f044 51498->51499 51500 54cce0 LdrGetProcedureAddress 51499->51500 51501 54f063 51500->51501 51502 54cce0 LdrGetProcedureAddress 51501->51502 51503 54f082 51502->51503 51504 54cce0 LdrGetProcedureAddress 51503->51504 51505 54f0a1 51504->51505 51506 54cce0 LdrGetProcedureAddress 51505->51506 51507 54f0c0 51506->51507 51508 54cce0 LdrGetProcedureAddress 51507->51508 51509 54f0df 51508->51509 51510 54cce0 LdrGetProcedureAddress 51509->51510 51511 54f0fe 51510->51511 51512 54cce0 LdrGetProcedureAddress 51511->51512 51513 54f11d 51512->51513 51514 54cce0 LdrGetProcedureAddress 51513->51514 51515 54f13c 51514->51515 51516 54cce0 LdrGetProcedureAddress 51515->51516 51517 54f15b 51516->51517 51518 54cce0 LdrGetProcedureAddress 51517->51518 51519 54f17a 51518->51519 51520 54cce0 LdrGetProcedureAddress 51519->51520 51521 54f199 51520->51521 51522 54cce0 LdrGetProcedureAddress 51521->51522 51523 54f1b8 51522->51523 51524 54cce0 LdrGetProcedureAddress 51523->51524 51525 54f1d7 51524->51525 51526 54cce0 LdrGetProcedureAddress 51525->51526 51527 54f1f6 51526->51527 51528 54cce0 LdrGetProcedureAddress 51527->51528 51529 54f215 51528->51529 51530 54cce0 LdrGetProcedureAddress 51529->51530 51531 54f234 51530->51531 51532 54cce0 LdrGetProcedureAddress 51531->51532 51533 54f253 51532->51533 51534 54cce0 LdrGetProcedureAddress 51533->51534 51535 54f272 51534->51535 51536 54cce0 LdrGetProcedureAddress 51535->51536 51537 54f291 51536->51537 51538 54cce0 LdrGetProcedureAddress 51537->51538 51539 54f2b0 51538->51539 51540 54cce0 LdrGetProcedureAddress 51539->51540 51541 54f2cf 51540->51541 51542 54cce0 LdrGetProcedureAddress 51541->51542 51543 54f2ee 51542->51543 51544 54cce0 LdrGetProcedureAddress 51543->51544 51545 54f30d 51544->51545 51546 54cce0 LdrGetProcedureAddress 51545->51546 51547 54f32c 51546->51547 51548 54cce0 LdrGetProcedureAddress 51547->51548 51549 54f34b 51548->51549 51550 54cce0 LdrGetProcedureAddress 51549->51550 51551 54f36a 51550->51551 51552 54cce0 LdrGetProcedureAddress 51551->51552 51553 54f389 51552->51553 51554 54cce0 LdrGetProcedureAddress 51553->51554 51555 54f3a8 51554->51555 51556 54cce0 LdrGetProcedureAddress 51555->51556 51557 54f3c7 51556->51557 51558 54cce0 LdrGetProcedureAddress 51557->51558 51559 54f3e6 51558->51559 51560 54cce0 LdrGetProcedureAddress 51559->51560 51561 54f405 51560->51561 51562 54cce0 LdrGetProcedureAddress 51561->51562 51563 54f424 51562->51563 51564 54cce0 LdrGetProcedureAddress 51563->51564 51565 54f443 51564->51565 51566 54cce0 LdrGetProcedureAddress 51565->51566 51567 54f462 51566->51567 51568 54cce0 LdrGetProcedureAddress 51567->51568 51569 54f481 51568->51569 51570 54cce0 LdrGetProcedureAddress 51569->51570 51571 54f4a0 51570->51571 51572 54cce0 LdrGetProcedureAddress 51571->51572 51573 54f4bf 51572->51573 51574 54cce0 LdrGetProcedureAddress 51573->51574 51575 54f4de 51574->51575 51576 54cce0 LdrGetProcedureAddress 51575->51576 51577 54f4fd 51576->51577 51578 54cce0 LdrGetProcedureAddress 51577->51578 51579 54f51c 51578->51579 51580 54cce0 LdrGetProcedureAddress 51579->51580 51581 54f53b 51580->51581 51582 54cce0 LdrGetProcedureAddress 51581->51582 51583 54f55a 51582->51583 51584 54cce0 LdrGetProcedureAddress 51583->51584 51585 54f579 51584->51585 51586 54cce0 LdrGetProcedureAddress 51585->51586 51587 54f598 51586->51587 51588 54cce0 LdrGetProcedureAddress 51587->51588 51589 54f5b7 51588->51589 51590 54cce0 LdrGetProcedureAddress 51589->51590 51591 54f5d6 51590->51591 51592 54cce0 LdrGetProcedureAddress 51591->51592 51592->51460 51881 564ce0 51593->51881 51598 573de0 RtlFreeHeap 51599 5490af 51598->51599 51600 573de0 RtlFreeHeap 51599->51600 51601 549110 51600->51601 51602 573de0 RtlFreeHeap 51601->51602 51603 54916c 51602->51603 51604 573de0 RtlFreeHeap 51603->51604 51605 5491a1 51604->51605 51606 573de0 RtlFreeHeap 51605->51606 51607 5491f1 51606->51607 51608 573de0 RtlFreeHeap 51607->51608 51609 549222 51608->51609 51610 573de0 RtlFreeHeap 51609->51610 51611 54925a 51610->51611 51612 573de0 RtlFreeHeap 51611->51612 51613 5492af 51612->51613 51614 573de0 RtlFreeHeap 51613->51614 51615 5492f1 51614->51615 51616 573de0 RtlFreeHeap 51615->51616 51617 549333 51616->51617 51618 573de0 RtlFreeHeap 51617->51618 51619 549347 51618->51619 51620 573de0 RtlFreeHeap 51619->51620 51621 549362 51620->51621 51622 573de0 RtlFreeHeap 51621->51622 51623 54938e 51622->51623 51624 573de0 RtlFreeHeap 51623->51624 51625 5493c1 51624->51625 51625->51442 51627 547fb8 51626->51627 51628 547f99 51626->51628 51630 547fda 51627->51630 51631 573de0 RtlFreeHeap 51627->51631 51629 573de0 RtlFreeHeap 51628->51629 51629->51627 51891 565560 51630->51891 51631->51630 51635 565560 RtlFreeHeap 51639 548066 51635->51639 51636 548088 51637 565560 RtlFreeHeap 51636->51637 51643 54809c 51637->51643 51638 54802a 51638->51635 51639->51636 51641 56b4e0 RtlFreeHeap 51639->51641 51640 5480be 51642 565560 RtlFreeHeap 51640->51642 51641->51636 51647 5480d2 51642->51647 51643->51640 51644 56b4e0 RtlFreeHeap 51643->51644 51644->51640 51645 5480f4 51646 565560 RtlFreeHeap 51645->51646 51651 548108 51646->51651 51647->51645 51648 56b4e0 RtlFreeHeap 51647->51648 51648->51645 51649 54812a 51650 565560 RtlFreeHeap 51649->51650 51655 54813e 51650->51655 51651->51649 51652 56b4e0 RtlFreeHeap 51651->51652 51652->51649 51653 548160 51654 565560 RtlFreeHeap 51653->51654 51659 548174 51654->51659 51655->51653 51656 56b4e0 RtlFreeHeap 51655->51656 51656->51653 51657 548197 51658 565560 RtlFreeHeap 51657->51658 51663 5481ab 51658->51663 51659->51657 51660 56b4e0 RtlFreeHeap 51659->51660 51660->51657 51661 5481d4 51662 565560 RtlFreeHeap 51661->51662 51664 5481e8 51662->51664 51663->51661 51665 56b4e0 RtlFreeHeap 51663->51665 51666 54823d 51664->51666 51896 55be20 RtlFreeHeap 51664->51896 51665->51661 51667 565560 RtlFreeHeap 51666->51667 51688 548251 51667->51688 51669 548214 51672 56b4e0 RtlFreeHeap 51669->51672 51670 54838a 51671 565560 RtlFreeHeap 51670->51671 51673 54839e 51671->51673 51674 548235 51672->51674 51675 565560 RtlFreeHeap 51673->51675 51676 56b4e0 RtlFreeHeap 51674->51676 51679 5483ba 51675->51679 51676->51666 51677 548430 51678 565560 RtlFreeHeap 51677->51678 51680 548444 51678->51680 51679->51677 51692 56b4e0 RtlFreeHeap 51679->51692 51755 548b86 51679->51755 51681 54846d 51680->51681 51899 55be20 RtlFreeHeap 51680->51899 51687 565560 RtlFreeHeap 51681->51687 51682 548322 51683 54835d 51682->51683 51898 54a050 RtlFreeHeap 51682->51898 51685 56b4e0 RtlFreeHeap 51683->51685 51689 54837d 51685->51689 51691 54848e 51687->51691 51688->51670 51688->51682 51897 54a050 RtlFreeHeap 51688->51897 51693 56b4e0 RtlFreeHeap 51689->51693 51690 548460 51694 56b4e0 RtlFreeHeap 51690->51694 51696 5484b7 51691->51696 51900 55be20 RtlFreeHeap 51691->51900 51697 548423 51692->51697 51693->51670 51694->51681 51701 565560 RtlFreeHeap 51696->51701 51699 56b4e0 RtlFreeHeap 51697->51699 51699->51677 51700 5484aa 51702 56b4e0 RtlFreeHeap 51700->51702 51703 5484d8 51701->51703 51702->51696 51704 548501 51703->51704 51901 55be20 RtlFreeHeap 51703->51901 51706 565560 RtlFreeHeap 51704->51706 51708 548522 51706->51708 51707 5484f4 51709 56b4e0 RtlFreeHeap 51707->51709 51710 54854b 51708->51710 51902 55be20 RtlFreeHeap 51708->51902 51709->51704 51713 565560 RtlFreeHeap 51710->51713 51712 54853e 51714 56b4e0 RtlFreeHeap 51712->51714 51715 54856c 51713->51715 51714->51710 51716 548595 51715->51716 51903 55be20 RtlFreeHeap 51715->51903 51718 565560 RtlFreeHeap 51716->51718 51721 5485b6 51718->51721 51719 548588 51720 56b4e0 RtlFreeHeap 51719->51720 51720->51716 51722 565560 RtlFreeHeap 51721->51722 51723 5485d2 51722->51723 51724 56b4e0 RtlFreeHeap 51723->51724 51723->51755 51725 548625 51724->51725 51726 56b4e0 RtlFreeHeap 51725->51726 51727 54865e 51726->51727 51728 565560 RtlFreeHeap 51727->51728 51731 548672 51728->51731 51729 56b4e0 RtlFreeHeap 51730 548797 51729->51730 51732 56b4e0 RtlFreeHeap 51730->51732 51731->51729 51731->51755 51733 5487a4 51732->51733 51734 565560 RtlFreeHeap 51733->51734 51735 5487b8 51734->51735 51736 56b4e0 RtlFreeHeap 51735->51736 51735->51755 51737 5487ec 51736->51737 51738 565560 RtlFreeHeap 51737->51738 51739 548800 51738->51739 51740 56b4e0 RtlFreeHeap 51739->51740 51739->51755 51741 54882d 51740->51741 51742 565560 RtlFreeHeap 51741->51742 51743 548841 51742->51743 51744 565560 RtlFreeHeap 51743->51744 51745 54885d 51744->51745 51746 56b4e0 RtlFreeHeap 51745->51746 51745->51755 51747 548897 51746->51747 51748 565560 RtlFreeHeap 51747->51748 51749 5488ab 51748->51749 51750 56b4e0 RtlFreeHeap 51749->51750 51749->51755 51751 5489c8 51750->51751 51752 56b4e0 RtlFreeHeap 51751->51752 51753 5489d5 51752->51753 51754 565560 RtlFreeHeap 51753->51754 51764 5489eb 51754->51764 51755->51444 51756 548aec 51766 548b47 51756->51766 51905 55be20 RtlFreeHeap 51756->51905 51757 56b4e0 RtlFreeHeap 51759 548b79 51757->51759 51761 56b4e0 RtlFreeHeap 51759->51761 51761->51755 51762 548b2a 51765 56b4e0 RtlFreeHeap 51762->51765 51763 56b4e0 RtlFreeHeap 51763->51764 51764->51755 51764->51756 51764->51763 51904 55be20 RtlFreeHeap 51764->51904 51765->51766 51766->51757 51768 564dc7 GetComputerNameExW 51767->51768 51769 564db1 51767->51769 51770 564def 51768->51770 51769->51768 51771 564df3 GetTokenInformation 51770->51771 51776 564e4e 51770->51776 51772 564e1c 51771->51772 51771->51776 51773 564e3e 51772->51773 51774 573de0 RtlFreeHeap 51772->51774 51775 573de0 RtlFreeHeap 51773->51775 51774->51773 51775->51776 51906 55dfc0 51776->51906 51779 564eaa GetNativeSystemInfo 51781 564ed3 51779->51781 51782 564ee8 51779->51782 51780 573de0 RtlFreeHeap 51780->51779 51785 573de0 RtlFreeHeap 51781->51785 51782->51781 51783 564f17 51782->51783 51784 573de0 RtlFreeHeap 51783->51784 51786 564f15 51784->51786 51785->51786 51790 573de0 RtlFreeHeap 51786->51790 51792 564f67 51786->51792 51787 564f8f GetAdaptersInfo 51788 564fdd 51787->51788 51789 564fbb 51787->51789 51788->51789 51795 564fea GetAdaptersInfo 51788->51795 51791 56b4e0 RtlFreeHeap 51789->51791 51790->51792 51793 564fc5 51791->51793 51792->51787 51794 56b4e0 RtlFreeHeap 51793->51794 51796 564fcd 51794->51796 51795->51789 51797 564fff 51795->51797 51796->51447 51797->51789 51798 573de0 RtlFreeHeap 51797->51798 51798->51797 51800 574759 51799->51800 51801 5747af 51800->51801 51802 5747ad NtFreeVirtualMemory 51800->51802 51801->51451 51802->51801 51803->51451 51804->51451 51807 54fff9 51805->51807 51806 542939 51825 54f8a0 51806->51825 51807->51806 51808 54cce0 LdrGetProcedureAddress 51807->51808 51809 550072 51808->51809 51810 54cce0 LdrGetProcedureAddress 51809->51810 51811 55008d 51810->51811 51812 54cce0 LdrGetProcedureAddress 51811->51812 51813 5500b6 51812->51813 51814 54cce0 LdrGetProcedureAddress 51813->51814 51815 5500d5 51814->51815 51816 54cce0 LdrGetProcedureAddress 51815->51816 51817 5500f4 51816->51817 51818 54cce0 LdrGetProcedureAddress 51817->51818 51819 550113 51818->51819 51820 54cce0 LdrGetProcedureAddress 51819->51820 51821 550132 51820->51821 51822 54cce0 LdrGetProcedureAddress 51821->51822 51823 550151 51822->51823 51824 54cce0 LdrGetProcedureAddress 51823->51824 51824->51806 51826 54f8da 51825->51826 51827 54293e 51826->51827 51828 54cce0 LdrGetProcedureAddress 51826->51828 51833 553470 51827->51833 51829 54f900 51828->51829 51830 54cce0 LdrGetProcedureAddress 51829->51830 51831 54f91b 51830->51831 51832 54cce0 LdrGetProcedureAddress 51831->51832 51832->51827 51835 553489 51833->51835 51834 553493 51834->51461 51835->51834 51836 54cce0 LdrGetProcedureAddress 51835->51836 51837 553502 51836->51837 51838 54cce0 LdrGetProcedureAddress 51837->51838 51839 55351d 51838->51839 51840 54cce0 LdrGetProcedureAddress 51839->51840 51841 553546 51840->51841 51842 54cce0 LdrGetProcedureAddress 51841->51842 51843 553565 51842->51843 51844 54cce0 LdrGetProcedureAddress 51843->51844 51845 553584 51844->51845 51846 54cce0 LdrGetProcedureAddress 51845->51846 51847 5535a3 51846->51847 51848 54cce0 LdrGetProcedureAddress 51847->51848 51849 5535c2 51848->51849 51850 54cce0 LdrGetProcedureAddress 51849->51850 51851 5535e1 51850->51851 51852 54cce0 LdrGetProcedureAddress 51851->51852 51853 553600 51852->51853 51854 54cce0 LdrGetProcedureAddress 51853->51854 51855 55361f 51854->51855 51856 54cce0 LdrGetProcedureAddress 51855->51856 51857 55363e 51856->51857 51858 54cce0 LdrGetProcedureAddress 51857->51858 51859 55365d 51858->51859 51860 54cce0 LdrGetProcedureAddress 51859->51860 51861 55367c 51860->51861 51862 54cce0 LdrGetProcedureAddress 51861->51862 51863 55369b 51862->51863 51864 54cce0 LdrGetProcedureAddress 51863->51864 51865 5536ba 51864->51865 51866 54cce0 LdrGetProcedureAddress 51865->51866 51867 5536d9 51866->51867 51868 54cce0 LdrGetProcedureAddress 51867->51868 51869 5536f8 51868->51869 51870 54cce0 LdrGetProcedureAddress 51869->51870 51871 553717 51870->51871 51872 54cce0 LdrGetProcedureAddress 51871->51872 51873 553736 51872->51873 51874 54cce0 LdrGetProcedureAddress 51873->51874 51875 553755 51874->51875 51876 54cce0 LdrGetProcedureAddress 51875->51876 51876->51834 51879 54cd1b 51877->51879 51878 54cdbf 51878->51464 51879->51878 51880 54cd9b LdrGetProcedureAddress 51879->51880 51880->51878 51882 548eee CreateMutexExA 51881->51882 51883 573de0 51882->51883 51885 573e14 51883->51885 51884 548f71 51884->51598 51885->51884 51887 56b4e0 51885->51887 51888 56b523 51887->51888 51889 56b4f0 51887->51889 51888->51885 51889->51888 51890 56b511 RtlFreeHeap 51889->51890 51890->51888 51892 548016 51891->51892 51893 56557b 51891->51893 51892->51638 51895 55be20 RtlFreeHeap 51892->51895 51893->51892 51894 56b4e0 RtlFreeHeap 51893->51894 51894->51892 51895->51638 51896->51669 51897->51688 51898->51683 51899->51690 51900->51700 51901->51707 51902->51712 51903->51719 51904->51764 51905->51762 51907 55dff1 51906->51907 51908 55e03d 51907->51908 51909 56b4e0 RtlFreeHeap 51907->51909 51908->51779 51908->51780 51909->51908 51910 5471b0 51911 5471c6 51910->51911 51918 542950 51911->51918 51913 5471f5 51935 574360 51913->51935 51917 54732d 51943 5516a0 51918->51943 51920 542959 52115 5501a0 51920->52115 51922 542963 51923 54cce0 LdrGetProcedureAddress 51922->51923 51934 550f99 51922->51934 51924 550ef8 51923->51924 51925 54cce0 LdrGetProcedureAddress 51924->51925 51926 550f13 51925->51926 51927 54cce0 LdrGetProcedureAddress 51926->51927 51928 550f3c 51927->51928 51929 54cce0 LdrGetProcedureAddress 51928->51929 51930 550f5b 51929->51930 51931 54cce0 LdrGetProcedureAddress 51930->51931 51932 550f7a 51931->51932 51933 54cce0 LdrGetProcedureAddress 51932->51933 51933->51934 51934->51913 51937 5743bd 51935->51937 51936 54730e 51939 574ff0 51936->51939 51937->51936 51938 57444e NtCreateThreadEx 51937->51938 51938->51936 51941 575011 51939->51941 51940 57506c 51940->51917 51941->51940 51942 57506a NtQueueApcThread 51941->51942 51942->51940 51944 5516a9 51943->51944 51945 5521e1 51944->51945 51946 54cce0 LdrGetProcedureAddress 51944->51946 51945->51920 51947 5516c8 51946->51947 51948 54cce0 LdrGetProcedureAddress 51947->51948 51949 5516e0 51948->51949 51950 54cce0 LdrGetProcedureAddress 51949->51950 51951 5516f8 51950->51951 51952 54cce0 LdrGetProcedureAddress 51951->51952 51953 551710 51952->51953 51954 54cce0 LdrGetProcedureAddress 51953->51954 51955 551728 51954->51955 51956 54cce0 LdrGetProcedureAddress 51955->51956 51957 551740 51956->51957 51958 54cce0 LdrGetProcedureAddress 51957->51958 51959 551758 51958->51959 51960 54cce0 LdrGetProcedureAddress 51959->51960 51961 551770 51960->51961 51962 54cce0 LdrGetProcedureAddress 51961->51962 51963 551788 51962->51963 51964 54cce0 LdrGetProcedureAddress 51963->51964 51965 5517a0 51964->51965 51966 54cce0 LdrGetProcedureAddress 51965->51966 51967 5517b8 51966->51967 51968 54cce0 LdrGetProcedureAddress 51967->51968 51969 5517d0 51968->51969 51970 54cce0 LdrGetProcedureAddress 51969->51970 51971 5517e8 51970->51971 51972 54cce0 LdrGetProcedureAddress 51971->51972 51973 551800 51972->51973 51974 54cce0 LdrGetProcedureAddress 51973->51974 51975 551818 51974->51975 51976 54cce0 LdrGetProcedureAddress 51975->51976 51977 551830 51976->51977 51978 54cce0 LdrGetProcedureAddress 51977->51978 51979 551848 51978->51979 51980 54cce0 LdrGetProcedureAddress 51979->51980 51981 551860 51980->51981 51982 54cce0 LdrGetProcedureAddress 51981->51982 51983 551878 51982->51983 51984 54cce0 LdrGetProcedureAddress 51983->51984 51985 551890 51984->51985 51986 54cce0 LdrGetProcedureAddress 51985->51986 51987 5518a8 51986->51987 51988 54cce0 LdrGetProcedureAddress 51987->51988 51989 5518c0 51988->51989 51990 54cce0 LdrGetProcedureAddress 51989->51990 51991 5518d8 51990->51991 51992 54cce0 LdrGetProcedureAddress 51991->51992 51993 5518f0 51992->51993 51994 54cce0 LdrGetProcedureAddress 51993->51994 51995 551908 51994->51995 51996 54cce0 LdrGetProcedureAddress 51995->51996 51997 551920 51996->51997 51998 54cce0 LdrGetProcedureAddress 51997->51998 51999 551938 51998->51999 52000 54cce0 LdrGetProcedureAddress 51999->52000 52001 551950 52000->52001 52002 54cce0 LdrGetProcedureAddress 52001->52002 52003 551968 52002->52003 52004 54cce0 LdrGetProcedureAddress 52003->52004 52005 551980 52004->52005 52006 54cce0 LdrGetProcedureAddress 52005->52006 52007 551998 52006->52007 52008 54cce0 LdrGetProcedureAddress 52007->52008 52009 5519b0 52008->52009 52010 54cce0 LdrGetProcedureAddress 52009->52010 52011 5519c8 52010->52011 52012 54cce0 LdrGetProcedureAddress 52011->52012 52013 5519e0 52012->52013 52014 54cce0 LdrGetProcedureAddress 52013->52014 52015 5519f8 52014->52015 52016 54cce0 LdrGetProcedureAddress 52015->52016 52017 551a10 52016->52017 52018 54cce0 LdrGetProcedureAddress 52017->52018 52019 551a28 52018->52019 52020 54cce0 LdrGetProcedureAddress 52019->52020 52021 551a40 52020->52021 52022 54cce0 LdrGetProcedureAddress 52021->52022 52023 551a58 52022->52023 52024 54cce0 LdrGetProcedureAddress 52023->52024 52025 551a70 52024->52025 52026 54cce0 LdrGetProcedureAddress 52025->52026 52027 551a88 52026->52027 52028 54cce0 LdrGetProcedureAddress 52027->52028 52029 551aa0 52028->52029 52030 54cce0 LdrGetProcedureAddress 52029->52030 52031 551ab8 52030->52031 52032 54cce0 LdrGetProcedureAddress 52031->52032 52033 551ad0 52032->52033 52034 54cce0 LdrGetProcedureAddress 52033->52034 52035 551ae8 52034->52035 52036 54cce0 LdrGetProcedureAddress 52035->52036 52037 551b00 52036->52037 52038 54cce0 LdrGetProcedureAddress 52037->52038 52039 551b18 52038->52039 52040 54cce0 LdrGetProcedureAddress 52039->52040 52041 551b30 52040->52041 52042 54cce0 LdrGetProcedureAddress 52041->52042 52043 551b48 52042->52043 52044 54cce0 LdrGetProcedureAddress 52043->52044 52045 551b60 52044->52045 52046 54cce0 LdrGetProcedureAddress 52045->52046 52047 551b78 52046->52047 52048 54cce0 LdrGetProcedureAddress 52047->52048 52049 551b90 52048->52049 52050 54cce0 LdrGetProcedureAddress 52049->52050 52051 551bc1 52050->52051 52052 54cce0 LdrGetProcedureAddress 52051->52052 52053 551bf2 52052->52053 52054 54cce0 LdrGetProcedureAddress 52053->52054 52055 551c23 52054->52055 52056 54cce0 LdrGetProcedureAddress 52055->52056 52057 551c54 52056->52057 52058 54cce0 LdrGetProcedureAddress 52057->52058 52059 551c85 52058->52059 52060 54cce0 LdrGetProcedureAddress 52059->52060 52061 551cb6 52060->52061 52062 54cce0 LdrGetProcedureAddress 52061->52062 52063 551ce7 52062->52063 52064 54cce0 LdrGetProcedureAddress 52063->52064 52065 551d18 52064->52065 52066 54cce0 LdrGetProcedureAddress 52065->52066 52067 551d49 52066->52067 52068 54cce0 LdrGetProcedureAddress 52067->52068 52069 551d7a 52068->52069 52070 54cce0 LdrGetProcedureAddress 52069->52070 52071 551dab 52070->52071 52072 54cce0 LdrGetProcedureAddress 52071->52072 52073 551ddc 52072->52073 52074 54cce0 LdrGetProcedureAddress 52073->52074 52075 551e0d 52074->52075 52076 54cce0 LdrGetProcedureAddress 52075->52076 52077 551e3e 52076->52077 52078 54cce0 LdrGetProcedureAddress 52077->52078 52079 551e6f 52078->52079 52080 54cce0 LdrGetProcedureAddress 52079->52080 52081 551ea0 52080->52081 52082 54cce0 LdrGetProcedureAddress 52081->52082 52083 551ed1 52082->52083 52084 54cce0 LdrGetProcedureAddress 52083->52084 52085 551f02 52084->52085 52086 54cce0 LdrGetProcedureAddress 52085->52086 52087 551f33 52086->52087 52088 54cce0 LdrGetProcedureAddress 52087->52088 52089 551f64 52088->52089 52090 54cce0 LdrGetProcedureAddress 52089->52090 52091 551f95 52090->52091 52092 54cce0 LdrGetProcedureAddress 52091->52092 52093 551fc6 52092->52093 52094 54cce0 LdrGetProcedureAddress 52093->52094 52095 551ff7 52094->52095 52096 54cce0 LdrGetProcedureAddress 52095->52096 52097 552028 52096->52097 52098 54cce0 LdrGetProcedureAddress 52097->52098 52099 552059 52098->52099 52100 54cce0 LdrGetProcedureAddress 52099->52100 52101 55208a 52100->52101 52102 54cce0 LdrGetProcedureAddress 52101->52102 52103 5520bb 52102->52103 52104 54cce0 LdrGetProcedureAddress 52103->52104 52105 5520ec 52104->52105 52106 54cce0 LdrGetProcedureAddress 52105->52106 52107 55211d 52106->52107 52108 54cce0 LdrGetProcedureAddress 52107->52108 52109 55214e 52108->52109 52110 54cce0 LdrGetProcedureAddress 52109->52110 52111 55217f 52110->52111 52112 54cce0 LdrGetProcedureAddress 52111->52112 52113 5521b0 52112->52113 52114 54cce0 LdrGetProcedureAddress 52113->52114 52114->51945 52116 5501ce 52115->52116 52117 54cce0 LdrGetProcedureAddress 52116->52117 52318 550e4a 52116->52318 52118 550228 52117->52118 52119 54cce0 LdrGetProcedureAddress 52118->52119 52120 550243 52119->52120 52121 54cce0 LdrGetProcedureAddress 52120->52121 52122 55026c 52121->52122 52123 54cce0 LdrGetProcedureAddress 52122->52123 52124 55028b 52123->52124 52125 54cce0 LdrGetProcedureAddress 52124->52125 52126 5502aa 52125->52126 52127 54cce0 LdrGetProcedureAddress 52126->52127 52128 5502c9 52127->52128 52129 54cce0 LdrGetProcedureAddress 52128->52129 52130 5502e8 52129->52130 52131 54cce0 LdrGetProcedureAddress 52130->52131 52132 550307 52131->52132 52133 54cce0 LdrGetProcedureAddress 52132->52133 52134 550326 52133->52134 52135 54cce0 LdrGetProcedureAddress 52134->52135 52136 550345 52135->52136 52137 54cce0 LdrGetProcedureAddress 52136->52137 52138 550364 52137->52138 52139 54cce0 LdrGetProcedureAddress 52138->52139 52140 550383 52139->52140 52141 54cce0 LdrGetProcedureAddress 52140->52141 52142 5503a2 52141->52142 52143 54cce0 LdrGetProcedureAddress 52142->52143 52144 5503c1 52143->52144 52145 54cce0 LdrGetProcedureAddress 52144->52145 52146 5503e0 52145->52146 52147 54cce0 LdrGetProcedureAddress 52146->52147 52148 5503ff 52147->52148 52149 54cce0 LdrGetProcedureAddress 52148->52149 52150 55041e 52149->52150 52151 54cce0 LdrGetProcedureAddress 52150->52151 52152 55043d 52151->52152 52153 54cce0 LdrGetProcedureAddress 52152->52153 52154 55045c 52153->52154 52155 54cce0 LdrGetProcedureAddress 52154->52155 52156 55047b 52155->52156 52157 54cce0 LdrGetProcedureAddress 52156->52157 52158 55049a 52157->52158 52159 54cce0 LdrGetProcedureAddress 52158->52159 52160 5504b9 52159->52160 52161 54cce0 LdrGetProcedureAddress 52160->52161 52162 5504d8 52161->52162 52163 54cce0 LdrGetProcedureAddress 52162->52163 52164 5504f7 52163->52164 52165 54cce0 LdrGetProcedureAddress 52164->52165 52166 550516 52165->52166 52167 54cce0 LdrGetProcedureAddress 52166->52167 52168 550535 52167->52168 52169 54cce0 LdrGetProcedureAddress 52168->52169 52170 550554 52169->52170 52171 54cce0 LdrGetProcedureAddress 52170->52171 52172 550573 52171->52172 52173 54cce0 LdrGetProcedureAddress 52172->52173 52174 550592 52173->52174 52175 54cce0 LdrGetProcedureAddress 52174->52175 52176 5505b1 52175->52176 52177 54cce0 LdrGetProcedureAddress 52176->52177 52178 5505d0 52177->52178 52179 54cce0 LdrGetProcedureAddress 52178->52179 52180 5505ef 52179->52180 52181 54cce0 LdrGetProcedureAddress 52180->52181 52182 55060e 52181->52182 52183 54cce0 LdrGetProcedureAddress 52182->52183 52184 55062d 52183->52184 52185 54cce0 LdrGetProcedureAddress 52184->52185 52186 55064c 52185->52186 52187 54cce0 LdrGetProcedureAddress 52186->52187 52188 55066b 52187->52188 52189 54cce0 LdrGetProcedureAddress 52188->52189 52190 55068a 52189->52190 52191 54cce0 LdrGetProcedureAddress 52190->52191 52192 5506a9 52191->52192 52193 54cce0 LdrGetProcedureAddress 52192->52193 52194 5506c8 52193->52194 52195 54cce0 LdrGetProcedureAddress 52194->52195 52196 5506e7 52195->52196 52197 54cce0 LdrGetProcedureAddress 52196->52197 52198 550706 52197->52198 52199 54cce0 LdrGetProcedureAddress 52198->52199 52200 550725 52199->52200 52201 54cce0 LdrGetProcedureAddress 52200->52201 52202 550744 52201->52202 52203 54cce0 LdrGetProcedureAddress 52202->52203 52204 550763 52203->52204 52205 54cce0 LdrGetProcedureAddress 52204->52205 52206 550782 52205->52206 52207 54cce0 LdrGetProcedureAddress 52206->52207 52208 5507a1 52207->52208 52209 54cce0 LdrGetProcedureAddress 52208->52209 52210 5507c0 52209->52210 52211 54cce0 LdrGetProcedureAddress 52210->52211 52212 5507df 52211->52212 52213 54cce0 LdrGetProcedureAddress 52212->52213 52214 5507fe 52213->52214 52215 54cce0 LdrGetProcedureAddress 52214->52215 52216 55081d 52215->52216 52217 54cce0 LdrGetProcedureAddress 52216->52217 52218 55083c 52217->52218 52219 54cce0 LdrGetProcedureAddress 52218->52219 52220 55085b 52219->52220 52221 54cce0 LdrGetProcedureAddress 52220->52221 52222 55087a 52221->52222 52223 54cce0 LdrGetProcedureAddress 52222->52223 52224 550899 52223->52224 52225 54cce0 LdrGetProcedureAddress 52224->52225 52226 5508b8 52225->52226 52227 54cce0 LdrGetProcedureAddress 52226->52227 52228 5508d7 52227->52228 52229 54cce0 LdrGetProcedureAddress 52228->52229 52230 5508f6 52229->52230 52231 54cce0 LdrGetProcedureAddress 52230->52231 52232 550915 52231->52232 52233 54cce0 LdrGetProcedureAddress 52232->52233 52234 550934 52233->52234 52235 54cce0 LdrGetProcedureAddress 52234->52235 52236 550953 52235->52236 52237 54cce0 LdrGetProcedureAddress 52236->52237 52238 550972 52237->52238 52239 54cce0 LdrGetProcedureAddress 52238->52239 52240 550991 52239->52240 52241 54cce0 LdrGetProcedureAddress 52240->52241 52242 5509b0 52241->52242 52243 54cce0 LdrGetProcedureAddress 52242->52243 52244 5509cf 52243->52244 52245 54cce0 LdrGetProcedureAddress 52244->52245 52246 5509ee 52245->52246 52247 54cce0 LdrGetProcedureAddress 52246->52247 52248 550a0d 52247->52248 52249 54cce0 LdrGetProcedureAddress 52248->52249 52250 550a2c 52249->52250 52251 54cce0 LdrGetProcedureAddress 52250->52251 52252 550a4b 52251->52252 52253 54cce0 LdrGetProcedureAddress 52252->52253 52254 550a6a 52253->52254 52255 54cce0 LdrGetProcedureAddress 52254->52255 52256 550a89 52255->52256 52257 54cce0 LdrGetProcedureAddress 52256->52257 52258 550aa8 52257->52258 52259 54cce0 LdrGetProcedureAddress 52258->52259 52260 550ac7 52259->52260 52261 54cce0 LdrGetProcedureAddress 52260->52261 52262 550ae6 52261->52262 52263 54cce0 LdrGetProcedureAddress 52262->52263 52264 550b05 52263->52264 52265 54cce0 LdrGetProcedureAddress 52264->52265 52266 550b24 52265->52266 52267 54cce0 LdrGetProcedureAddress 52266->52267 52268 550b43 52267->52268 52269 54cce0 LdrGetProcedureAddress 52268->52269 52270 550b62 52269->52270 52271 54cce0 LdrGetProcedureAddress 52270->52271 52272 550b81 52271->52272 52273 54cce0 LdrGetProcedureAddress 52272->52273 52274 550ba0 52273->52274 52275 54cce0 LdrGetProcedureAddress 52274->52275 52276 550bbf 52275->52276 52277 54cce0 LdrGetProcedureAddress 52276->52277 52278 550bde 52277->52278 52279 54cce0 LdrGetProcedureAddress 52278->52279 52280 550bfd 52279->52280 52281 54cce0 LdrGetProcedureAddress 52280->52281 52282 550c1c 52281->52282 52283 54cce0 LdrGetProcedureAddress 52282->52283 52284 550c3b 52283->52284 52285 54cce0 LdrGetProcedureAddress 52284->52285 52286 550c5a 52285->52286 52287 54cce0 LdrGetProcedureAddress 52286->52287 52288 550c79 52287->52288 52289 54cce0 LdrGetProcedureAddress 52288->52289 52290 550c98 52289->52290 52291 54cce0 LdrGetProcedureAddress 52290->52291 52292 550cb7 52291->52292 52293 54cce0 LdrGetProcedureAddress 52292->52293 52294 550cd6 52293->52294 52295 54cce0 LdrGetProcedureAddress 52294->52295 52296 550cf5 52295->52296 52297 54cce0 LdrGetProcedureAddress 52296->52297 52298 550d14 52297->52298 52299 54cce0 LdrGetProcedureAddress 52298->52299 52300 550d33 52299->52300 52301 54cce0 LdrGetProcedureAddress 52300->52301 52302 550d52 52301->52302 52303 54cce0 LdrGetProcedureAddress 52302->52303 52304 550d71 52303->52304 52305 54cce0 LdrGetProcedureAddress 52304->52305 52306 550d90 52305->52306 52307 54cce0 LdrGetProcedureAddress 52306->52307 52308 550daf 52307->52308 52309 54cce0 LdrGetProcedureAddress 52308->52309 52310 550dce 52309->52310 52311 54cce0 LdrGetProcedureAddress 52310->52311 52312 550ded 52311->52312 52313 54cce0 LdrGetProcedureAddress 52312->52313 52314 550e0c 52313->52314 52315 54cce0 LdrGetProcedureAddress 52314->52315 52316 550e2b 52315->52316 52317 54cce0 LdrGetProcedureAddress 52316->52317 52317->52318 52318->51922 52319 547830 52320 547885 52319->52320 52321 54788a InternetOpenW 52319->52321 52320->52321 52322 547898 InternetConnectW 52321->52322 52338 547aed 52321->52338 52323 5478dd HttpOpenRequestW 52322->52323 52322->52338 52326 547931 52323->52326 52323->52338 52324 547b0e InternetCloseHandle 52327 547b17 52324->52327 52325 547b60 52329 5479cb HttpSendRequestA 52326->52329 52326->52338 52327->52325 52328 547b56 52327->52328 52330 547b8c 52327->52330 52328->52325 52331 56b4e0 RtlFreeHeap 52328->52331 52332 5479e4 52329->52332 52329->52338 52340 54a050 RtlFreeHeap 52330->52340 52331->52325 52335 56b4e0 RtlFreeHeap 52332->52335 52339 547a24 52332->52339 52334 547ba4 52336 56b4e0 RtlFreeHeap 52334->52336 52335->52339 52336->52325 52337 56b4e0 RtlFreeHeap 52337->52338 52338->52324 52338->52327 52339->52337 52340->52334 52341 5555c0 52345 555609 52341->52345 52342 574360 NtCreateThreadEx 52343 555795 52342->52343 52376 555eed 52343->52376 52377 5745f0 52343->52377 52345->52342 52345->52376 52346 5557d1 52346->52376 52381 55f3a0 52346->52381 52349 574ff0 NtQueueApcThread 52350 555e84 52349->52350 52351 574ff0 NtQueueApcThread 52350->52351 52350->52376 52352 555eb0 52351->52352 52353 555ec5 52352->52353 52354 574ff0 NtQueueApcThread 52352->52354 52352->52376 52355 574ff0 NtQueueApcThread 52353->52355 52353->52376 52356 555f0e 52354->52356 52357 555ee9 52355->52357 52358 574ff0 NtQueueApcThread 52356->52358 52356->52376 52359 574ff0 NtQueueApcThread 52357->52359 52357->52376 52358->52353 52360 555f67 52359->52360 52361 574ff0 NtQueueApcThread 52360->52361 52360->52376 52362 555f93 52361->52362 52363 574ff0 NtQueueApcThread 52362->52363 52362->52376 52364 555fbf 52363->52364 52365 555fd4 52364->52365 52367 574ff0 NtQueueApcThread 52364->52367 52364->52376 52366 574ff0 NtQueueApcThread 52365->52366 52365->52376 52368 555ff8 52366->52368 52367->52365 52369 556033 52368->52369 52370 574ff0 NtQueueApcThread 52368->52370 52368->52376 52371 574ff0 NtQueueApcThread 52369->52371 52369->52376 52370->52369 52372 556057 52371->52372 52373 574ff0 NtQueueApcThread 52372->52373 52372->52376 52374 5560a9 52373->52374 52375 574ff0 NtQueueApcThread 52374->52375 52374->52376 52375->52376 52379 574621 52377->52379 52378 574686 52378->52346 52379->52378 52380 574684 NtDuplicateObject 52379->52380 52380->52378 52382 55f3bd 52381->52382 52383 55f3f2 CreateToolhelp32Snapshot 52382->52383 52384 55f610 52383->52384 52385 55f418 Thread32First 52383->52385 52386 56b4e0 RtlFreeHeap 52384->52386 52385->52384 52392 55f439 52385->52392 52388 55f61c 52386->52388 52387 55f5fc Thread32Next 52387->52384 52387->52392 52389 555871 52388->52389 52390 56b4e0 RtlFreeHeap 52388->52390 52389->52349 52389->52376 52390->52389 52392->52387 52393 55f5fa NtResumeThread 52392->52393 52394 5751c0 52392->52394 52393->52387 52396 5751e2 52394->52396 52395 57523e 52395->52392 52396->52395 52397 57523c NtReadVirtualMemory 52396->52397 52397->52395 52398 14009a1b0 52399 14009a1c1 memcpy_s 52398->52399 52400 14009a212 52399->52400 52401 14009a1f6 RtlAllocateHeap 52399->52401 52405 140097b04 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 52399->52405 52406 140091a90 11 API calls memcpy_s 52400->52406 52401->52399 52402 14009a210 52401->52402 52405->52399 52406->52402

              Control-flow Graph

              APIs
              • GetUserNameW.ADVAPI32 ref: 00564D92
              • GetComputerNameExW.KERNELBASE ref: 00564DA7
              • GetComputerNameExW.KERNELBASE ref: 00564DD6
              • GetTokenInformation.KERNELBASE ref: 00564E12
              • GetNativeSystemInfo.KERNELBASE ref: 00564EC4
              • GetAdaptersInfo.IPHLPAPI ref: 00564FB0
              • GetAdaptersInfo.IPHLPAPI ref: 00564FF5
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
              • String ID:
              • API String ID: 1596153048-0
              • Opcode ID: 734901508a68811e876b4a3c5d65e8c7476ff381839600de737bf5e9afc0d482
              • Instruction ID: e62d65898a771a9ef5abf501b139d5adb964a1e7b0f82a26450b1308bab561fc
              • Opcode Fuzzy Hash: 734901508a68811e876b4a3c5d65e8c7476ff381839600de737bf5e9afc0d482
              • Instruction Fuzzy Hash: 66918331218B488FDB54AB14E85A7DABBE5FBD4300F40852DE84EC3291DB79DA45CB83

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 142 55f3a0-55f412 call 56b4c0 * 2 CreateToolhelp32Snapshot 149 55f610-55f621 call 56b4e0 call 574000 142->149 150 55f418-55f433 Thread32First 142->150 160 55f626-55f630 call 574000 149->160 150->149 152 55f439-55f447 150->152 154 55f44b-55f452 152->154 156 55f5fc-55f60a Thread32Next 154->156 157 55f458-55f463 154->157 156->149 156->154 157->156 159 55f469-55f4d8 call 574b50 157->159 159->156 165 55f4de-55f4f2 call 575480 159->165 167 55f632-55f637 160->167 168 55f639-55f643 call 56b4e0 160->168 165->156 172 55f4f8-55f52e call 574df0 165->172 170 55f645-55f658 167->170 168->170 172->156 176 55f534-55f56f call 5751c0 172->176 176->156 179 55f575-55f586 call 5747d0 176->179 179->156 182 55f588-55f5f5 call 541000 call 5644a0 call 575270 179->182 188 55f5fa NtResumeThread 182->188 188->156
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Thread32$CreateFirstNextSnapshotToolhelp32
              • String ID: 0
              • API String ID: 3779972765-4108050209
              • Opcode ID: 6a3b6698b668788de6e2e14965d81c56222b994650be3d337df0d4b3b48050f1
              • Instruction ID: ae881e95b2b167ad6ba6ffd9271811dd4ce758313075484efa73158087fb26bc
              • Opcode Fuzzy Hash: 6a3b6698b668788de6e2e14965d81c56222b994650be3d337df0d4b3b48050f1
              • Instruction Fuzzy Hash: 3C61A170218B498FD794EF29D459BAABBD1FBC8301F50456DA58EC3251EB70E849CB42

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 263 54cce0-54cd19 264 54cd1b-54cd1f 263->264 265 54cd25-54cd48 call 557d90 264->265 266 54cdcc 264->266 270 54cdc4-54cdc7 265->270 271 54cd4a-54cd63 265->271 267 54cdce-54cdde 266->267 270->264 272 54cd65-54cd6d 271->272 273 54cdbf-54cdc2 271->273 272->273 274 54cd6f-54cdbd call 571270 * 2 LdrGetProcedureAddress 272->274 273->267 274->267
              APIs
              • LdrGetProcedureAddress.NTDLL ref: 0054CDB2
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID:
              • API String ID: 3653107232-0
              • Opcode ID: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
              • Instruction ID: 609f2637104ea4e17c3a67b5a5699a88449bb373e3abf4441f66ed0b817981ab
              • Opcode Fuzzy Hash: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
              • Instruction Fuzzy Hash: E7319371518B484BC768AF18DC4A6BABBF4FB85715F50062EE58AC3211EA30A84687C7

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 361 5471b0-547204 call 564ce0 call 542950 367 547294-54734b call 574070 call 574360 call 574ff0 call 573ec0 call 574000 361->367 368 54720a-54721c 361->368 387 547350-547362 call 574000 367->387 370 547247 368->370 371 54721e-547245 call 558bd0 368->371 373 547249-547253 370->373 371->367 373->371 376 547255-547292 373->376 376->373
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
              • Instruction ID: 5836f0d75d75a6580efa51b351c2fbfb4e67970dab32c0aa2d58962f55439aaa
              • Opcode Fuzzy Hash: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
              • Instruction Fuzzy Hash: 0141CA70128B498FE348DF28D8597AAB7E1FB88314F60466DF45AC33D5CB788845CB82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 390 574360-5743bb 391 5743d3-5743ea 390->391 392 5743bd-5743d0 390->392 393 5744a4-5744bc 391->393 394 5743f0-57440f call 54e050 391->394 392->391 398 574411-574419 394->398 399 574450-57449d 394->399 398->399 400 57441b-574449 call 54101b 398->400 399->393 402 57444e NtCreateThreadEx 400->402 402->399
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
              • Instruction ID: 46767379a209d6da832d6d34ed81c263d5baae9cde09a54934bc946099c7bc48
              • Opcode Fuzzy Hash: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
              • Instruction Fuzzy Hash: 97411AB151CB488FE7789F08A8467EABBE0FB99720F10491FD5C983211D775A4828BC7

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 431 5745f0-57461f 432 574621-57462a 431->432 433 57462d-57463f 431->433 432->433 434 574641-57465b call 54e050 433->434 435 5746ae-5746bc 433->435 439 574686-5746a7 434->439 440 57465d-574665 434->440 439->435 440->439 441 574667-57467f call 54102a 440->441 443 574684 NtDuplicateObject 441->443 443->439
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
              • Instruction ID: 00dc4e4573b03f131e6082d57b474dc9e687b50287b6f3ffd16ae3edc61c5856
              • Opcode Fuzzy Hash: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
              • Instruction Fuzzy Hash: 90216F7161DB459FE714DF08A8466AABBE4FB88721F20491FE44DC3320D774A880CB83

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 444 5751c0-5751e0 445 5751e2-5751e9 444->445 446 5751ec-5751fe 444->446 445->446 447 575257-575263 446->447 448 575200-57521a call 54e050 446->448 452 57523e-575250 448->452 453 57521c-575224 448->453 452->447 453->452 454 575226-575237 call 541045 453->454 456 57523c NtReadVirtualMemory 454->456 456->452
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
              • Instruction ID: a45009ccfb315e1d29fd44f78f7dd3612d025a98a5f13210ca318839d4caac36
              • Opcode Fuzzy Hash: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
              • Instruction Fuzzy Hash: FB11A370658F498FDB14EF08A8477A977E4F789715F80482EE88DC2251E6B5D881CB83

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 457 557a50-557a8b call 5747d0 460 557ac1-557ac2 457->460 461 557a8d 457->461 462 557aca-557af9 call 5752f0 460->462 463 557aa3-557aa6 461->463 464 557a8f-557a91 461->464 469 557afe-557b0c 462->469 463->462 465 557aa8-557ab4 463->465 467 557ab6-557abf 464->467 468 557a93-557a96 464->468 465->462 467->462 468->462 470 557a98-557aa1 468->470 470->462
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
              • Instruction ID: 42b029607dbbea6da512d78b1e60a27f3c5cbfedff9e0849f5d124f583574c2c
              • Opcode Fuzzy Hash: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
              • Instruction Fuzzy Hash: 2811E07012CB4C5FE7249A18E84A37ABBC8F788315F58051EFD89C2281DBB5968D8683
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
              • Instruction ID: 8687e283d0f366319dd6a38304ab779f03fb1323c6a00c05d12904cf7f24ac23
              • Opcode Fuzzy Hash: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
              • Instruction Fuzzy Hash: 4B117330628F498FDB18DF58A84BAAA7BE0F798755F40481EE449C2250E675A880CBC3
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
              • Instruction ID: 80a893bc53cad12561a0c4fc22800a8656a940b7f824c4bd16a8725e799643f4
              • Opcode Fuzzy Hash: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
              • Instruction Fuzzy Hash: 8D01B530628B458FEB0CEB18A4076B67BE1F789710F10891EE44EC3651DB79E9818F83
              Memory Dump Source
              • Source File: 00000000.00000003.1810019754.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
              • Instruction ID: 4ea7449681efce282d2670d86deeb029b1950ded4b223f0d262e585cfb931f00
              • Opcode Fuzzy Hash: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
              • Instruction Fuzzy Hash: 80F044B0628B448BD744DF2984CA6357BE1FBDC755F24452EE899C7361CB359842CB43
              Memory Dump Source
              • Source File: 00000000.00000003.1810019754.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
              • Instruction ID: addb20d51f7e1123cb2fe26cb62f261bcd7b5fe4b925cc89dce0e44594c390fd
              • Opcode Fuzzy Hash: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
              • Instruction Fuzzy Hash: 59F08270A28F444BCB04AF2C884A63A77E1FBE8645F54462EE848D7361DB35E942CB43
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
              • Instruction ID: 8af4767039d6c4e93a9c6b203bf5a8f214f5fa15c3a351f693eacf1a27928cac
              • Opcode Fuzzy Hash: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
              • Instruction Fuzzy Hash: 8DD0A9B248DB198EE7209AA8F8873E8B3D0F780328F40882EC18CC2043E67E40468706

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 547830-547883 68 547885-547888 67->68 69 54788a-547892 InternetOpenW 67->69 68->69 70 547898-5478d7 InternetConnectW 69->70 71 547af9-547afd 69->71 70->71 72 5478dd-54792b HttpOpenRequestW 70->72 73 547aff-547b0c 71->73 72->73 74 547931-54793b 72->74 75 547b17-547b1a 73->75 76 547b0e-547b11 InternetCloseHandle 73->76 77 547990-5479ab 74->77 78 54793d-547945 74->78 79 547b25-547b28 75->79 80 547b1c-547b1d 75->80 76->75 77->73 90 5479b1-5479ba 77->90 78->77 83 547947-54798b call 572750 * 2 78->83 81 547b33-547b3b 79->81 82 547b2a-547b2b 79->82 80->79 84 547bd0-547be3 81->84 85 547b41-547b4b 81->85 82->81 83->77 88 547b62-547b73 85->88 89 547b4d-547b54 call 571230 85->89 95 547b75-547b78 88->95 96 547b7a-547b8a call 54cb60 88->96 89->88 102 547b56-547b60 call 56b4e0 89->102 93 5479e6-547a0a 90->93 94 5479bc-5479de call 571270 HttpSendRequestA 90->94 111 547a0c 93->111 94->73 110 5479e4-547a16 94->110 95->84 95->96 106 547b8c-547bb8 call 54a050 call 56b4e0 96->106 107 547bba-547bce call 571410 96->107 102->84 106->84 107->84 107->102 116 547a24-547a3b call 56b4c0 110->116 117 547a18-547a1f call 56b4e0 110->117 111->94 125 547a3f-547a5b 116->125 117->116 127 547a61-547a69 125->127 128 547ae3-547af7 call 56b4e0 125->128 127->128 130 547a6b-547a7e 127->130 128->76 130->128 133 547a80-547a86 130->133 133->128 134 547a88-547a96 133->134 135 547aac-547aaf call 56b4c0 134->135 136 547a98-547aaa 134->136 139 547ab4-547ade call 5644a0 135->139 136->139 139->125
              APIs
              • InternetOpenW.WININET ref: 0054788A
              • InternetConnectW.WININET ref: 005478CB
              • HttpOpenRequestW.WININET ref: 0054791F
              • HttpSendRequestA.WININET ref: 005479DA
              • InternetCloseHandle.WININET ref: 00547B11
                • Part of subcall function 0056B4E0: RtlFreeHeap.NTDLL ref: 0056B51D
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Internet$HttpOpenRequest$CloseConnectFreeHandleHeapSend
              • String ID:
              • API String ID: 3224957877-0
              • Opcode ID: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
              • Instruction ID: 889d82fd99b585441effcd4ffa5399d10d8778e1131568d3adb1c8dd99e4ed4b
              • Opcode Fuzzy Hash: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
              • Instruction Fuzzy Hash: 9DA1B43021CA0D8FEB14EF19D8597AABBE5FB98344F04456DE88AC3295EF74D841C782
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1810019754.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
              • Instruction ID: 942d3d408808ab8b33129023ebd1494536d369ce030809ab161135f4121942f5
              • Opcode Fuzzy Hash: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
              • Instruction Fuzzy Hash: D5A1953161CB088FDB54EF1CD885BAABBE1FB98710F50456DE48AC7265DB34E845CB82

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 189 548ed0-548fc1 call 564ce0 CreateMutexExA call 573de0 194 548fc7-549007 189->194 194->194 195 549009-5493d0 call 573de0 * 14 194->195
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CreateMutex
              • String ID:
              • API String ID: 1964310414-0
              • Opcode ID: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
              • Instruction ID: 6302e4d2db1d7feafafddfd2abf8f8aa329286d39c56fd30b26da984fc41e915
              • Opcode Fuzzy Hash: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
              • Instruction Fuzzy Hash: 25E12271418A0D8FE751EF14E895BA6BBF4F7A8350F20467BE84EC3161DB389245CB86

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 224 558c60-558ca3 call 541000 227 558d34-558d43 224->227 228 558ca9-558cb9 224->228 237 558e2e-558e3a 227->237 229 558cf3-558cf8 228->229 230 558cbb-558ced call 541104 228->230 231 558d1f-558d2f 229->231 232 558cfa-558d09 229->232 230->229 231->237 236 558d0b-558d0f 232->236 238 558d11-558d18 236->238 239 558d48-558d54 236->239 238->236 241 558d1a-558de2 call 5466c0 238->241 243 558d5d-558d64 239->243 256 558de4-558df6 241->256 257 558df9-558e0b CreateFiber 241->257 244 558d66-558d79 243->244 245 558d91-558d98 243->245 244->245 250 558d7b-558d80 244->250 245->243 246 558d9a 245->246 246->237 250->245 252 558d82-558d8b call 574000 250->252 252->245 256->257 258 558e13-558e2d call 5466c0 257->258 258->237
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CreateFiber
              • String ID:
              • API String ID: 3765768292-0
              • Opcode ID: 93f026081dbdd0704688566a40b49887aa3b7977c0bffc28660abc2339b77c2a
              • Instruction ID: 5cf6cd1dc387535efc2aae2398a98c6773034a741881762872e9959c1217a2bb
              • Opcode Fuzzy Hash: 93f026081dbdd0704688566a40b49887aa3b7977c0bffc28660abc2339b77c2a
              • Instruction Fuzzy Hash: 6E5105306189184FDB68AB289C5A7B577E5FB58311F20072AED9BD32E1DE349C4687C2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 339 14009a1b0-14009a1bf 340 14009a1cf-14009a1df 339->340 341 14009a1c1-14009a1cd 339->341 343 14009a1f6-14009a20e RtlAllocateHeap 340->343 341->340 342 14009a212-14009a21d call 140091a90 341->342 347 14009a21f-14009a224 342->347 344 14009a210 343->344 345 14009a1e1-14009a1e8 call 14009564c 343->345 344->347 345->342 351 14009a1ea-14009a1f4 call 140097b04 345->351 351->342 351->343
              APIs
              • RtlAllocateHeap.NTDLL(?,?,00000000,0000000140098926,?,?,?,000000014008808F,?,?,00000000,000000014008832A), ref: 000000014009A205
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 9f54f83c219c4149c215936c9b1e3b5a93792f556c5099100a8e44297067ea87
              • Instruction ID: feed11c58d774232235c950f9d55905fdae63acc7960014812c9abe5af6e187b
              • Opcode Fuzzy Hash: 9f54f83c219c4149c215936c9b1e3b5a93792f556c5099100a8e44297067ea87
              • Instruction Fuzzy Hash: B2F0BEB034260040FE9B9BA799013E612946B9EBC4F4C44307F0A873F2EE3CC8808260

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 354 56b4e0-56b4ee 355 56b523-56b52f 354->355 356 56b4f0-56b505 354->356 356->355 358 56b507-56b51d call 564ce0 RtlFreeHeap 356->358 358->355
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
              • Instruction ID: 06e85caafc931007824396e398c789955b00ba606ee244ddae01f421716fc343
              • Opcode Fuzzy Hash: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
              • Instruction Fuzzy Hash: E9F01C30311A098BFB28E7BAACC876137E2FB9D3417448054A406C7254EB389841CB01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Service$ErrorLast$HandleOpen$Close$BindingConditionConfig2ManagerMaskServerStringUnregister_invalid_parameter_noinfo_noreturn$CtrlFileModuleQuery$AddressAttributesChangeComposeConsoleControlCreateDeleteDirectoryDispatcherFreeFromHandlerInfoNameObjectProcSingleStartVerifyVersionWait_invalid_parameter_noinfo
              • String ID: " /runassvc$*$/register$/runasapp$/runassvc$/unregister$6373$:$AvDumper$ControlService(SERVICE_CONTROL_UNREGISTER) failure: gle={}$Debugger app is starting.$Debugger service is starting.$DeleteService(self) failure: gle={}$E502$Logs$OpenSCManager failure: gle={}$OpenService failure: gle={}$ProfSvc_Group$RpcSS$RpcSs$SYSTEM\CurrentControlSet\Services\$ServicesActive$SetDefaultDllDirectories$StartServer failure: retval={}$StartServiceCtrlDispatcher failure: gle={}$Unable to create debugger rpc endpoint!$Unable to create service '{}'!$Unable to modify debugger service binary path!$Unable to modify debugger service configuration using c_ChangeConfig!$Unable to open service '{}'!$Unable to open the service control manager!$Unable to query own process module path!$Unable to set debug service as antimalware process!$kernel32.dll$ncalrpc
              • API String ID: 3192065050-1795711860
              • Opcode ID: ea9b68894bb3cbd4bb5cf007b3b3174e66252b921e17b0a0989a0938eb955c47
              • Instruction ID: 932e22e956f5bd5acfd8ba59a66f833d8126d0bb355dcdbcc5ae485dd3a19278
              • Opcode Fuzzy Hash: ea9b68894bb3cbd4bb5cf007b3b3174e66252b921e17b0a0989a0938eb955c47
              • Instruction Fuzzy Hash: 3BD24D72619BC496EB62DF26E8503DA73A0F78DB80F508115EB8D43AB9DF38C585CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Process$CloseDebugHandle$Open$CriticalSection$Event_invalid_parameter_noinfo_noreturn$ActiveEnterErrorLastLeaveNameThread$BaseBreakContextContinueEnumExitFileImageKillMemoryModuleModulesReadStopWait__std_exception_destroy
              • String ID: - Cause: $ PID: $*$689A$689A$689A$689A$689A$689A$689A$@$Cause: VectoredExceptionHandler$Debugger attached to process: $Debugger exception 0x{:08X} successfully dumped process {} into '{}' (dump level: {})$Debugging of own process is not supported$EXCEPTION_DEBUG_EVENT Process:{} Thread:{} Exception:0x{:08X} FirstChance:{} ExceptionFlags:0x{:08X}$Event:{} Process:{} Thread:{}$F59A$F59A$F59A$F59A$F59A$F59A$F59A$H$Process exited: {}, PID: {}, Exit Code: {}$RIP_EVENT occurred {}:{}!$U$Unable to disable kill on exit$Unable to start debugging of process with id {}, error code: {}$Unable to wait for debugging event of process with id {}, error code: {}$d$unp%u%ux-manual.mdmp$unp%u%ux-unhandled.mdmp$verifier.dll
              • API String ID: 1934789087-895941338
              • Opcode ID: 52befe47cdb3fd150a0f9306a4cabdf493931040b5e64e686eb257149541a435
              • Instruction ID: 0058b21d05951af80c70cb3c119dfb6efd6361c6d656cde952f6fdf10c487868
              • Opcode Fuzzy Hash: 52befe47cdb3fd150a0f9306a4cabdf493931040b5e64e686eb257149541a435
              • Instruction Fuzzy Hash: EC037C72609BC486E732DB26E5403DEB3A0F799784F508216EBCC47AA9DF39D584CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLast$_invalid_parameter_noinfo_noreturn$AddressHandleProc$CloseFile$AttributesControlCreateDeviceInfoModuleOpenPerformanceProcess
              • String ID: PerfInfo [MB]: CommitTotal: %llu, CommitLimit: %llu, PhysAvail: %llu, KrnlPaged: %llu, KrnlNonPaged: %llu, Handles: %u, Processe$1$9CC4$9CC4$9CC4$Dump file '{}' could not be created, error code: {}$Dump file {} already exists$Dumped by AvDump$E26A$E26A$E26A$Failed to dump process with error {:#x}$Failed to dump process with error {:#x}, retrying with limited dump content settings...$Failed to dump process with error {:#x}, retrying with minimal content settings...$Failed to open process with id {}, error code: {}$MiniDumpWriteDump failed, error: {}$PssCaptureSnapshot$PssFreeSnapshot$PssQuerySnapshot$dmp$dump$kernel32.dll$mdmp
              • API String ID: 376777773-3630350583
              • Opcode ID: 3fb77e9cb2fcd3bb1a688ff8889f6d9e8b069020ce7dcae4adb0504b958aed3d
              • Instruction ID: d5e5fab381148c1bff7a856c653db2bd1001b950a7f209c7094abfbe4ae606ec
              • Opcode Fuzzy Hash: 3fb77e9cb2fcd3bb1a688ff8889f6d9e8b069020ce7dcae4adb0504b958aed3d
              • Instruction Fuzzy Hash: 65A24672600BC49AEB62CF36E8843DD33A5F748798F504216EB9D5BAA9DF34C695C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: <$Argument dump_file not specified$Command-line usage$Invalid arguments supplied$Not enough arguments supplied$address of the exception pointers structure$amount of information to include in minidump. 0 - default, 1 - full memory.$attach to process as debugger and watch it for exceptions$comment$create dump containing data segments information$create dump containing process handle information$create live kernel memory dump$data_segs$dbg$dump_file$dump_level$exception_ptr$filename of dump to generate$flood control - minimal interval in minutes to elapse since saving last dump. Default is 60.$handle_data$help$kernel$min_interval$optional comment to include into dump$pid$process ID to dump$this, obviously$thread ID that caused the exception$thread_id
              • API String ID: 3668304517-1605023467
              • Opcode ID: 5625fb0db9f62f2a542038e45993453e20a38afa67aa1cf11e76f809a3986bca
              • Instruction ID: b754154605ab7baf9f5a4d4cad2f16c90aa88233fc16587ab0b277c547277488
              • Opcode Fuzzy Hash: 5625fb0db9f62f2a542038e45993453e20a38afa67aa1cf11e76f809a3986bca
              • Instruction Fuzzy Hash: 8403F572614BC481EA22DB26E4843EE6361F7897D4F905116FB9D07AFAEF78C984C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLastService$Close$Handle$Open$QueryStatus$ControlManagerSleepStart
              • String ID: !$ErrorControl$O$SYSTEM\CurrentControlSet\Services\$ServicesActive$Start$Type$Unable to open the service '{}'!$Unable to open the service control manager!$Unable to query status of the service '{}'!$Unable to send control code {} to the service '{}'!$Unable to start the service '{}'!
              • API String ID: 914021282-1139266149
              • Opcode ID: 650a7d3c880a9c04a8784dffdabddba7ef7e5863e4024906fb18aff839f78393
              • Instruction ID: e746428b034b753f819b5fc75678727d8781594847a1229f713a5b317e7df695
              • Opcode Fuzzy Hash: 650a7d3c880a9c04a8784dffdabddba7ef7e5863e4024906fb18aff839f78393
              • Instruction Fuzzy Hash: 9A528FB2614BC09AEB62DF26D8807DD73A0F74878CF405125FB8957AA9EF78C684C744
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: minutes) was not yet reached $+$6373$6373$9$E502$E502$Lsass dumping is not supported$Minimum interval between dumps ($SeDebugPrivilege$Successfully dumped kernel memory into '{}'$Successfully dumped process {} into '{}' (dump level: {})$\\.\pipe\lsass$last.dump
              • API String ID: 3668304517-1309060305
              • Opcode ID: 3959f13308a53d779ee7367f625bf2d3a64f108ade1a3bf03b5012af82bcf960
              • Instruction ID: f7c574caa26f615195f0bafb14573898e7189bc56f31540c36fcf2833535e9d3
              • Opcode Fuzzy Hash: 3959f13308a53d779ee7367f625bf2d3a64f108ade1a3bf03b5012af82bcf960
              • Instruction Fuzzy Hash: A6826F72609BC486E772DF16E4503DAB3A0F789B94F508126EB9943BA9DF3CC544CB40
              APIs
                • Part of subcall function 0000000140049500: OpenSCManagerW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049535
                • Part of subcall function 0000000140049500: OpenServiceW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049562
                • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049575
                • Part of subcall function 0000000140049500: CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049591
                • Part of subcall function 0000000140049500: CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 000000014004959B
              • RtlEnterCriticalSection.NTDLL ref: 00000001400146BF
                • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 00000001400495C4
                • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049606
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLastService$CloseHandleOpen$CriticalEnterManagerSection
              • String ID: +$689A$Bprotect$BprotectEx$Driver incompatible with debugger detected.$F59A$Unable to create sync event$^
              • API String ID: 2384786053-2103501719
              • Opcode ID: 6246e33e4d18522323e2979d310de36177014b67129b8993640bb0660fbd4a61
              • Instruction ID: acc6ca1ac3d4bcc98d97c1d460dc2bf6ac9bcfe21a9f3a416ce2b6d3651b1c6f
              • Opcode Fuzzy Hash: 6246e33e4d18522323e2979d310de36177014b67129b8993640bb0660fbd4a61
              • Instruction Fuzzy Hash: 08129E32615BC486E762DF16E4903DAB3A4FB8DB84F518126EB8907BB4DF79C484CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
              • String ID: ($gfffffff$gfffffff$gfffffff
              • API String ID: 1944019136-2044015736
              • Opcode ID: 5136b0d809f81acb1283958e3410d931ada9a6dbe5a2ad97a49ecc9ad0ed624f
              • Instruction ID: cadec9307002fb482afa7b70277d176585e481f7c60079d498e52ce0c2159b11
              • Opcode Fuzzy Hash: 5136b0d809f81acb1283958e3410d931ada9a6dbe5a2ad97a49ecc9ad0ed624f
              • Instruction Fuzzy Hash: 74B2BE72704BC482EA629B26E4447EEB3A1F789BD4F445611EB9E07BA9DF7CC481C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Crypt$ContextCurrentSystemTime$AcquireCounterDiskFileFreeGlobalMemoryOpenPerformanceProcessQueryRandomReleaseSpaceStatusThreadTimes
              • String ID: @$Cannot open registry key$Microsoft Base Cryptographic Provider v1.0
              • API String ID: 641596549-1296241995
              • Opcode ID: 8bbcdc25e91c0466fedc14985ca10bf9c7be634f727564f723196ec6c475a166
              • Instruction ID: c9c06d2097c26ed99e9b658cc0718fdec311c56a7e8b571f4b331795d7023104
              • Opcode Fuzzy Hash: 8bbcdc25e91c0466fedc14985ca10bf9c7be634f727564f723196ec6c475a166
              • Instruction Fuzzy Hash: 001351B36186818BDB55CF29E4513AE77F0F79A784F541126F38A87699EB3EC904CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: File$ConditionMask$Process$AttributesCloseControlCreateCurrentDebugDeleteErrorExceptionHandleHeaderInfoLastRaiseSystemTerminateVerifyVersion_invalid_parameter_noinfo_noreturn
              • String ID: 3$Dump file '{}' could not be created, error code: {}$Dump file {} already exists$NtSystemDebugControl failed, status: {:#010x}$Windows 8.1 or later is required for live kernel dumping$dmp$mdmp
              • API String ID: 2346179174-4051622449
              • Opcode ID: f2ed98436135c8495667bffc05249207030db6e999f3df43ce323f906c08814b
              • Instruction ID: d2532aca21d2b9b7f68ee8878676270b080208754356df25d40381f4caa891a8
              • Opcode Fuzzy Hash: f2ed98436135c8495667bffc05249207030db6e999f3df43ce323f906c08814b
              • Instruction Fuzzy Hash: C0D14A72610B8496EB22DF66E8803DD73B4F7897A8F504216EB9D53AB9EF38C545C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 808467561-2761157908
              • Opcode ID: 126489c02f89f32444c53208c887ce3e7162916d31ce3ead66bec1882e9e6cee
              • Instruction ID: 378258da1df3d0a3be93c01209ba7d409c16e2a030b42d5069ed35b0a8a1d70a
              • Opcode Fuzzy Hash: 126489c02f89f32444c53208c887ce3e7162916d31ce3ead66bec1882e9e6cee
              • Instruction Fuzzy Hash: FFB2DF76A142908BE766CF6AD440BEE77A1F3A87C8F505315EB0657EA8D734DA80CF40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: (=
              • API String ID: 3668304517-3258547529
              • Opcode ID: 56c9b8a907e4f7f30388f79c6fff3c512a22a2b609b44b23b3cfdbfec8c230fe
              • Instruction ID: d3026dc617975dbc0fae11b53bcd1b8976c14ad3504770994b9723004f1809d4
              • Opcode Fuzzy Hash: 56c9b8a907e4f7f30388f79c6fff3c512a22a2b609b44b23b3cfdbfec8c230fe
              • Instruction Fuzzy Hash: C3429E72A14B8481EB12CB2AE4813EE6361F799BD4F509215FB9D13BAADF38C5D0C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: gfffffff
              • API String ID: 3668304517-1523873471
              • Opcode ID: ea0bed14f6fd8a221ce5c85f356cd70518ca9004aa46f6dc453517bd3c9c7151
              • Instruction ID: 973354c1fd7a855e06744c45f1c7becab9a41793762c757bf87d089ddaceaf43
              • Opcode Fuzzy Hash: ea0bed14f6fd8a221ce5c85f356cd70518ca9004aa46f6dc453517bd3c9c7151
              • Instruction Fuzzy Hash: 0B32BFB2601B8482FA26DB26E4843DE6361F789BD0F549522EB5D07BEADF7CC485C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskErrorLastOpen
              • String ID: Group$SYSTEM\CurrentControlSet\Services\$Tag
              • API String ID: 2342203223-3512472385
              • Opcode ID: f2b4027a297b2d02ffeec11c995bceafd04a3ff707c0ce089216ac103398882c
              • Instruction ID: dba7bc752a1d05e0ded33738caa6f39dbac0386adf53da9ba466901ce0d3c83c
              • Opcode Fuzzy Hash: f2b4027a297b2d02ffeec11c995bceafd04a3ff707c0ce089216ac103398882c
              • Instruction Fuzzy Hash: 70128072619FC091EA71DB15E4503EEA3A1F7D9780F505625EBCD53AA9EF38C584CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: _token$option
              • API String ID: 3668304517-4023011786
              • Opcode ID: 97091d6cb97254faeec8e4a5df26bfbf1ffdc79699f9418e2058bf893ef362fa
              • Instruction ID: acddcaf35ce4b853b78acbe7e4be319e569b1b970cdae44850855107222bc432
              • Opcode Fuzzy Hash: 97091d6cb97254faeec8e4a5df26bfbf1ffdc79699f9418e2058bf893ef362fa
              • Instruction Fuzzy Hash: 4222BB32714A4086FB12CF6AC9483ED2362F70DBD8FA45A11EF5D57AEADB74C5869300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: File$CloseErrorHandleLastLockUnlock
              • String ID: couldn't obtain shared file lock
              • API String ID: 1994953073-3717060661
              • Opcode ID: 5381214164cbfcde355a917efa3f1e5b70d4e5fc025e5a7ce08c79cf7592e1e1
              • Instruction ID: 6dc9c28dc2bbea5aeb0c5c8121b6d775b216b4a95e7ee356a531a1ee5e03f9c1
              • Opcode Fuzzy Hash: 5381214164cbfcde355a917efa3f1e5b70d4e5fc025e5a7ce08c79cf7592e1e1
              • Instruction Fuzzy Hash: B6514D72618BC085EA71DB26E8513DAB3A5F7D9790F509325A7ED43AB9DF38C184CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Close$ErrorLast$Create$Value
              • String ID: Cannot write key value
              • API String ID: 1320403711-3393872497
              • Opcode ID: 2ec7a2271ba602718d70749ecf442ff4a7b786d39cc7c46cb2ff517a004f99a4
              • Instruction ID: 2ec24c23424257bf2840f2bcad33e52d2911314c2e675eb45ae1497282b7bbf1
              • Opcode Fuzzy Hash: 2ec7a2271ba602718d70749ecf442ff4a7b786d39cc7c46cb2ff517a004f99a4
              • Instruction Fuzzy Hash: 6241BF32215B8086EB62DF62E4957DA77A4FB88BC4F284125FF8A03765DF39C441CB10
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Close$DeleteErrorLastOpen$QueryTree
              • String ID: Cannot delete registry key$Cannot query kernel mode registry key path
              • API String ID: 2384582698-3324586067
              • Opcode ID: 408225df95bdd7a8a36108006d88b0aaea0ba40410c2e6995d3acb5101e31627
              • Instruction ID: c0185c5e7e07c172dddb39523b0b6857f3cb2cbd74be1f292dc2529af919b534
              • Opcode Fuzzy Hash: 408225df95bdd7a8a36108006d88b0aaea0ba40410c2e6995d3acb5101e31627
              • Instruction Fuzzy Hash: D4412B72618BC092EB11DF66E4943DAB3A0FBD9780F505525FBC983A69EF78C548CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$Cpp_errorLeaveThrow_std::_$CloseCreateEnterErrorEventHandleInitializeLastMultipleObjectsWait
              • String ID:
              • API String ID: 2765073912-0
              • Opcode ID: ecd216b08f9fd74a9c1be6b230cc400d8d31eb2996f637f51f31818544e1adf8
              • Instruction ID: 4046915ed44fe326b562858b187994a8cd86b385aa076283e19239acc64219b5
              • Opcode Fuzzy Hash: ecd216b08f9fd74a9c1be6b230cc400d8d31eb2996f637f51f31818544e1adf8
              • Instruction Fuzzy Hash: 66A16B32605BC486E7A29F12F4947DAB3A8FB8DB84F558116EB89477B0DF79C484CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
              • String ID:
              • API String ID: 1239891234-0
              • Opcode ID: 4fa09d09ecd95d6422647266fe9199911d7ff3209486aff70f905c38b8d44fbd
              • Instruction ID: 5f295c627d3f4a1f9ab801dadf57347dc710ed6b506405f99e25ff6f7181c6b6
              • Opcode Fuzzy Hash: 4fa09d09ecd95d6422647266fe9199911d7ff3209486aff70f905c38b8d44fbd
              • Instruction Fuzzy Hash: D6313832614F8096EB61CF66E8443DA73A4F788798F504126EB9D43BA9EF38C655CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: File$CloseErrorHandleLastLockUnlock
              • String ID:
              • API String ID: 1994953073-0
              • Opcode ID: 8293c3e118a1685d0d8fe61e27a1e9435cf05ca2b7879448cc97020c69cf5e24
              • Instruction ID: b19ae1d1ca8e9597a534420853a95dbf5c266e96ab2866330c5e9f2adbdeadb8
              • Opcode Fuzzy Hash: 8293c3e118a1685d0d8fe61e27a1e9435cf05ca2b7879448cc97020c69cf5e24
              • Instruction Fuzzy Hash: EF22A272704B9085EB22CB26E4443EDA3A1F7997D4F954326EBAD43AE8DF38C585C704
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
              • String ID:
              • API String ID: 1177325624-0
              • Opcode ID: 11f514c96b4bc136fc0dcfa8cbf9ceb26a26f6227072a4a38d10f0bf4c1ad5fb
              • Instruction ID: 2a976e20c7c07be9545e79cd8fd8f730cedcea555264f88cf5bc0e3db44d78e7
              • Opcode Fuzzy Hash: 11f514c96b4bc136fc0dcfa8cbf9ceb26a26f6227072a4a38d10f0bf4c1ad5fb
              • Instruction Fuzzy Hash: 66213032614B8097E7128F66F84579AB7A4F78DBE4F540229FB9943BA4DB38D845CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: %$+
              • API String ID: 3668304517-2626897407
              • Opcode ID: ba850d6aa618e8a5ef159dc3786b625165af67347b89d150aaef4c85da97bd4d
              • Instruction ID: a0d898dbe7d671f5170276f5073ab47a7f6217a54e0e881cc844ee19e376ab2e
              • Opcode Fuzzy Hash: ba850d6aa618e8a5ef159dc3786b625165af67347b89d150aaef4c85da97bd4d
              • Instruction Fuzzy Hash: 1502F532708A8489F722CB66E4903ED73B1E7997C8F548116FF491BBA9DB39D946C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: %$+
              • API String ID: 3668304517-2626897407
              • Opcode ID: ef3cfa6880285422245a7e8038cad12d370277293f6718c99b629d3b3881f313
              • Instruction ID: 5f2076fc5d2f6f41c57a6eed74219a67e11487e96eb78a4c63318edaad5f1c3e
              • Opcode Fuzzy Hash: ef3cfa6880285422245a7e8038cad12d370277293f6718c99b629d3b3881f313
              • Instruction Fuzzy Hash: E602F732705A8489F722CB66E4903ED73B1E7997C8F148215FF495BBA9DB39CA46C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: memcpy_s
              • String ID:
              • API String ID: 1502251526-3916222277
              • Opcode ID: c10be92ccd777733aec77242fd83f6c250c9f7e3d5896467feec955041489aac
              • Instruction ID: 743f78193035bc79f1e57e9f59dd1a4a70d6b0a9934cb31c37873dd6cb708058
              • Opcode Fuzzy Hash: c10be92ccd777733aec77242fd83f6c250c9f7e3d5896467feec955041489aac
              • Instruction Fuzzy Hash: 2EC1F47271568587EB21CF1AE088BEEB7A1F3D87C4F458225EB4A47B94DB38D805CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: 695b2c72f8245567a92a4f97253ef12cd3ec153a36e762290f020759e5a569ed
              • Instruction ID: 1bd70d2ee80f52086e0b2869b45f11ac886149a817778f7592ab05b98df556ae
              • Opcode Fuzzy Hash: 695b2c72f8245567a92a4f97253ef12cd3ec153a36e762290f020759e5a569ed
              • Instruction Fuzzy Hash: A3110376710F008AEB01CFA6E8543A933A8F75DB98F440E25EB6D87BA4DB78C1948240
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: $ $ $(
              • API String ID: 0-3698178323
              • Opcode ID: 5c31586f011da146f7a0e2f3f26b49a2f6bf0a272a270216fad1032cc7f56bac
              • Instruction ID: 5b91561d66d47fc1d6d10995c99d5e9836fa72d87751214b611091adaf55a174
              • Opcode Fuzzy Hash: 5c31586f011da146f7a0e2f3f26b49a2f6bf0a272a270216fad1032cc7f56bac
              • Instruction Fuzzy Hash: D2D14D706187888FE779DF28D849BABBBE5FB98304F40492DD48EC3251DF7499458B82
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3668304517-0
              • Opcode ID: 0c5e3ae4d7f34646f4bf7f9aecd518afe444cf5d875dbf0ec729c9109402b926
              • Instruction ID: 54353db618213540d5186c5b37f8c69dbfbe8609b719d997372a201807642c31
              • Opcode Fuzzy Hash: 0c5e3ae4d7f34646f4bf7f9aecd518afe444cf5d875dbf0ec729c9109402b926
              • Instruction Fuzzy Hash: 0D22BD72614B8485EB12DF66E4843EE73A1F7897D4F509212FB9D03AAADF38C585C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID: $'2O$U/$\8j
              • API String ID: 3653107232-658286377
              • Opcode ID: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
              • Instruction ID: 0698b25db3d51ff672dc23909d1dda13b4023c71855c720c64219588534004ad
              • Opcode Fuzzy Hash: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
              • Instruction Fuzzy Hash: 8F429574BA06454FE7D8EF78E86D7653AE2F7CD3057A0856AA40DC33A5DE3C98025B40
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: $0$@
              • API String ID: 0-2347541974
              • Opcode ID: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
              • Instruction ID: 7c671abd1a76206fe05879161d5a5dfb53b2bea4446892b584d1c38a765407bb
              • Opcode Fuzzy Hash: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
              • Instruction Fuzzy Hash: 6722503021CB498FE7A4EF28D859B9ABBE1FBD8305F50861DA48EC3291DF749545CB42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: Software\$product-reg-key$reg-key
              • API String ID: 0-2334822848
              • Opcode ID: 4da8e0afcb8e9388d06a71be1f86bb65f70ed54fc2075c05b62e08a328c0d3e9
              • Instruction ID: e83f2201b4e9165746cb3b0bdb132f8ea2f66838df7c5e4937a6000ac8bf2a60
              • Opcode Fuzzy Hash: 4da8e0afcb8e9388d06a71be1f86bb65f70ed54fc2075c05b62e08a328c0d3e9
              • Instruction Fuzzy Hash: 7512E032A14B8492E702DF75C4413ED6370FBA8788F516226FB89676BAEF34D695C340
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLast$Value
              • String ID: -_.$C$U
              • API String ID: 1883355122-122348360
              • Opcode ID: 893563df212f572994940df262ea965a83ddd967e6897792fc41d3a3a4659922
              • Instruction ID: 47f83df31a620841db7f71abc47568d93323410f9af05f2c893c73b2928b2718
              • Opcode Fuzzy Hash: 893563df212f572994940df262ea965a83ddd967e6897792fc41d3a3a4659922
              • Instruction Fuzzy Hash: 7DE1AB3220164096EB66EF27E4847ED27A1F78CBD4F548226FF4A07BA5EB74C655C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ExceptionRaise_clrfp
              • String ID:
              • API String ID: 15204871-0
              • Opcode ID: 65681df75707a92f2bc7e9ada3ab695fd425c163f5d037de68b2fc66d7e5ee35
              • Instruction ID: 523b48fd9272ed22601a5be54fc0fee5876a28af2ee06b70f9afebd8834ef710
              • Opcode Fuzzy Hash: 65681df75707a92f2bc7e9ada3ab695fd425c163f5d037de68b2fc66d7e5ee35
              • Instruction Fuzzy Hash: B8B11C77610B848BEB16CF2AC88639D77A0F389B98F158915EB5D877B4CB39C852C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: )$p
              • API String ID: 0-1764766951
              • Opcode ID: ee93447394ec2e47e78dee34ba32a62090d93dde5ca2884970cb00b8fe4b969e
              • Instruction ID: 8a61fba190a4c6d1e42fc73815323b93dfb114e463a2cb8040715071bb4cf6a7
              • Opcode Fuzzy Hash: ee93447394ec2e47e78dee34ba32a62090d93dde5ca2884970cb00b8fe4b969e
              • Instruction Fuzzy Hash: CC020030618B498FE764DF28D8557AABBE1FBC8304F504A2DE48EC3291DF749985DB42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: e+000$gfff
              • API String ID: 0-3030954782
              • Opcode ID: 04352b12e251caef85448169595c1d977d113804befc2cbc0cfa0fe36bdb305b
              • Instruction ID: da49b78225b27d5c317bd1a457599b25e9e006a51047f6e63fa0380021a18e3c
              • Opcode Fuzzy Hash: 04352b12e251caef85448169595c1d977d113804befc2cbc0cfa0fe36bdb305b
              • Instruction Fuzzy Hash: 8E5159737186C446E7268F3AE9157997B91F348BD4F48D221EBA84BBE5CB39C444C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressProcedure
              • String ID: !yOr
              • API String ID: 3653107232-2868905794
              • Opcode ID: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
              • Instruction ID: d6846d09210c178932c2ed410cb7d248d0c3f32efa5725a5150c17b05a7a28d1
              • Opcode Fuzzy Hash: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
              • Instruction Fuzzy Hash: 23124F34218B488FD768EF28D859BAABBE1FBD8305F50452DA48EC3291DF74D945CB42
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: P
              • API String ID: 0-3110715001
              • Opcode ID: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
              • Instruction ID: 10324e7e86061e43ca93d74efbf07e88dab3b831d2443421a3d0dde457ff0783
              • Opcode Fuzzy Hash: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
              • Instruction Fuzzy Hash: 7A027230218B484FE774AF68D46D7AABBD2FBC8305F50492EA48EC3291DF78C9459742
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: (
              • API String ID: 0-3887548279
              • Opcode ID: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
              • Instruction ID: 522233234ada33fca349d1cfc1d07ff021bb2bc800e13e040acd220bc080f408
              • Opcode Fuzzy Hash: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
              • Instruction Fuzzy Hash: 81F1817461CB488FD768DF2894557AABBE2FBC9308F504A2EE08EC3251DB74D8468747
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: gfff
              • API String ID: 0-1553575800
              • Opcode ID: 8a2dcf9ab7c55880f9a741755fadcef32c767d2ea98bcf1b8f9d0d040eefc798
              • Instruction ID: 2e6303e5c84755d0e2fedad68920bbbdbb98dc67d56c676ba306184c5d9a5104
              • Opcode Fuzzy Hash: 8a2dcf9ab7c55880f9a741755fadcef32c767d2ea98bcf1b8f9d0d040eefc798
              • Instruction Fuzzy Hash: DA1215B262978086EB22CF26F1407EE7791F358BC4F149126FB4A47BA5DB78C945CB10
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: gfff
              • API String ID: 0-1553575800
              • Opcode ID: 188657171af1e0757aff3f81c85895f20b7be6e38f1443b3f445cd7df4c45def
              • Instruction ID: 419e06eae31c9b0086dba08d0a635922e550bfd7c4935c9a990d6660b0d2045f
              • Opcode Fuzzy Hash: 188657171af1e0757aff3f81c85895f20b7be6e38f1443b3f445cd7df4c45def
              • Instruction Fuzzy Hash: DB0229B522868582E72ACA2BE5547FC6695F388BC0F558137FF4B877F4E639CA408311
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: c30bd7ab68d751d74eb6e3fcd089575567a5f3ab528e208d543831b4295961bd
              • Instruction ID: a4836f5dca34a9b532f1d29672aeee1d0ad0c2bec10971bd07fa261177cb3d98
              • Opcode Fuzzy Hash: c30bd7ab68d751d74eb6e3fcd089575567a5f3ab528e208d543831b4295961bd
              • Instruction Fuzzy Hash: E1D1D330628F894FEB74DF28C4497BABBD1FB99305F148A2ED48AC3252DF3498458746
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: 8
              • API String ID: 0-4194326291
              • Opcode ID: 6bbf3d654b950b392ce32ff54005e7a4c88c8c4e5069d455d2263e1fb34e77d3
              • Instruction ID: f8d12af2ef24decde027cb585caa4c4ffb430d0fdb06e5c15b18dcde5b2c9574
              • Opcode Fuzzy Hash: 6bbf3d654b950b392ce32ff54005e7a4c88c8c4e5069d455d2263e1fb34e77d3
              • Instruction Fuzzy Hash: 29C16830228B494FE764EB28D85A7ABBBD2FBD5304F50452DA44AC3291DF74D846CB83
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3916222277
              • Opcode ID: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
              • Instruction ID: ba0e7892981fa4579bf296e2dc30f8ed8b68ad1cb0be49552b869af5e89638c4
              • Opcode Fuzzy Hash: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
              • Instruction Fuzzy Hash: 9F919330228B494FD758AF28D85A77ABBD2FBC8344F50452DF48AC3252DF79D8429786
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: @
              • API String ID: 0-2766056989
              • Opcode ID: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
              • Instruction ID: e6b94ba96ae401e02d75e2d1e753ace9a0d5abcded8f95b09c0740e17ccadef8
              • Opcode Fuzzy Hash: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
              • Instruction Fuzzy Hash: F9A14C70228B044BE758DF2CD85675ABBD1FBC8708F50862DB08ED3691CB79E9419B87
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: gfffffff
              • API String ID: 0-1523873471
              • Opcode ID: 9da3902cafaa54ea0f26fcf8c8641c2ae7e0a60bf2e2409ba9268231b238ef55
              • Instruction ID: 45631be74bca65ee0c029d0995144cdcef367947e7f1576268a430681ad91ba9
              • Opcode Fuzzy Hash: 9da3902cafaa54ea0f26fcf8c8641c2ae7e0a60bf2e2409ba9268231b238ef55
              • Instruction Fuzzy Hash: 2EA133737057C486EB32CB2AA4607DE7B95E769BC4F049122EF8A477A5DA3DC901CB01
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: gj
              • API String ID: 0-4203073231
              • Opcode ID: 100eea8c5719e573b0f57fdb57933fa8d496c7bc56ea0f9008c025b70b65f920
              • Instruction ID: a116e9c95324fa8595d9ae91701c575426a3e033bb2937926ad2e21f17145bb8
              • Opcode Fuzzy Hash: 100eea8c5719e573b0f57fdb57933fa8d496c7bc56ea0f9008c025b70b65f920
              • Instruction Fuzzy Hash: 6381F8732157C48FD309CF6898402AD7BA4F325F08F9C826DDB809B34ACA34D9A5C7A5
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
              • Instruction ID: b9cc8869983c7afe2d3fb13e9feeb79adb437876cd4e365b91096efc7a5c9f29
              • Opcode Fuzzy Hash: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
              • Instruction Fuzzy Hash: 99627F34320B068BEB199F2ADC95BE537D6FB8D744BC44474BC4AC7285DE78EC418692
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CreateFirstSnapshotThread32Toolhelp32
              • String ID:
              • API String ID: 490256885-0
              • Opcode ID: 981f0971402d7281a867420ae6825c153d13a7eb141935b46ef7612b15631b0c
              • Instruction ID: e1e284de6eaab4aed68cbb230a05b51043cd28d76f13708070929c5ffb8ff149
              • Opcode Fuzzy Hash: 981f0971402d7281a867420ae6825c153d13a7eb141935b46ef7612b15631b0c
              • Instruction Fuzzy Hash: 6462A370118F498FD7A4DF18D899BA6BBE0FB98305F60466ED44DC7265DF30A849CB82
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: 6ed7e8d2c7d9338698d87b8b7149cf556e2881883802bf60fb96d9698b45afc0
              • Instruction ID: bbfb01166b2cee195a8f9edb51d6449cf4ec9826acb307f75dae1fe48d9e5f10
              • Opcode Fuzzy Hash: 6ed7e8d2c7d9338698d87b8b7149cf556e2881883802bf60fb96d9698b45afc0
              • Instruction Fuzzy Hash: 3C428330328B044FDB24AB28DC5676ABBD6FBC8751F50852DA48EC3291DF38DA45D683
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
              • Instruction ID: 74cc5d2dcdbe484fec7eec2e3f91358c4bdf086597163883f7c5186999f55088
              • Opcode Fuzzy Hash: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
              • Instruction Fuzzy Hash: 8F228E70218B488FE778EF18D459BDABBE1FBD8315F508A1DA48EC3290CB749545DB42
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 85d6e6732e53faa95cd3743e2378d3a887562cd9e05599d55a6b56c32021c76b
              • Instruction ID: c94ed72c6b10885af59361fc43510b89f8e2117c62f5c38eaa97d459da45d610
              • Opcode Fuzzy Hash: 85d6e6732e53faa95cd3743e2378d3a887562cd9e05599d55a6b56c32021c76b
              • Instruction Fuzzy Hash: 70124030218B488FE7A4EF28D859BAABBE1FBD8305F504A1DA48EC3251DF34D545DB42
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: faae51807ddb49513d4786620cdd6c550b09a0d8d4213f58ccc1b562f963a966
              • Instruction ID: 7746ecf1384c2364843ade7cd2817ff9a216dbdc11397c3e366d1132635d32a9
              • Opcode Fuzzy Hash: faae51807ddb49513d4786620cdd6c550b09a0d8d4213f58ccc1b562f963a966
              • Instruction Fuzzy Hash: EEF15630728B454FE758EB28D85A76ABBD2FBC8304F50852DA08EC3291DF78D9459787
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b1e573f32f122f45f3bb05125e8f2b0bf86f8e17a829f365963d033b070a9e4f
              • Instruction ID: 5744a60ec488df30b3924625a6962baf18ae4bf2e81f19c663eb6a3ec1abb356
              • Opcode Fuzzy Hash: b1e573f32f122f45f3bb05125e8f2b0bf86f8e17a829f365963d033b070a9e4f
              • Instruction Fuzzy Hash: 15F14270218B498FE764DF28D8597AABBE1FBC8314F50892DA48EC3291DF35D945CB42
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 93e8d057c5f9894473d845d1c83c9ad02595634ce579fe39b255221776393a4b
              • Instruction ID: 0f4e6f1ffd2ac4ace7c516cf5ec8ddbde54987c8fedca963eca8a6a1f4caea01
              • Opcode Fuzzy Hash: 93e8d057c5f9894473d845d1c83c9ad02595634ce579fe39b255221776393a4b
              • Instruction Fuzzy Hash: 3FF15570228B488FE764DF18D4597AABBD1FB89305F50452EE48EC3291DB78D949CB43
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 580a3a3c83426d8ff6b88dfef7fa52f3433e29507ba5bdf8adfca3bd01625a3b
              • Instruction ID: 41af398e0bdad2770d23a0b7e346a788e5e80fc8a955a74377ea0fafc700c5f1
              • Opcode Fuzzy Hash: 580a3a3c83426d8ff6b88dfef7fa52f3433e29507ba5bdf8adfca3bd01625a3b
              • Instruction Fuzzy Hash: 0DF15D30618B498FD764EF28D45A7ABBBE5FBC8305F504A2EA48EC3251DF749845C782
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
              • Instruction ID: 7d7fcb48a02e5981cd17244d91574caed973b15c09d25751de66d382fb78e8ad
              • Opcode Fuzzy Hash: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
              • Instruction Fuzzy Hash: 41D15330228B494FD758EB28D86A76ABBD2FBC8344F50451DB48EC3291DF74D9459783
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
              • Instruction ID: 4fd0388f4b4f0033d723a44b83c8b15b50e7fcdb2daa982376ee4f0af1654779
              • Opcode Fuzzy Hash: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
              • Instruction Fuzzy Hash: 55D18F30228F484FDB58EB2CD46AB6ABBD1FBC9345F50456DA48AC3251DF34D9458B82
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e2c60be4ab458fd0de4f10b45d507592baae063c69ce48d6c2cccd2856e2d476
              • Instruction ID: cdbd6d1a16a8e0e3d4a4337008ea41b7dc649f08b0b7c8d95fbcce9c25ceabd7
              • Opcode Fuzzy Hash: e2c60be4ab458fd0de4f10b45d507592baae063c69ce48d6c2cccd2856e2d476
              • Instruction Fuzzy Hash: 51D14AB2B049550BEB29CA1FB581BA9A695F3DC7C0F05A126EF8683BF0E775C845C700
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
              • Instruction ID: 689baa52075f0b65efa031011022142d341982ee89f155709eea1fd86b79e64c
              • Opcode Fuzzy Hash: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
              • Instruction Fuzzy Hash: FAD1523061CB088FDB58EF29D85976ABBE5FB98305F10052EE44AC3261DF74E949CB42
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2a71e2ed1c5bd6be6eb256dc2b4a77e1885c532c0b5c69f70e3d6037aa8625fe
              • Instruction ID: eb9fc49223d6d28372ccd683032c12f40efa90ec701a6d0c128f78cd4274a3f0
              • Opcode Fuzzy Hash: 2a71e2ed1c5bd6be6eb256dc2b4a77e1885c532c0b5c69f70e3d6037aa8625fe
              • Instruction Fuzzy Hash: 8AC14E7021CB494FE764EF28D8597AABBD2FBD8304F50462DA48EC3291DF7498469783
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
              • Instruction ID: b0e65b11bfb62364139ba67707f6315fe31bac86a409abd080e588a728306e1f
              • Opcode Fuzzy Hash: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
              • Instruction Fuzzy Hash: 96C15070328B444FE758EB28D46A76ABBD1FBC8318F50452DE08EC3291DB78D9459747
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3e9146de42fe06b3e918654735bac583dd07de0fd27d2d2d1bc3f54f1f3bf6c7
              • Instruction ID: 03ec3d44de05fd666a70fe56bf2f7e115c799be4fe0443e434daaa8e0cd68dd6
              • Opcode Fuzzy Hash: 3e9146de42fe06b3e918654735bac583dd07de0fd27d2d2d1bc3f54f1f3bf6c7
              • Instruction Fuzzy Hash: 11C13673B2425087D7ACCF1AE810A6A7B96F3C8754741A12DEA1B93B80DE39CC45CB80
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 35121771ef7e3a2a21f4fe77380e6306a785aec2d0abbaad6edc0a9a8a3c264d
              • Instruction ID: 711fc9cbed791bafeb9942fecf9ad6579a287c36ff07293391c35c06956e8bb9
              • Opcode Fuzzy Hash: 35121771ef7e3a2a21f4fe77380e6306a785aec2d0abbaad6edc0a9a8a3c264d
              • Instruction Fuzzy Hash: A2D12BB273665046EB27CF2AF414BEA6691F398BC4F185124FF4A47BA4DB39C940CB00
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a02068b51a8db8e48cbbecbd50ab68d20f8956ba6d06c6d8de2256c976014b4
              • Instruction ID: 19551dc1b382e6e948458b19ea9d1326cec31ff93c2248c0597341d4f913b867
              • Opcode Fuzzy Hash: 0a02068b51a8db8e48cbbecbd50ab68d20f8956ba6d06c6d8de2256c976014b4
              • Instruction Fuzzy Hash: CED1BA7762064486EB7A8F2A9450BAD37A0F70CBC8F545226FF49437E6DB35CA46CB40
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
              • Instruction ID: 9879a2a73c15e364be9ca317f95fdf831266b605af7c1e15b2718a9acc260fb5
              • Opcode Fuzzy Hash: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
              • Instruction Fuzzy Hash: 21B13D70228B488FD768DF2CD459B9ABBE1FB99315F50852EA08EC3251CB74D845CB43
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1ee1200db8e1ef7a7e1f657d3d6c118d16c3f2ddcba2727c09fdfbcc369e9b4a
              • Instruction ID: a26132ffcb03175a20d539ed755665c717936d486e66848fb88558251d16acdb
              • Opcode Fuzzy Hash: 1ee1200db8e1ef7a7e1f657d3d6c118d16c3f2ddcba2727c09fdfbcc369e9b4a
              • Instruction Fuzzy Hash: 2FD1BA3360064486EB6A8F2B80507EE2BA1F70DBC8F544206EF59177FADB75CA46C345
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 92dcddac20bf2a85382346e7c818b7a8622ac2cf6c43a00e52d6e282357d0b4a
              • Instruction ID: 7f4d832e8e4e1562f71fa2089dada26ac6655c7c399df25ee868d064191b14a1
              • Opcode Fuzzy Hash: 92dcddac20bf2a85382346e7c818b7a8622ac2cf6c43a00e52d6e282357d0b4a
              • Instruction Fuzzy Hash: 8781C03021C6488FE759DF2CD88976ABBE1FB99309F14462DE48AC3251DF75D842CB82
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0a5733841054f35ee6a67558ffbf079e1ddf009b8a0c96e68972e1481134178
              • Instruction ID: 2bdbea7d7c10ac6044f066501ee86dca2032a23fa607238a4a2fff40eb8e0564
              • Opcode Fuzzy Hash: e0a5733841054f35ee6a67558ffbf079e1ddf009b8a0c96e68972e1481134178
              • Instruction Fuzzy Hash: A7B19E73204B5486F7668F3AC0503AC3BA0F74EF89F284219EB4A47BA6CB39C651C745
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e3b91349162c491fd9d3cfd84cd5ae5e35a4a82b261b7411649656c0553dd378
              • Instruction ID: e60a8c4b2552d29fb97310efb39fedef81bcafe08a45545273653e4b6d61c138
              • Opcode Fuzzy Hash: e3b91349162c491fd9d3cfd84cd5ae5e35a4a82b261b7411649656c0553dd378
              • Instruction Fuzzy Hash: 47911572601A8486FB668B37D5187E972E1F70DBE0F44422AEF6A17BE5D738DD848700
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d88b30173d776bbec4e7b8c9e55c8544666a1e7114d5e494066a9e934f1503d
              • Instruction ID: 00cd9de9fe2c8728540a55737d053312021d889e0e09c000a9c56b72403b59af
              • Opcode Fuzzy Hash: 1d88b30173d776bbec4e7b8c9e55c8544666a1e7114d5e494066a9e934f1503d
              • Instruction Fuzzy Hash: 4991F2F2204B4086FA62CA27E5247F976E1E34DBE0F59C221AF2907BE5D778D941B701
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID:
              • API String ID: 3215553584-0
              • Opcode ID: 23ccc7ce9506a8c1c07d39999f756624c159b71199f188e85533ac9785993f0d
              • Instruction ID: 01408dce989196f21b784dde59595df15d8acd0e8679eb71819d0b645f1a3049
              • Opcode Fuzzy Hash: 23ccc7ce9506a8c1c07d39999f756624c159b71199f188e85533ac9785993f0d
              • Instruction Fuzzy Hash: 62819E72200A1086EB65CF2AD4953AD33A0F788BE8F148626FF6E87BA5CF35C5418740
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50f347f940c396187d4bfaa3c273b676c370f4d474c152167812ccf1e7673009
              • Instruction ID: bd34691a7d67022634f9f1a61710223e65fd5656631df14b3dfee9598cc9dd5a
              • Opcode Fuzzy Hash: 50f347f940c396187d4bfaa3c273b676c370f4d474c152167812ccf1e7673009
              • Instruction Fuzzy Hash: F181937261878046EB75CF1FA4803AABA91F78E7D4F544229FB9D47BA9DB3DC5408B00
              Memory Dump Source
              • Source File: 00000000.00000002.2267231223.0000000000541000.00000020.00001000.00020000.00000000.sdmp, Offset: 00541000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_541000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9eb25984bbb84b506b7442a44f1ea2276f7130761b53bd599e6125853a15f57f
              • Instruction ID: 5a54f8d536eb248d033734d3eb7fcd0c9c3e7ea4456b2bd797ef2e3ef27c2dfb
              • Opcode Fuzzy Hash: 9eb25984bbb84b506b7442a44f1ea2276f7130761b53bd599e6125853a15f57f
              • Instruction Fuzzy Hash: 4F310335168A894EE31C496C98663B13F85F797706F28632FCED783262DB25484BC552
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5d1c3a0ccb6cd29ade6edb59abc650c0a6808c7d2b219c7f99c84549879a4588
              • Instruction ID: d81f174727280bfae3e1c8d2c25fc94816d80b7737fdfd02cb4f58fea932a1ae
              • Opcode Fuzzy Hash: 5d1c3a0ccb6cd29ade6edb59abc650c0a6808c7d2b219c7f99c84549879a4588
              • Instruction Fuzzy Hash: A951C377604A11C3E72E9F2AC1543AC27A0F75ABA8F190119EF5A177E9CB35CE41C780
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0ecb8b9979793c10852181b7fabf84e18f565fc6bcd5914c49afb4f525614f51
              • Instruction ID: 79d5927eb58122ca7903d854d3224612b5208078e6fd7df8917aa9357f895dd0
              • Opcode Fuzzy Hash: 0ecb8b9979793c10852181b7fabf84e18f565fc6bcd5914c49afb4f525614f51
              • Instruction Fuzzy Hash: B851B173600A5482E72AAF2AC1543AC37E1F759FA8F184215EF46177E9CB36DE81C784
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 18b92091dba8f0accac89cfe48fde3d5d16b91869aa58acc72bd8e1dec618566
              • Instruction ID: 3fffde151232361014340c8c5a34b6e9530ca69be43a7a409e4eaad890ce83b0
              • Opcode Fuzzy Hash: 18b92091dba8f0accac89cfe48fde3d5d16b91869aa58acc72bd8e1dec618566
              • Instruction Fuzzy Hash: DD51ED7321065086E72EAF2AD1543AC3BA0F359BD8F294109EF4A177E9CB35CE81C780
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e2df5fec1a36e68530e0f9a86e93240da32b657597d58bd2d4df2635b41feada
              • Instruction ID: 268ec1035cc9012f911c526a7eb253b1ec329f76e70e69a9d96f9b92d1566653
              • Opcode Fuzzy Hash: e2df5fec1a36e68530e0f9a86e93240da32b657597d58bd2d4df2635b41feada
              • Instruction Fuzzy Hash: 6B519B73604A5086E76E9F2AC1943AC3BA0F759B98F1D0119EF4A577A9C735CE82C780
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e563b16fecf21a8b005dd336b56f4fbbb0e43b582ea3f098d82972a22c6ae1f7
              • Instruction ID: f2dfb29b7e83f9ed2624e5c96aca5b4a5c3ee50fe1cbf1a6b696d063b6e16715
              • Opcode Fuzzy Hash: e563b16fecf21a8b005dd336b56f4fbbb0e43b582ea3f098d82972a22c6ae1f7
              • Instruction Fuzzy Hash: 6751FE3761865083E72AAF2AC1543AC27A0F759BD8F294119EF4A177F8DB35CE91C780
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast
              • String ID:
              • API String ID: 485612231-0
              • Opcode ID: d3a50af7144745bcb85e305d7bf68092fdcb426cdbbc72fc98c5a77fbff44355
              • Instruction ID: 2314152a2322c01b06b3399aa4dd9aaba0ac4941e7d2f78a4612815ca04ce106
              • Opcode Fuzzy Hash: d3a50af7144745bcb85e305d7bf68092fdcb426cdbbc72fc98c5a77fbff44355
              • Instruction Fuzzy Hash: 1D419D72310A5482EB44CF2BE9657A9A3A2B74CFD4F499026FF4D87B69DA38C1428340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLastThread$CloseCurrentHandleOpenSelfToken$ImpersonateRevert
              • String ID: Unable to adjust token privilege '{}'!$Unable to assign the process impersonation token to the thread!$Unable to lookup privilege '{}'!$Unable to obtain the thread access token!
              • API String ID: 475273544-197369002
              • Opcode ID: 6749da1815b9244086f365902ad23cd0f73f55f9474e7ad92115bfaa5316c3ea
              • Instruction ID: 14ed016d7a4ab3e69fe32eb5d2e51fe92fb5a36cbff291dcdc9b33d0a68bc050
              • Opcode Fuzzy Hash: 6749da1815b9244086f365902ad23cd0f73f55f9474e7ad92115bfaa5316c3ea
              • Instruction Fuzzy Hash: 37413871210A4592FB12AFA2E8547E92360FB8DB88F544021EB8E436B5DF3CD949C751
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLast$AddressHandleModuleProc
              • String ID: GetModuleHandleW ({})$GetProcAddress ({})$GetProductInfo$RtlGetVersion$Unable to convert processor architecture ({}) to platform enumeration!$kernel32$ntdll
              • API String ID: 1762409328-1915291428
              • Opcode ID: 9d7484a7e32ca5d575654e4c2a5ec3eb30f234ca3929b35e0a70397d6b37d418
              • Instruction ID: 15b0a89f4416b3568538fbf9990143a13fd2117f3695a2507b66dd78fb4fd6fe
              • Opcode Fuzzy Hash: 9d7484a7e32ca5d575654e4c2a5ec3eb30f234ca3929b35e0a70397d6b37d418
              • Instruction Fuzzy Hash: 29A14932600A8599EB5ADF66E4503EC73A0E75C7C8F948026FB8D47AB8DF39C959C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskErrorLast
              • String ID: /$/$6$Group$SYSTEM\CurrentControlSet\Control\GroupOrderList$SYSTEM\CurrentControlSet\Services\$Tag$The order list of the service group '{}' is malformed!
              • API String ID: 973969752-2315443231
              • Opcode ID: 8fff48f6f37925aaabf05bbd2da003f2930900839ed49e0dcd490e852b0a9f6d
              • Instruction ID: 28ba2f08aa28f84ab621e218dfddfaa96cb2f13f9b34cb6f248e2f46ba81bf10
              • Opcode Fuzzy Hash: 8fff48f6f37925aaabf05bbd2da003f2930900839ed49e0dcd490e852b0a9f6d
              • Instruction Fuzzy Hash: 13A18A72211A8489EB62DF26E8407DD73A4F74C7D8F504626EB9D47BA9EF38C684C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Concurrency::cancel_current_taskLockit::_Lockit::~_$Locinfo::_Locinfo_ctor
              • String ID: bad locale name$false$true
              • API String ID: 1486878244-1062449267
              • Opcode ID: 3c2b06e2966f11c69d513af3ac03665a241348d72241f8d7a8a453f8c069b74a
              • Instruction ID: 3fd87f393ecb69b85c6b269462077d7561ae56962a89af143662b5c7ec8c1c71
              • Opcode Fuzzy Hash: 3c2b06e2966f11c69d513af3ac03665a241348d72241f8d7a8a453f8c069b74a
              • Instruction Fuzzy Hash: F5913B36606B4086FB22DF62E8503D973A1FB88BC4F144519AF8D67AAADB38C951C744
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$EnvironmentErrorExpandLastStrings_invalid_parameter_noinfo_noreturn
              • String ID: 5$Unable to convert NT path '{}' to a volume GUID path!$Unable to enumerate volumes!$Unable to retrieve a path of the known folder ({})!$WSL Process$\\?\
              • API String ID: 2353729461-3251487983
              • Opcode ID: a971b00b6b545ec4fa32ac5bf8f1b4fc5e6327b307be9eea3f768c1d2fd21dbf
              • Instruction ID: 2b3ceb743f5014c40e1a22504b0814f19971f4b522418f385d7f29021a5ccfb4
              • Opcode Fuzzy Hash: a971b00b6b545ec4fa32ac5bf8f1b4fc5e6327b307be9eea3f768c1d2fd21dbf
              • Instruction Fuzzy Hash: 2C516772710A849AEB11DF26E4903DD33A4F758788F508522FB9C47AA9EB38D6A5C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Server$Register$ServiceUnregister$Status$CtrlErrorHandlerLastObjectProtseqSingleWait
              • String ID: ,$6373$E502$RegisterServiceCtrlHandlerEx failure: gle={}$StartServer failure: retval={}
              • API String ID: 548640598-1530989511
              • Opcode ID: 63b4c982e2e00fcf33e1d6dfd9c0f91330e22ee9ccfe943ffa94c78227f84723
              • Instruction ID: 50e07fc66846bfbe4260a933a509bbc77413dc35a1dc1dc72b1564673e37ba95
              • Opcode Fuzzy Hash: 63b4c982e2e00fcf33e1d6dfd9c0f91330e22ee9ccfe943ffa94c78227f84723
              • Instruction Fuzzy Hash: 455126B6B10B14DAF702DFA6E8943CD33B1B748798F504116EA492BA68DF78D549CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: BaseCloseHandleModuleNameOpenProcessQueryVirtual
              • String ID: PID: $689A$Exception address: $Exception code: $Exception in: $Exception params: $F59A
              • API String ID: 855635403-3050060412
              • Opcode ID: 8a8765307c712108a0947df3e5f330cae9942757cb6adf4cefaa7f41d658f88e
              • Instruction ID: 12fd3af4425f6e6040738bb35b357383cfac07cb84db7fad37d320cb61551e6d
              • Opcode Fuzzy Hash: 8a8765307c712108a0947df3e5f330cae9942757cb6adf4cefaa7f41d658f88e
              • Instruction Fuzzy Hash: 4A023A72211AC49AEB61DF66E8943DD73A0F789788F504116EB4D4BB79EF38C645C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskLocinfo::_Locinfo_ctor
              • String ID: bad locale name$false$true
              • API String ID: 354050835-1062449267
              • Opcode ID: f7e4faf5650d59538b5a59f5a4b8092bc18465b3856432a638800222781c1f9e
              • Instruction ID: 5840e447b6844cdc5e1156469c82ff91de1907e4bc45fdb6f1b7e9f9b7996533
              • Opcode Fuzzy Hash: f7e4faf5650d59538b5a59f5a4b8092bc18465b3856432a638800222781c1f9e
              • Instruction Fuzzy Hash: D1B16B32615B8086EB12DF22E8803DE77A1FB887C8F145615FB8D1BA6ADF78C591C740
              APIs
              • OpenSCManagerW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049535
              • OpenServiceW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049562
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049575
              • CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049591
              • CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 000000014004959B
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 00000001400495C4
                • Part of subcall function 000000014007B650: RtlPcToFileHeader.NTDLL ref: 000000014007B6A0
                • Part of subcall function 000000014007B650: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000014001302F), ref: 000000014007B6E1
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049606
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLastService$CloseHandleOpen$ExceptionFileHeaderManagerRaise
              • String ID: $ServicesActive$Unable to open the service '{}'!$Unable to open the service control manager!
              • API String ID: 2158513109-1786243909
              • Opcode ID: a0523da25f66c11f40c07f91ab1d6dd001669a241499180a9da8d916ced0475a
              • Instruction ID: cf9ba95a574f67e8951b34db8deb6be0d0de46db6f0ccc00a4b8aebf5161a491
              • Opcode Fuzzy Hash: a0523da25f66c11f40c07f91ab1d6dd001669a241499180a9da8d916ced0475a
              • Instruction Fuzzy Hash: B4313671214B4092EA12EF22E8543E963A4FB8DBC0FA14025FB8E43A75EF3CC955C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Value$ErrorLast$Heap$AllocateFree
              • String ID:
              • API String ID: 3174826731-0
              • Opcode ID: 04a89daeb5ac5b50f33649e46550b0b56fd2029df7522eb5f8f153315faf9387
              • Instruction ID: 8748f7850ea9bbf3ecbb45585572b62d9a9752533651cb9be03a1a6b81690c8e
              • Opcode Fuzzy Hash: 04a89daeb5ac5b50f33649e46550b0b56fd2029df7522eb5f8f153315faf9387
              • Instruction Fuzzy Hash: 0F412D7430524482FA6BA77769513E952419B8C7F4F280B28BF764BBF7DE38D4014B01
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseHandle$RevertSelf
              • String ID: Unable to adjust token privilege '{}'!$Unable to lookup privilege '{}'!$Unable to remove the impersonation token from the thread!
              • API String ID: 680554984-1021965375
              • Opcode ID: 7d74c2ae68d176f80f8f39417a9f00b875dfe7e1de54d8cc7cf82b9b6e49ae03
              • Instruction ID: cdf82a8bf0ce1fab008b22b615ef9f68c67fd5b9f83432e90ad38faf9f776c0f
              • Opcode Fuzzy Hash: 7d74c2ae68d176f80f8f39417a9f00b875dfe7e1de54d8cc7cf82b9b6e49ae03
              • Instruction Fuzzy Hash: 7E515972604F80A6EB12DF62E8507ED33B0FB48B88F544426EB8D57AA9DF38C555C780
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID: -$pid
              • API String ID: 3936042273-2050111806
              • Opcode ID: 39459574276101e149e668f5135789d0d5408215e88b59f5a015b6c16a9c453e
              • Instruction ID: fabfce5da7018e4877c0198e1f144d975b50803577cf2ec6f4d5724cba0d4fa3
              • Opcode Fuzzy Hash: 39459574276101e149e668f5135789d0d5408215e88b59f5a015b6c16a9c453e
              • Instruction Fuzzy Hash: AAE17B32210B8489EB11DB2AD8943DD7766FB49BE8F604A16EB6D037E9DF78C491C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_GetctypeLocinfo::_Locinfo_ctorRegister
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 2324539378-1866435925
              • Opcode ID: 80f20ae880cd7af1f674dfb5d4272d68ab40ff994d64f0873548fe28a6f0b799
              • Instruction ID: e111c35751b719188429c53a6d1e1e3e75a67ddf4543741b545046ef157a2033
              • Opcode Fuzzy Hash: 80f20ae880cd7af1f674dfb5d4272d68ab40ff994d64f0873548fe28a6f0b799
              • Instruction Fuzzy Hash: 04C13872214B4486EB12DF1AE89039977A0F788FD4F54812AEB8D47BB5DF38C956C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 459529453-1866435925
              • Opcode ID: 184e3463d0ce68ac614c95af53a1ee39b595bdcaf27f52da81bf45af14359873
              • Instruction ID: 54f7ea9e9456682b64ccfbfe22fe961ef79f89a3d10c261f5dd0102d8e8e279a
              • Opcode Fuzzy Hash: 184e3463d0ce68ac614c95af53a1ee39b595bdcaf27f52da81bf45af14359873
              • Instruction Fuzzy Hash: 00A12872205B8492EB22CF16E8903AA77A1F788BD4F548526EF8D077B5DF39C546C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 3702003507-1866435925
              • Opcode ID: 037d58fa15f78d050895b9cf95e4fb02945ca99b45a46e19e7fa2bc18823c683
              • Instruction ID: 6c72215b502308b4d19634f5713abeefe1ea61ab301b75ccf22e2709bc96f48c
              • Opcode Fuzzy Hash: 037d58fa15f78d050895b9cf95e4fb02945ca99b45a46e19e7fa2bc18823c683
              • Instruction Fuzzy Hash: 5D911C72205B8481EB22DF5AE8913DAB7A1FB88BD4F148526EB8D47B79DF38C445C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$GetctypeLocinfo::_Locinfo_ctor
              • String ID: bad locale name
              • API String ID: 249287498-1405518554
              • Opcode ID: e7082fab6352342f877f570bc33ebb75009c9146a37448a9756aafedec09829e
              • Instruction ID: e3a783b7f3f4e3b661fd681bf2fe5da9bcad8ebf194ad2d0229f9e04157e6bdf
              • Opcode Fuzzy Hash: e7082fab6352342f877f570bc33ebb75009c9146a37448a9756aafedec09829e
              • Instruction Fuzzy Hash: D6712A32745B8085EB12DF62E8903DD73A5FB887C8F144529AF8967AAADF38C915C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorLast$CurrentFileMappedNameProcess
              • String ID: DataFolder$Unable to get the path of the module!$Unable to retrieve the path of the module!$Unable to store the path of the module!
              • API String ID: 1207367512-2037552110
              • Opcode ID: fe1bfbe4a8589865e0ba6e72039b0dcf4a50e70ce2de8e1576109a64ebb87e3c
              • Instruction ID: 1d99d5b9ee9eab08dc8c86b6c5e7e0c5ead8c965952f76fc9aec46b7c3feec4a
              • Opcode Fuzzy Hash: fe1bfbe4a8589865e0ba6e72039b0dcf4a50e70ce2de8e1576109a64ebb87e3c
              • Instruction Fuzzy Hash: 0F615B72218AC491EA62DB22F4507EEA361F79C784F904126EBCD43A69EF78D585CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseFindVolume
              • String ID: 5$DataFolder$Unable to convert NT path '{}' to a volume GUID path!$Unable to enumerate volumes!$Unable to retrieve volume paths for volume '{}'!$\Device\LanmanRedirector\$\Device\Mup\$\SystemRoot\
              • API String ID: 664902110-4246012846
              • Opcode ID: ad7c29b02100301719761f52cc2ea08ae8938a70180d7a4fb3ce1e8974dcccf1
              • Instruction ID: 1849c877932131e3aeac80045ee2ef2a80c108937b66888cc186d23b58077a11
              • Opcode Fuzzy Hash: ad7c29b02100301719761f52cc2ea08ae8938a70180d7a4fb3ce1e8974dcccf1
              • Instruction Fuzzy Hash: 48519F72614B8081FB71DB16E8407D973A4F7887D0F408616FFA927AA5DF79C885CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
              • String ID: ios_base::failbit set
              • API String ID: 3936042273-3924258884
              • Opcode ID: d0e7e7a2e1974941ae1b96c1c99521119145b685d426650eb89f3a2a2397f915
              • Instruction ID: 527590365acff6ada6692441932f82eef4975a9590fe435fe90c4af1a2a30145
              • Opcode Fuzzy Hash: d0e7e7a2e1974941ae1b96c1c99521119145b685d426650eb89f3a2a2397f915
              • Instruction Fuzzy Hash: 8DD1B472614B8481EA16DB26E4513AD7360F799BE4F548315FBAC037E6EF78C990C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: $ $ [ --$K
              • API String ID: 3668304517-1316898524
              • Opcode ID: ba8ad85fab49c1c8392720268d41424c6e3a0a2850a9b770de3f8b71cd50b351
              • Instruction ID: 33b8748a0ce9b5a7b6ba9b5a28cad75024c6bf3266164c939941f4dadec6fb65
              • Opcode Fuzzy Hash: ba8ad85fab49c1c8392720268d41424c6e3a0a2850a9b770de3f8b71cd50b351
              • Instruction Fuzzy Hash: 07C1B472605B8486EF269B2AD85439D6362F789BE4F244A11FF4E07BA9DF78C481C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: Argument not found.$Can not switch from automatic to manual indexing$Can not switch from manual to automatic indexing$Invalid format string.$Missing '}' in format string.$Number is too big$Unknown format specifier.
              • API String ID: 3668304517-96604897
              • Opcode ID: 6ae073d4a7f77a6a8e7fd1a17a5666f8309c59158a6396b1077f6afd641cada8
              • Instruction ID: 8a5a0fab3dddc5db6a430d1a720256370c53a79f4d382a8c8edb9d15e8c8aa08
              • Opcode Fuzzy Hash: 6ae073d4a7f77a6a8e7fd1a17a5666f8309c59158a6396b1077f6afd641cada8
              • Instruction Fuzzy Hash: 7E91C272604A848AE7238F26E4447EC7BA1E75D7C8F94851AEF8C037B9EB35D955C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: EnvironmentExpandStrings$CloseErrorLastOpenQueryValue
              • String ID: String environment expansion failed$String environment expansion failed due to unexpected buffer size
              • API String ID: 2357329694-527591527
              • Opcode ID: bed5391467c1121ca96b4b31fc48628f542f9b303b31acf90c8e8063643ebaf0
              • Instruction ID: 9460c06f9952e987e85a005f162b0bb574501fdc1195e6a76ad8fd59d77a2e83
              • Opcode Fuzzy Hash: bed5391467c1121ca96b4b31fc48628f542f9b303b31acf90c8e8063643ebaf0
              • Instruction Fuzzy Hash: 1491BC72710A40A9EB22DF76D4903EC33B1EB98788F404512FB4957AA9EF39CA95C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: Argument not found.$Can not switch from automatic to manual indexing$Can not switch from manual to automatic indexing$Invalid format string.$Missing '}' in format string.$Number is too big$Unknown format specifier.
              • API String ID: 3668304517-96604897
              • Opcode ID: b289502791915fcfb5ba3a21ab0722be7a2e243f680952d3b3a9c662d29fc3e9
              • Instruction ID: 0ec7cd76aa4e2c5961cd70c4a005674cb22b336ee8f1c367bf3f397a015a45d5
              • Opcode Fuzzy Hash: b289502791915fcfb5ba3a21ab0722be7a2e243f680952d3b3a9c662d29fc3e9
              • Instruction Fuzzy Hash: DA81DB72600A449AE722DF2AE4447EC37B5F758BC4F908522EF8C07B69EB39C5A5C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorFileLast$ReadSize
              • String ID: get_file_content$get_file_content: GetFileSizeEx$get_file_content: ReadFile
              • API String ID: 3509033087-2648918662
              • Opcode ID: 6fff3f04ea3b197b3296cdd13bade9e01c6dd2927da1543f621be0ffb8e9d733
              • Instruction ID: d61b73416bd6d7c834fc3e4ea08e9635e00d5d11ecda4caa3ef7cc9c25f81872
              • Opcode Fuzzy Hash: 6fff3f04ea3b197b3296cdd13bade9e01c6dd2927da1543f621be0ffb8e9d733
              • Instruction Fuzzy Hash: A6516672700A8499EB12DF72E9403ED33A5E758BC8F418522BF4E17A69EE38D695C340
              APIs
              • FreeLibrary.KERNEL32(?,00000000,00000000,000000014009B708,?,?,?,?,0000000140095C7D,?,?,?,?,0000000140060E04), ref: 000000014009AFEF
              • GetProcAddress.KERNEL32(?,00000000,00000000,000000014009B708,?,?,?,?,0000000140095C7D,?,?,?,?,0000000140060E04), ref: 000000014009AFFB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID: api-ms-$ext-ms-
              • API String ID: 3013587201-537541572
              • Opcode ID: 715d91696d5f05c1d05fb450de7ca50a66ac6eb40b0d5cf0c54e9b46d7f48f02
              • Instruction ID: 9b0e2bc5e33462b48884463105d41d1d058da79c167aef460b2c70ee2a237020
              • Opcode Fuzzy Hash: 715d91696d5f05c1d05fb450de7ca50a66ac6eb40b0d5cf0c54e9b46d7f48f02
              • Instruction Fuzzy Hash: 0A41B2B2311A0096FB17DB57A8643D563A6BB4EBE0F184535BF198B7A5EF3CC4458380
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo
              • String ID: f$p$p
              • API String ID: 3215553584-1995029353
              • Opcode ID: 46919a817da2534f5824c40397ea1c5d459151ac2c327dc55986b63d88954a0d
              • Instruction ID: 2b112e5cc3b9fed0b3e6fc0e951df276abf5b814fa7f693cb19a1f86b623236f
              • Opcode Fuzzy Hash: 46919a817da2534f5824c40397ea1c5d459151ac2c327dc55986b63d88954a0d
              • Instruction Fuzzy Hash: 5912A07360414186FB26BE56E0547EAB6A2F3997E4FDC4015F7C247AE8D63DC7809B04
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID: prefix
              • API String ID: 3668304517-2477885070
              • Opcode ID: 0e4aa983185c1852e1d017b38383dafe2a0531d02685cdc7dab4165f0644b2c5
              • Instruction ID: 7ee74934a6ccb17f949b4455a25dab5283cfa3cc9bc51289ddcf73f01baaccea
              • Opcode Fuzzy Hash: 0e4aa983185c1852e1d017b38383dafe2a0531d02685cdc7dab4165f0644b2c5
              • Instruction Fuzzy Hash: A402A932710A848AFB22DBA6D0403ED27B2E748BC8F445615EF5927BEADB78C595C344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_task$Locinfo::_Locinfo_ctor
              • String ID: false$true
              • API String ID: 2740378190-2658103896
              • Opcode ID: abc2807fcc9a3990018865eccb76438d26fc032f544cb797fc049037c0a27c05
              • Instruction ID: ecb81626bd03e3a807474287880aa0c3bcef507e45b04215bfc02994481c7157
              • Opcode Fuzzy Hash: abc2807fcc9a3990018865eccb76438d26fc032f544cb797fc049037c0a27c05
              • Instruction Fuzzy Hash: 21B17F32615B8086E712DF22E8403DA77A4FB987C8F145625FF881BBAADF79C591C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: Resource section is empty$StringFileInfo$There is no resource section in module$Unable to determine product identifier from resources!
              • API String ID: 0-3023212541
              • Opcode ID: a29aeeb14d2df50d98afcdf1b0d4279c1eeb0476905c306e89f4bcb3cbedc810
              • Instruction ID: cf6080c2011ba1a2cf470b03cb6a33f21a7d019162a361bb936239f857183a0e
              • Opcode Fuzzy Hash: a29aeeb14d2df50d98afcdf1b0d4279c1eeb0476905c306e89f4bcb3cbedc810
              • Instruction Fuzzy Hash: A5A1AB72A00B9086D710CF19E444B9AB7A1F799BB4FA58325EBBD437E4EB38C595C700
              APIs
                • Part of subcall function 0000000140079670: RtlAcquireSRWLockExclusive.NTDLL ref: 0000000140079680
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 00000001400452F4
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 0000000140045304
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 0000000140045311
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: HandleModule$AcquireAddressExclusiveLockProc
              • String ID: ModuleId$ProductId$on_avast_dll_unload
              • API String ID: 920030147-2425011003
              • Opcode ID: 037e22b5e19308eba2705e2bfc324ad02dd89a86a19de993d254a0a7635cba5a
              • Instruction ID: 323f4e85ebe704c904bfe2354bead2b7d203800df374dfaaa8868d3716c1b990
              • Opcode Fuzzy Hash: 037e22b5e19308eba2705e2bfc324ad02dd89a86a19de993d254a0a7635cba5a
              • Instruction Fuzzy Hash: 8B31B271220A8591EE13EF16E8517DA6321FB987C9F805221F38E576B6EF3CC648C740
              APIs
              • LoadLibraryExW.KERNEL32(00000000,?,00000000,0000000140086DF3,?,?,?,000000014007B7DE,?,?,00000000,000000014007B799), ref: 0000000140086C71
              • GetLastError.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086C7F
              • LoadLibraryExW.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086CA9
              • FreeLibrary.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086D17
              • GetProcAddress.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086D23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Library$Load$AddressErrorFreeLastProc
              • String ID: api-ms-
              • API String ID: 2559590344-2084034818
              • Opcode ID: adb8888907e09ba1064ac421d20c92d4963af2ce4d1b24166459b60f3c77c598
              • Instruction ID: e6687341ef8f3c7ba6c879ccf321d65f832a4f308149dadd61031be3b38f39b4
              • Opcode Fuzzy Hash: adb8888907e09ba1064ac421d20c92d4963af2ce4d1b24166459b60f3c77c598
              • Instruction Fuzzy Hash: F631AE32312B4091EE27DF67A8007A933A4FB4CBE5F5A0925BF994B7A0EF78D5408300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
              • String ID: CONOUT$
              • API String ID: 3230265001-3130406586
              • Opcode ID: 87ff61bf0eb5e7788eeeeeab0a9fcabd9a512a72c9e2d02dbeac0c991f3165b4
              • Instruction ID: 372faba3a097c7d2f6a08d2073c60a5f207de366b8f73af6c1a75e1845f4a562
              • Opcode Fuzzy Hash: 87ff61bf0eb5e7788eeeeeab0a9fcabd9a512a72c9e2d02dbeac0c991f3165b4
              • Instruction Fuzzy Hash: BF115871314E8086E7528F57F84439AA3B0F79CFE4F144224EBA987BB4DB78D9948740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ByteCharMultiStringWide
              • String ID:
              • API String ID: 2829165498-0
              • Opcode ID: 3557958d0ae3b78f9751d0b8b814af1337478352f741e81fc4db53b26dea7625
              • Instruction ID: 6842bab0ad94cae96335bbfa1fc2af57c68baecb01e2109dcbb880e736b599f6
              • Opcode Fuzzy Hash: 3557958d0ae3b78f9751d0b8b814af1337478352f741e81fc4db53b26dea7625
              • Instruction Fuzzy Hash: 5A819672214B8086EB228F66E8503DA67E2FB89BE8F244615FB5D57BE4DF7CC4458700
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7c16cbe06e57022fcb9eb00b63ed72328f14eb8be0c39fae87b8467141f4297a
              • Instruction ID: 9b566be6c38d7f59c4d767b02cbd1e074424b53eb7bcce1e57e5e8e23f6a8e27
              • Opcode Fuzzy Hash: 7c16cbe06e57022fcb9eb00b63ed72328f14eb8be0c39fae87b8467141f4297a
              • Instruction Fuzzy Hash: D7716932614AC09DEB229FB6D8503ED3B72F31939CF544606EF9817AAADB74C684C350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: 198bbccf348a905434221bb5f7dc1ad49d1d9e274a8e8bf475110d6e8ef405a1
              • Instruction ID: 94f7ca4aff702e3f9992d92c36c271d965f3f5f725d085f13adeda8b124abf24
              • Opcode Fuzzy Hash: 198bbccf348a905434221bb5f7dc1ad49d1d9e274a8e8bf475110d6e8ef405a1
              • Instruction Fuzzy Hash: 74314F72381A4091EB17DB57E8513DA6362E78DBE4F280921EF8D477F5DA38C842C310
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_destroy$ByteCharMultiWide__std_exception_copy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 523040611-0
              • Opcode ID: fa4dc23b3ad6e9fcd597a11a7ec9e68a2f6ac467085843f88b8659ce6f344d8a
              • Instruction ID: 3d565eefd2a7b9f8ac1bc5355bbce57d79f68becd27fc65ae4ac525cdfedcfaf
              • Opcode Fuzzy Hash: fa4dc23b3ad6e9fcd597a11a7ec9e68a2f6ac467085843f88b8659ce6f344d8a
              • Instruction Fuzzy Hash: 9F417D72614B8481EB01DB26E44539E73A4F7887D4F505221FBAC437B5EB78C596C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: 15ee7beeb097c68bc734869bcc63f727c70bbce813f3497d9f3b03ca5efdc9b0
              • Instruction ID: 1c674c83286ae2aee47e831bf660798327e6f99cfac64260bd036f09269cd56b
              • Opcode Fuzzy Hash: 15ee7beeb097c68bc734869bcc63f727c70bbce813f3497d9f3b03ca5efdc9b0
              • Instruction Fuzzy Hash: C1312972744A4081EA22DB17F8913DAB3A1FB8CBD4F544A22BB9D47BB9DA38C5418740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
              • String ID:
              • API String ID: 2294326227-0
              • Opcode ID: 090e2651584242fbda00d00416eddefc7d35491b7b686caa8ee7eef954108abb
              • Instruction ID: 5a6ca4d219850a1a36c42ee13ceabd503083a9a0d66260f7b46ad7ea63cf857b
              • Opcode Fuzzy Hash: 090e2651584242fbda00d00416eddefc7d35491b7b686caa8ee7eef954108abb
              • Instruction Fuzzy Hash: 8B311A71315A4481EA22DB27E8903DA73A1F78CBD4F584625BB9D47BF9DF38C9418700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
              • String ID:
              • API String ID: 2081738530-0
              • Opcode ID: 5b5e727d6f9bb57e30d2e841a7f4ec508acd135abc5a9031aa3e0aa538af0bb5
              • Instruction ID: 2c81a413fcad2d477535b269f603ba3d39ed49fa78c093efb9e326bff0503961
              • Opcode Fuzzy Hash: 5b5e727d6f9bb57e30d2e841a7f4ec508acd135abc5a9031aa3e0aa538af0bb5
              • Instruction Fuzzy Hash: FA313C72305A8081EA12DB27F8913DAB3A1E78CBD4F584621BB9D4BBF9DE3CC5458700
              APIs
              • GetLastError.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 0000000140098817
              • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009884D
              • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009887A
              • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009888B
              • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009889C
              • SetLastError.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 00000001400988B7
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Value$ErrorLast
              • String ID:
              • API String ID: 2506987500-0
              • Opcode ID: 7d3276344bc0c9b84c189718fe3c6237352cc154d7de042a69bf42044b124105
              • Instruction ID: 58aba3e27b1ac579a9d9edacfe43c9ab3524d4413e3a170859a1a2ba7f8ea326
              • Opcode Fuzzy Hash: 7d3276344bc0c9b84c189718fe3c6237352cc154d7de042a69bf42044b124105
              • Instruction Fuzzy Hash: 35114F7070064082FA6BA7779A913EE62529B8C7F4F580B28BF7647BF6DE38C4014B11
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave_invalid_parameter_noinfo_noreturn
              • String ID: Exception stack: $Module base:
              • API String ID: 2008198395-3948699789
              • Opcode ID: da24b52b3f46397d813f91a4cd6d684d5e8991d166ef78b384b64ff89428dca4
              • Instruction ID: ce66e9ddc033545f6407d044a9ce76e1e69ea8023946881deb25b6c407eb24ca
              • Opcode Fuzzy Hash: da24b52b3f46397d813f91a4cd6d684d5e8991d166ef78b384b64ff89428dca4
              • Instruction Fuzzy Hash: B3D17E72A00B8085E726DF66D8403E977A0F79DBC8F109215EB4D1B7AAEF39C685C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: File__std_exception_copy__std_exception_destroy$CloseCreateErrorExceptionHandleHeaderLastRaiseXtime_get_ticks
              • String ID: couldn't open file
              • API String ID: 1114502772-3645828643
              • Opcode ID: 7c8b22423497cd5fcf71eb43bec814ad0144a45b29ae167b955e874da053ca90
              • Instruction ID: 319782d7b28b5739e7981c1199afd861e8d5b3003aa0c3de4c322a0093fa346b
              • Opcode Fuzzy Hash: 7c8b22423497cd5fcf71eb43bec814ad0144a45b29ae167b955e874da053ca90
              • Instruction Fuzzy Hash: 5171E272704B5882EA15DB16B8153E9A3A5F7897E4F128232BFAE477E4EB3CD441C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ByteCharMultiWide
              • String ID: to_narrow<wchar_t> invalid arguments$to_narrow<wchar_t>::WideCharToMultiByte
              • API String ID: 626452242-1534530176
              • Opcode ID: 72503945ac01bfc4329ed9d87c037f900e34af3ca36075de242b687c440cbc09
              • Instruction ID: d6c6e307881a8f992393d6b62ca8f95ca68037eb04720d2ebeda1b4a9b1c9100
              • Opcode Fuzzy Hash: 72503945ac01bfc4329ed9d87c037f900e34af3ca36075de242b687c440cbc09
              • Instruction Fuzzy Hash: BD61AF72604A8481EB129F1AE4803D977A0F799BD4F64412AFB9907AF9DF38CD92C740
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: false$integral cannot be stored in char$true
              • API String ID: 0-219347480
              • Opcode ID: 414494b3c16a6699bf9a620f3f59aaaaf1085228148d12dab47a966e1c410d2a
              • Instruction ID: 8bdec9e6d27b5e176ae8c7e45078ecab331386496d937ac09da921fbd89a2f82
              • Opcode Fuzzy Hash: 414494b3c16a6699bf9a620f3f59aaaaf1085228148d12dab47a966e1c410d2a
              • Instruction Fuzzy Hash: 1D715872704B8489EB12CF6AD4513DC3361E749BD8F14421AEF5D17BA9DB38C95AC341
              APIs
              • RtlInitializeCriticalSection.NTDLL ref: 000000014005E943
                • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B0
                • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B6
                • Part of subcall function 0000000140079580: RtlAcquireSRWLockExclusive.NTDLL ref: 00000001400795D0
                • Part of subcall function 0000000140079580: RtlReleaseSRWLockExclusive.NTDLL ref: 00000001400795E0
              • RtlEnterCriticalSection.NTDLL ref: 000000014005E9B1
              • RtlLeaveCriticalSection.NTDLL ref: 000000014005EA60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$Concurrency::cancel_current_taskExclusiveLock$AcquireEnterInitializeLeaveRelease
              • String ID: DataFolder$Singleton already destroyed
              • API String ID: 299831208-793623586
              • Opcode ID: 70bd86f110884df4e1785b7eafbc3f5d60e84e0131820b3f25bc122850874676
              • Instruction ID: f9c2ae39cd048764f1b1a1c505b2fb8f70154a92a940e39ce9cae4f8c5b15387
              • Opcode Fuzzy Hash: 70bd86f110884df4e1785b7eafbc3f5d60e84e0131820b3f25bc122850874676
              • Instruction Fuzzy Hash: F3712C32616B8486EA56DF22E890399B3B4F78CBD0F548129EB8D43775EF39D491C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: QueryValue$ExceptionFileHeaderRaise
              • String ID: Cannot query registry data due to value changed too often$Cannot query registry value data$Cannot query registry value size
              • API String ID: 1209918281-756855248
              • Opcode ID: cdfc8d8dec3e0aceed18b92c2a090a35b64572d05e06943e6087fc05a855b88f
              • Instruction ID: e890d0c149b90de7ec06307b22622564639cb7c1eb9132f914ba7199c8ac07c1
              • Opcode Fuzzy Hash: cdfc8d8dec3e0aceed18b92c2a090a35b64572d05e06943e6087fc05a855b88f
              • Instruction Fuzzy Hash: B0714A72618B8096EB11CF26E4503DEBBB0F7987C8F505116FB8957A79DB38E584CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: QueryValue$ExceptionFileHeaderRaise
              • String ID: Cannot query registry data due to value changed too often$Cannot query registry value data$Cannot query registry value size
              • API String ID: 1209918281-756855248
              • Opcode ID: 6751fffad8c0006ff87c85d87a78f51a0e4f473fb89e5397368257717576fc6b
              • Instruction ID: d514a2feefedc57c96a96d79bb10e2e3ea0c90f8cd4c3be355e16a948fc1715b
              • Opcode Fuzzy Hash: 6751fffad8c0006ff87c85d87a78f51a0e4f473fb89e5397368257717576fc6b
              • Instruction Fuzzy Hash: F8513572614B848AEB11CF6AE8803DEB7A4F789BC4F504526FB8843B68DF38D555CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2967684691-1405518554
              • Opcode ID: aa3cac9b3afc0d7d72fb7aa3733a8dd6ac9cd9b0bd3536bb37a82acffe86e78f
              • Instruction ID: 0ddadadbcd5eafeab6b5e1e4eb9906aac0567c7b603df310d8fa229e127ad581
              • Opcode Fuzzy Hash: aa3cac9b3afc0d7d72fb7aa3733a8dd6ac9cd9b0bd3536bb37a82acffe86e78f
              • Instruction Fuzzy Hash: 0A514832B45B808AEB12DFB2E4803ED7375FB98788F144515EF8927A66EB34D555C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseErrorExceptionFileHeaderLastOpenQueryRaiseValue__std_exception_copy
              • String ID: Cannot query registry value
              • API String ID: 2471027143-1100310711
              • Opcode ID: b4f45b8d46c78af4719a31ad7011067c5d62a3d89bb104fbee140b35cca76be6
              • Instruction ID: 04ebbc1ad51d44f6911fa77968d2cf9d6d5af23c0ee17b3da5f7f2288a28212d
              • Opcode Fuzzy Hash: b4f45b8d46c78af4719a31ad7011067c5d62a3d89bb104fbee140b35cca76be6
              • Instruction Fuzzy Hash: F4415B72218B8086EB11DF26E59039A73B5F78CBC0F605525EB9943B69EF39C964CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Create$CloseErrorLast
              • String ID: Cannot create registry key
              • API String ID: 3551974399-2366797263
              • Opcode ID: 3ec95448bdc617c482522325469cceee4e515c8a8735681f6ca8fa9e47f5c220
              • Instruction ID: 3eb822ce1125e0bffa799eb2f2375e9dd5885ae909aee2e2e6b8cb74dd9c23c2
              • Opcode Fuzzy Hash: 3ec95448bdc617c482522325469cceee4e515c8a8735681f6ca8fa9e47f5c220
              • Instruction Fuzzy Hash: F5411872618B8086E761CF65E8907CE77B4F788798F10452AEF8957A68DF38C595CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Server$Register$Protseq
              • String ID: ncalrpc
              • API String ID: 1860028169-2983622238
              • Opcode ID: 4566a10439cefd2c14e989e83b89a395e60d9820173bb6aa9ef00cc5247a4b76
              • Instruction ID: 10cee73c4aa8f6cdb9266569f3072bc1e783d4a374773acd5f6aefa3e8576cce
              • Opcode Fuzzy Hash: 4566a10439cefd2c14e989e83b89a395e60d9820173bb6aa9ef00cc5247a4b76
              • Instruction Fuzzy Hash: 74115EB2214A4182F722CF22F894BC677A1F79C788F844126E78993974DB7CC508CB44
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3668304517-0
              • Opcode ID: fee4fbc3e24080502c11db0b4f51419df4899d4d6d64c79ff5143d57b816f531
              • Instruction ID: 47ab0e778c3cae299a7c4feb092146cd11f42151b130c6dcfc262edc7dbf75bc
              • Opcode Fuzzy Hash: fee4fbc3e24080502c11db0b4f51419df4899d4d6d64c79ff5143d57b816f531
              • Instruction Fuzzy Hash: 76E16772B10B8486EB16CF6AE4443DD63B2F748BD8F149616EF5817BA9DB38C594C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _set_statfp
              • String ID:
              • API String ID: 1156100317-0
              • Opcode ID: 123615ce69416e293d68908fa560a63ae141a92441ef9de540260bc5543d7e22
              • Instruction ID: 0fd36dd1a82220153425df396268225fb20c3ec40fe76be7d1705e5a7e7cb260
              • Opcode Fuzzy Hash: 123615ce69416e293d68908fa560a63ae141a92441ef9de540260bc5543d7e22
              • Instruction Fuzzy Hash: 58818332604A8449F6779F3BA4543EAB7A0EF5F3D4F094205BF9A275B5DB3CC5828A40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3939952210-0
              • Opcode ID: b3ba6bb0e34398673ff49c1a4f1d5b5dfce54e4fc739281dc3ad6e0765d69aac
              • Instruction ID: 0be40fc27ae5d9ae9e0b2865981b49cc38d1d78e8dc0d529cec524be7ca832d3
              • Opcode Fuzzy Hash: b3ba6bb0e34398673ff49c1a4f1d5b5dfce54e4fc739281dc3ad6e0765d69aac
              • Instruction Fuzzy Hash: 6E413732B11B8499EB01CF66E4813DD33B4F798788F508626EB4C57AA9EF34D6A5C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3939952210-0
              • Opcode ID: 1f2a8305fef613a7b7c1366366916cb242077bafb53b71d12d9c566d9e90576e
              • Instruction ID: 91d5117f9bfe9cdd505eb2f9f603e5257e56c558e9ab816fce1fdd8bc0944e41
              • Opcode Fuzzy Hash: 1f2a8305fef613a7b7c1366366916cb242077bafb53b71d12d9c566d9e90576e
              • Instruction Fuzzy Hash: 8B412632611B84A9EB01DF66E5903DC33B4F798788F408622FB4C57AA9EF74D6A5C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3939952210-0
              • Opcode ID: ca7198a35c09b8c2a1d2652aacee97b22971d12ad1cb2bd0ba02b99a3693a14e
              • Instruction ID: 19c0f644c5996321750162594ffae60b48271a7043ee4a7134125f2171f1065a
              • Opcode Fuzzy Hash: ca7198a35c09b8c2a1d2652aacee97b22971d12ad1cb2bd0ba02b99a3693a14e
              • Instruction Fuzzy Hash: AD413632611B8499EB01CF66E5903DC33B5F758788F408626EB9C17AAAEF34D2A5C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3939952210-0
              • Opcode ID: 733ddc207bc49f335a72192dd71da86b5e8d69a8a103fe2191a10c6033290cc1
              • Instruction ID: 196861a57875547a2a3d103c6ad5802c7914acbd5c03a4b87542c4cf7168f1df
              • Opcode Fuzzy Hash: 733ddc207bc49f335a72192dd71da86b5e8d69a8a103fe2191a10c6033290cc1
              • Instruction Fuzzy Hash: 85413472611B84A9EB01DF66E4803DC33B5F758798F408226FB9C17BA9EB74D6A5C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 3939952210-0
              • Opcode ID: be3464c3a08c349efedf0c46838e7046ce6e4dc2cd6b47540c023e9fa3259f76
              • Instruction ID: abe57ed7e5c95b63a7758696159104acb2f8c7d7a7bc1f745aec086952ebb880
              • Opcode Fuzzy Hash: be3464c3a08c349efedf0c46838e7046ce6e4dc2cd6b47540c023e9fa3259f76
              • Instruction Fuzzy Hash: D1412432611B84A9EB01CF66E4803DC33A4F79879CF408226EB4C57AA9EF34D6A5C344
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
              • String ID:
              • API String ID: 2067211477-0
              • Opcode ID: e5870b07309b9fb3d5724a213b615b567d52ca05316e70d13df25f9b5f570b04
              • Instruction ID: 965a1335f200944b60dada93899e7ebfd69b977873099df52df0a6ea16f698bd
              • Opcode Fuzzy Hash: e5870b07309b9fb3d5724a213b615b567d52ca05316e70d13df25f9b5f570b04
              • Instruction Fuzzy Hash: 32211F76205B4082EE5AAF67A4513EA73A0BBACFD4F144526FF4947BA5DF38C640C700
              APIs
              • FlsGetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 00000001400988EF
              • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 000000014009890E
              • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098936
              • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098947
              • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098958
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 1242a127319296256211208d7fb47c39d8199e86aaa36262febbd3c5ce4f9c16
              • Instruction ID: bfec05fd07b564d1a0d2a0394d3f9ac12f52d9618567ebabe614c443833c668e
              • Opcode Fuzzy Hash: 1242a127319296256211208d7fb47c39d8199e86aaa36262febbd3c5ce4f9c16
              • Instruction Fuzzy Hash: 0911427030464482FAAA9737A6913F962419B8C7F4F5C4724BF7A477F6DE38C4018B02
              APIs
              • RtlInitializeCriticalSection.NTDLL ref: 0000000140053C73
                • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B0
                • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B6
                • Part of subcall function 0000000140079580: RtlAcquireSRWLockExclusive.NTDLL ref: 00000001400795D0
                • Part of subcall function 0000000140079580: RtlReleaseSRWLockExclusive.NTDLL ref: 00000001400795E0
              • RtlEnterCriticalSection.NTDLL ref: 0000000140053CE1
              • RtlLeaveCriticalSection.NTDLL ref: 0000000140053DAF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$Concurrency::cancel_current_taskExclusiveLock$AcquireEnterInitializeLeaveRelease
              • String ID: Singleton already destroyed
              • API String ID: 299831208-257684709
              • Opcode ID: 7c6f20288bbf5095be689e7122dd872f908856bf7fa0d0142f9cf8bb55b22af9
              • Instruction ID: 4b35a25cb3c4676208d3a52ba88c4e2f7e65f3b440d398bc6bcd8edda79aa7a5
              • Opcode Fuzzy Hash: 7c6f20288bbf5095be689e7122dd872f908856bf7fa0d0142f9cf8bb55b22af9
              • Instruction Fuzzy Hash: 9D716A32611B8086EB56CF22E8903A9B3B4F79CB84F558225EB8D43775EF39D4A1C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
              • String ID: n once
              • API String ID: 1944019136-284773441
              • Opcode ID: ce6991487a4218bd576e611f7037e5cbbe3899e4f8cc35503520b7f070ed61ce
              • Instruction ID: 5dc7f5d92bccd6774901fa63c351214304673952db77c16a97a7a1ee0dbacc22
              • Opcode Fuzzy Hash: ce6991487a4218bd576e611f7037e5cbbe3899e4f8cc35503520b7f070ed61ce
              • Instruction Fuzzy Hash: 12516972611B8489EB12CF7AE8543DD3366EB49BD8F509611AB5C07BEADF78C181C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
              • String ID: ($/
              • API String ID: 1944019136-2468745909
              • Opcode ID: 2b0b3099e6005553687e055680946745d6231b4c04129d9763468462212361d5
              • Instruction ID: 0464f1527052c086c2319fab285b9ceaf66ebf46eb78baafa60bfd9882813a2a
              • Opcode Fuzzy Hash: 2b0b3099e6005553687e055680946745d6231b4c04129d9763468462212361d5
              • Instruction Fuzzy Hash: B551BE72215B8081FB02CB6AE49439EB3A1E789BE4F105615FBAD477EADF7CC0848700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2775327233-1405518554
              • Opcode ID: 1414991dbdecf56344e52e0e0c32b67c05f8fda9118dd4dbe854212d07a6a867
              • Instruction ID: 4b21ec1d3f5d05d5fbb28de49515162a2d6aca5fef3022fe2805013068dcbc0d
              • Opcode Fuzzy Hash: 1414991dbdecf56344e52e0e0c32b67c05f8fda9118dd4dbe854212d07a6a867
              • Instruction Fuzzy Hash: BB411532716A80D9EB56DF62E4913EE33A4EB48788F044425EF4927EAADF34C525D344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
              • String ID: bad locale name
              • API String ID: 2775327233-1405518554
              • Opcode ID: 67334affb38956a56cdcccb68bfac42c5f3a00cad1a36b976b3c7baf7da2d873
              • Instruction ID: 1b4047c68961f6d1163d1ec08fe634b61fb2381447eb18497c5d1b166cf7dcd0
              • Opcode Fuzzy Hash: 67334affb38956a56cdcccb68bfac42c5f3a00cad1a36b976b3c7baf7da2d873
              • Instruction Fuzzy Hash: 05416832316B80C9EB16DFB2E4917ED33A4EB48788F044425EF496BAAADF35C525D344
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy_invalid_parameter_noinfo_noreturn
              • String ID: C$O
              • API String ID: 1109970293-2585155372
              • Opcode ID: 53e7129cb027607950035b9adad8961daa4b36f300ac358a440e50e719d15978
              • Instruction ID: be6445adadab469562bc0324a6a1ac9beb165ce9228a46a260c9a1a5fa40831e
              • Opcode Fuzzy Hash: 53e7129cb027607950035b9adad8961daa4b36f300ac358a440e50e719d15978
              • Instruction Fuzzy Hash: 34313C72514B8482E7128B2AE4513E97760FB9DBD8F505216FB9C437B6EB7CC195C310
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: EnvironmentErrorLastVariable
              • String ID: -$Unable to retrieve environment variable '{}'!
              • API String ID: 3114522214-584169599
              • Opcode ID: 527f662b23c1b4a882dbf7370019445303981129e745c3a8f1c2050ea109a79a
              • Instruction ID: f5d8d70390093e31130ea3b6e30c320d89e7b569c4f444a5908d59a2e5c8d7e2
              • Opcode Fuzzy Hash: 527f662b23c1b4a882dbf7370019445303981129e745c3a8f1c2050ea109a79a
              • Instruction Fuzzy Hash: F0212832618B8481E751DB22E85539AB3A5FB8CBC4F504125BBCD43669EF3CD5958B40
              APIs
                • Part of subcall function 0000000140055880: RtlInitializeCriticalSection.NTDLL ref: 00000001400558C1
                • Part of subcall function 0000000140055880: RtlDeleteCriticalSection.NTDLL ref: 00000001400558DA
                • Part of subcall function 0000000140055880: RtlEnterCriticalSection.NTDLL ref: 0000000140055937
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559A4
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559C5
              • RtlLeaveCriticalSection.NTDLL ref: 00000001400559EF
              Strings
              • asw::lifetime::impl::lifetime_creation_monitor_holder::set_created, xrefs: 0000000140055A10
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$CloseDeleteEnterEventHandleInitializeLeave
              • String ID: asw::lifetime::impl::lifetime_creation_monitor_holder::set_created
              • API String ID: 3040484998-3605786268
              • Opcode ID: a97a8769dbe6fd78ecf7b1a42f8fdec5e0d80cc19b8db7cc52d4824e9a28bc80
              • Instruction ID: 4938b172fda1cedb61a9709e50ad8186f7bef5d74812dc94d7dba1a726f99d2a
              • Opcode Fuzzy Hash: a97a8769dbe6fd78ecf7b1a42f8fdec5e0d80cc19b8db7cc52d4824e9a28bc80
              • Instruction Fuzzy Hash: 43213A32204B4482EB12EF26E8A43A963B4FB8CBD4F644521EB5D476B5DF78D891C740
              APIs
              • CreateEventW.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565A0
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565C3
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565E3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseCreateErrorEventHandleLast
              • String ID: Cannot create event
              • API String ID: 937152468-3475436419
              • Opcode ID: 85e723dc28051c9128e89b5ef90c266e87eb60135b79c33272b5393e587c48b7
              • Instruction ID: 8c3f2093b324fccf10d60abad5a9520c9baf034ca4899f78ebf9708e01a9c787
              • Opcode Fuzzy Hash: 85e723dc28051c9128e89b5ef90c266e87eb60135b79c33272b5393e587c48b7
              • Instruction Fuzzy Hash: 0D118B31302E8682EF27DBA2A8103D963A1BB4CB84F480425AB8D43B74EF7CD515C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseDeleteErrorLastOpenValue
              • String ID: Cannot delete registry value
              • API String ID: 1963916417-4063604081
              • Opcode ID: 67389c08b5669c2787062dd8f1e903ed67bb6e7db85a2c69f7914face2663579
              • Instruction ID: 506817aa63d746383d21c3308bf371876a7f944bd3a9b96990b4554b18483697
              • Opcode Fuzzy Hash: 67389c08b5669c2787062dd8f1e903ed67bb6e7db85a2c69f7914face2663579
              • Instruction Fuzzy Hash: 04118272628B8082EB11DB62F45539A73B4FBCD7C4F405915BA8D43675DF3CC5448B00
              APIs
                • Part of subcall function 000000014005A7A0: RegOpenKeyExW.ADVAPI32 ref: 000000014005A871
              • RegDeleteTreeW.ADVAPI32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B01
              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B2F
              • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B3B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseDeleteErrorLastOpenTree
              • String ID: Cannot delete registry key tree
              • API String ID: 321458958-3455289483
              • Opcode ID: a3ded7c5a9c98ec971dc730303bf7900f9e99ad81b66e9a2e0dad1d390e19f4e
              • Instruction ID: 9cea434b4cbf3e4c222e52f50331696bd945e54bcaac784f61492dfacb5b65a7
              • Opcode Fuzzy Hash: a3ded7c5a9c98ec971dc730303bf7900f9e99ad81b66e9a2e0dad1d390e19f4e
              • Instruction Fuzzy Hash: 6C018072628F8082EA21EB72F85539AA3A0FBCD784F401A15B68D93675EF3CC1448B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: RtlDllShutdownInProgress$ntdll.dll
              • API String ID: 1646373207-582119455
              • Opcode ID: 486b237c5a67cd82c74454a3fea0250b3484a4e9cd859289d73c8fac4d6443f3
              • Instruction ID: 0f3b9b58c82f9aa9ab337f3f0cfcadf00547ac744fe9edc45628ac7a7d5f9fd8
              • Opcode Fuzzy Hash: 486b237c5a67cd82c74454a3fea0250b3484a4e9cd859289d73c8fac4d6443f3
              • Instruction Fuzzy Hash: C2D0C974622E00E1E607AF47EC553D43271B74C791FD00515D60A03330AF3CD55AC740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FileWrite$ConsoleErrorLastOutput
              • String ID:
              • API String ID: 2718003287-0
              • Opcode ID: 40bd82a7c78bf1289091e82a3ee2415cba04c08fad2a586ea6ade76a6e5a6c9c
              • Instruction ID: 19c48ec83b0aa6899f29b94af066237a63b485f59a4bf98e1bf1d6ef42a76257
              • Opcode Fuzzy Hash: 40bd82a7c78bf1289091e82a3ee2415cba04c08fad2a586ea6ade76a6e5a6c9c
              • Instruction Fuzzy Hash: B7D1EE72B14A848AE712CFBAD5403DD3BB5F348BE8F544216EF9997BA9DA34C416C700
              APIs
              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,000000014009C4B4), ref: 000000014009C637
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,000000014009C4B4), ref: 000000014009C6C1
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ConsoleErrorLastMode
              • String ID:
              • API String ID: 953036326-0
              • Opcode ID: 9a7970f5ad25ba0cc72ceb65fdea28adc17d09fc76d9a74a9c055339a61bbc4e
              • Instruction ID: 67242f7ddf94f2eece3f833f1a970e01786ae8192ca36f6c3b2749f4ec89bbe2
              • Opcode Fuzzy Hash: 9a7970f5ad25ba0cc72ceb65fdea28adc17d09fc76d9a74a9c055339a61bbc4e
              • Instruction Fuzzy Hash: AC91D1B2B24A5489FB62CFA79480BED6BA0F34CBD8F545106EF4A57AB5CB34C485C710
              APIs
              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014003B1A9), ref: 0000000140028ED2
              • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014003B1A9), ref: 0000000140028F12
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ByteCharMultiWide
              • String ID: to_wide<char> invalid arguments$to_wide<char>::MultiByteToWideChar
              • API String ID: 626452242-363086301
              • Opcode ID: c7c08583812b46095b61781c5ffed97884927f8ba22f2713555a0cc6983142a8
              • Instruction ID: 4d8cc23a3861524033b35381a912b0fc51dcb5d9570516251ee907262d4b9398
              • Opcode Fuzzy Hash: c7c08583812b46095b61781c5ffed97884927f8ba22f2713555a0cc6983142a8
              • Instruction Fuzzy Hash: FB410F32215B8481EB629F02E5403E973A1FB98BD8F141139BF5E07AB5EF38C992C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseErrorInfoLastOpenQuery
              • String ID:
              • API String ID: 4026330008-0
              • Opcode ID: cda00aa15a7f34e4a25872eaeea430025bd5d75f5a785da38cf24a26c16a6e6b
              • Instruction ID: a71bdfb01883035fc8546c3d1f1f35ec8381dc35e6c8e93d0c80b9c088452a08
              • Opcode Fuzzy Hash: cda00aa15a7f34e4a25872eaeea430025bd5d75f5a785da38cf24a26c16a6e6b
              • Instruction Fuzzy Hash: F6311D32218B8486EB61CF56F49979AB3A8F7887C0F644126EBD943B64DF39C551CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$Leave$CloseCreateDeleteEnterEventHandleInitialize
              • String ID:
              • API String ID: 3435541109-0
              • Opcode ID: 27da87d7525a020086e45bc55bec4e685603b6a503a6185e878488744b99e3b4
              • Instruction ID: 85fc1c0a83deffbb265eef27bece4194f1a6fa20c55c05c7cdf3801a246b2988
              • Opcode Fuzzy Hash: 27da87d7525a020086e45bc55bec4e685603b6a503a6185e878488744b99e3b4
              • Instruction Fuzzy Hash: E4316A72214B8086F763DF22F85079A77A4F78C7D8F188611BB8957AA5DF38D491C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ConditionMask$InfoVerifyVersion
              • String ID:
              • API String ID: 2793162063-0
              • Opcode ID: 452efdd4f692d1e884ec315b98b4abd69929eecd61e40fe0fb36c871c85bc769
              • Instruction ID: 013a3806318f21c79f943d46fcd361c2d7bcf03c60229824e0722f46477d8758
              • Opcode Fuzzy Hash: 452efdd4f692d1e884ec315b98b4abd69929eecd61e40fe0fb36c871c85bc769
              • Instruction Fuzzy Hash: E3114F3261568496E731CF22F4457DAB3A0FB8CB84F118625EB9947B64EB3CD645CF40
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2960854011-0
              • Opcode ID: 6733e03be22301ba3ef0e99c153bae17e299ab6a1f83f2e860b0a71dd9607e63
              • Instruction ID: f0bb4adc6b4dd4a7cf9654619226c9556f9994f544bcbf27281b2ab3b3870acc
              • Opcode Fuzzy Hash: 6733e03be22301ba3ef0e99c153bae17e299ab6a1f83f2e860b0a71dd9607e63
              • Instruction Fuzzy Hash: FA118C32624B4481EB01DF25E48539D77A4F798BC4F604125FB9D4376AEF38C996C750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2960854011-0
              • Opcode ID: 542e6935168dbd11bc08cd37ad643b41faa539432d4ebbdd17dca4974c99cdd3
              • Instruction ID: 267324faae7d233520a0d8ed61557ded62087f4cbaf681df3e553709503b3392
              • Opcode Fuzzy Hash: 542e6935168dbd11bc08cd37ad643b41faa539432d4ebbdd17dca4974c99cdd3
              • Instruction Fuzzy Hash: 99118C32624B4481EB01DF25E48139D77A4F79CBC4F608125FB9D0376AEB38C996C710
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2960854011-0
              • Opcode ID: 62d9a73a0acf46c2332e574337326d1331295c8d0383671e655a7c7e699e0e44
              • Instruction ID: b5265a7ec846762b022f962f9ebdac92f0270735d81d900c28c8e7686cf911af
              • Opcode Fuzzy Hash: 62d9a73a0acf46c2332e574337326d1331295c8d0383671e655a7c7e699e0e44
              • Instruction Fuzzy Hash: 23214C32224B8481EB01DF21E88539D73A5F788BC4F614225FB9D43765EF38C596C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: __std_exception_copy__std_exception_destroy
              • String ID:
              • API String ID: 2960854011-0
              • Opcode ID: 7999edc1383b33dbfdbcd54aa8cc89eb2e311b35a0c690bbd6ad3fcad860ae34
              • Instruction ID: 4deb287e485d9cc7c8d53c793f4b7463465d4c3e62d044c8a5e6476d11d8e03a
              • Opcode Fuzzy Hash: 7999edc1383b33dbfdbcd54aa8cc89eb2e311b35a0c690bbd6ad3fcad860ae34
              • Instruction Fuzzy Hash: 05211832624B4481EB01DF25E88539D73A9F788BD4FA54225FB9D4776AEF38C592C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_taskExclusiveLock$AcquireRelease
              • String ID:
              • API String ID: 1304602613-0
              • Opcode ID: 84bb316eac59f392674c0bccf319f6d6d28f957edd07f7beb69ef115125f1a9f
              • Instruction ID: 0dce682ebe817e32d61f8728b318b500aeceaf637d429e04cada650a5c2243ad
              • Opcode Fuzzy Hash: 84bb316eac59f392674c0bccf319f6d6d28f957edd07f7beb69ef115125f1a9f
              • Instruction Fuzzy Hash: 44F06D70611C0591FE17AB63A8157E522B09B5C7B0F580A10BB79471F2EA3CC496C310
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: nan
              • API String ID: 0-1810114945
              • Opcode ID: a11dce36ecbdafa46039370b2097645fba5a46745698a1cbb76e0880d5fd8821
              • Instruction ID: 0e9de96d5d1ff602d59062be2b7c4507a33184d965af0a6b98dc4c34342b0870
              • Opcode Fuzzy Hash: a11dce36ecbdafa46039370b2097645fba5a46745698a1cbb76e0880d5fd8821
              • Instruction Fuzzy Hash: ED028BB2604BC489EB62CF2AE4803ED3BA1F7597D8F509216FB4947BA9DB74C581C310
              APIs
              • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 0000000140025C1B
                • Part of subcall function 0000000140062898: MultiByteToWideChar.KERNEL32 ref: 00000001400628B4
                • Part of subcall function 0000000140062898: GetLastError.KERNEL32 ref: 00000001400628C2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ByteCharErrorLastMultiWide__std_fs_convert_narrow_to_wide
              • String ID: \u{$\x{
              • API String ID: 1033888727-3325273574
              • Opcode ID: ae328bf1be006d6752bff118feeef84db8402c3f6fcce22a48d6b254611e15d3
              • Instruction ID: 54a2823de4257917c54320cb21ca7cf787ad5b1ae14b123a1386ac876b94e2fe
              • Opcode Fuzzy Hash: ae328bf1be006d6752bff118feeef84db8402c3f6fcce22a48d6b254611e15d3
              • Instruction Fuzzy Hash: 5E024A72604B8886DB169F26D5903AD7B61F348FC9F948516EF5E033A8DF38C856C354
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in wchar_t
              • API String ID: 0-1689078516
              • Opcode ID: b2893074f87381b3bfe03490b58b747f50e7b23f689dc4be389cbe9dfe34f12b
              • Instruction ID: 7f534a460b2e3e69ceffbc228a422ce7ce83d315cc88fab3d6e8895a6351ad92
              • Opcode Fuzzy Hash: b2893074f87381b3bfe03490b58b747f50e7b23f689dc4be389cbe9dfe34f12b
              • Instruction Fuzzy Hash: C7E192B2B14B8485EB22CB6AF4407ED77A1F7487D8F508116EB9E17BA9DB38C585C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in char
              • API String ID: 0-960316848
              • Opcode ID: de3f9bbb75f06938dda710c6efef91e6c5b368340e744e9b07a28b2e26b52ac5
              • Instruction ID: 53947a9d27e19c6f0efc18f476bfc996490f820c94bca11df3eac56f3b26ff61
              • Opcode Fuzzy Hash: de3f9bbb75f06938dda710c6efef91e6c5b368340e744e9b07a28b2e26b52ac5
              • Instruction Fuzzy Hash: 4CE1C272614B8495EB22CBAAE4503ED77A1F7487D4F50851AFB9D13BB8DB38C984C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in wchar_t
              • API String ID: 0-1689078516
              • Opcode ID: 8ca15a9393aa8e6eb612ff0fba9b85bf37b20341f5a6997befa598268c2b8718
              • Instruction ID: f3069717cfdafdd280e1c1ab3f26c5eca656a1b41689258997a484e0637ade87
              • Opcode Fuzzy Hash: 8ca15a9393aa8e6eb612ff0fba9b85bf37b20341f5a6997befa598268c2b8718
              • Instruction Fuzzy Hash: 02E1E432714B8489EB16CB6AE4403ED77B1F7887C8F548116FB990BBAADB39C545C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in char
              • API String ID: 0-960316848
              • Opcode ID: d0d2e916398f6898de0923c58e3c77d0ec866c883e4f6f62d43be85d5bfc6e1d
              • Instruction ID: d21b3c0728488a04d0f0e3c182603a63497a7304f0bd80a36175043157c340ad
              • Opcode Fuzzy Hash: d0d2e916398f6898de0923c58e3c77d0ec866c883e4f6f62d43be85d5bfc6e1d
              • Instruction Fuzzy Hash: 45E1C272614BD489EB22CB6AE4407ED77A1F7887D4F50411AEB9E13BB9DB38C985C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in wchar_t
              • API String ID: 0-1689078516
              • Opcode ID: 6e5655417842cec83c6c31e054ae60070a1cb284b4648287c0c18fd5079e7d29
              • Instruction ID: 177f1ddbb5c8bb6812cf0caabf67a1115521c4c1a6353a107d4e0cf6bb5ac0da
              • Opcode Fuzzy Hash: 6e5655417842cec83c6c31e054ae60070a1cb284b4648287c0c18fd5079e7d29
              • Instruction Fuzzy Hash: 1EE1C2B2B04B8489EB22CB6AE4407ED77A1F7897D4F508116EB9D17BA9DB38C585C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in char
              • API String ID: 0-960316848
              • Opcode ID: dd939a103b95df8a5a583a298043b0a1e500fba652d1453b2587984992a50253
              • Instruction ID: afb9f644a45fe65091148028d645abc2b9e5c2307c5cdcbedacd16938f3a67f8
              • Opcode Fuzzy Hash: dd939a103b95df8a5a583a298043b0a1e500fba652d1453b2587984992a50253
              • Instruction Fuzzy Hash: 5FE18332614B8489EB22CBAAE4403ED77B1F7997D4F54411AEB9D13BB9DB38C985C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in wchar_t
              • API String ID: 0-1689078516
              • Opcode ID: ff47a51abcea04dad4cf6a7afb91ea76228fbdcaed751e7c2a681021dc8b3048
              • Instruction ID: eae89ec92fa47fb006078aa76ab9835f20a87d8bfa096dd306e392a552332065
              • Opcode Fuzzy Hash: ff47a51abcea04dad4cf6a7afb91ea76228fbdcaed751e7c2a681021dc8b3048
              • Instruction Fuzzy Hash: CBD1A2B2714BC489EB12CB7AE4403ED77A2F7497D4F508116EB9927BA9DB38C585C700
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID:
              • String ID: integral cannot be stored in char
              • API String ID: 0-960316848
              • Opcode ID: 3e08981d0d50072fffb208d1b181ce712436944bd81eb42cb26110f9af70dcdc
              • Instruction ID: 77f1a2635b4ea6a26a7bd05df825fd257562911db5390db708b577132d1802c1
              • Opcode Fuzzy Hash: 3e08981d0d50072fffb208d1b181ce712436944bd81eb42cb26110f9af70dcdc
              • Instruction Fuzzy Hash: FED1A172608B8495EB22CFAAE4403ED77A1F7487D4F50451AFB9D17BA9DB38C985C700
              APIs
              • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?), ref: 000000014005D029
              • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?), ref: 000000014005D039
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: onexit_register_connector_avast_2
              • API String ID: 1646373207-1395861777
              • Opcode ID: 5a87a214f69ad9996f46f4e108c4ea3ca191a62f081bee089b7bb08d12dc77f1
              • Instruction ID: a1a42fb89e812f52026d846da79f20e6a533aa0836c450a4e0f9b8a47379ce3e
              • Opcode Fuzzy Hash: 5a87a214f69ad9996f46f4e108c4ea3ca191a62f081bee089b7bb08d12dc77f1
              • Instruction Fuzzy Hash: 45515932611B4486EB62DF26E88479977A4F798BD0F258126EF8E03B71EF39C494C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: FileFindHeaderInstanceTargetType
              • String ID: Bad dynamic_cast!
              • API String ID: 746355257-2956939130
              • Opcode ID: 053c9f1fb5c591eed51df0dc6a645f10714740855049077f4847ad7af1dcec99
              • Instruction ID: 683ecf31377dba3ec332864e2048048cf32618811e63f4a593aac7f5a2ca328e
              • Opcode Fuzzy Hash: 053c9f1fb5c591eed51df0dc6a645f10714740855049077f4847ad7af1dcec99
              • Instruction Fuzzy Hash: FD41A633310A8482EA62CB26D850BE963A0FB68FD1F508625EF5E47760DB3CD586CB00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID: Missing '}' in format string.
              • API String ID: 73155330-4229097544
              • Opcode ID: 318dd1cd310d3d081f1afe8cb7041309903cced94d2d52f12b714d599188ddf1
              • Instruction ID: cb4f3f15b259488e5d0522d5e6846b3d1254cef31a75e9c84d18b321aa26888e
              • Opcode Fuzzy Hash: 318dd1cd310d3d081f1afe8cb7041309903cced94d2d52f12b714d599188ddf1
              • Instruction Fuzzy Hash: 9E317A72310B8885EA15DB67E5483EA63A1E74CBE0F698635AFAD077E6DA38C5408344
              APIs
                • Part of subcall function 0000000140003BB0: CloseHandle.KERNEL32(?,?,?,?,?,00000000,?,0000000140004675), ref: 0000000140003C10
                • Part of subcall function 0000000140003BB0: RtlLeaveCriticalSection.NTDLL ref: 0000000140003C51
              • WaitForSingleObject.KERNEL32 ref: 000000014000472D
              • CloseHandle.KERNEL32 ref: 000000014000474F
                • Part of subcall function 0000000140055950: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559A4
                • Part of subcall function 0000000140055950: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559C5
                • Part of subcall function 0000000140055950: RtlLeaveCriticalSection.NTDLL ref: 00000001400559EF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CloseHandle$CriticalLeaveSection$EventObjectSingleWait
              • String ID: lifetime_object must be allocated on static memory (static or global variable or member of such a variable).
              • API String ID: 1589410826-2706815617
              • Opcode ID: 70fbb50609f8680399669a0b62196d18a9183809f6b550a39b1a2611b842fc93
              • Instruction ID: 647d8cd8eba3d463f440ef20a717d61b08e7360fbff38d954fcfc02b020de2d1
              • Opcode Fuzzy Hash: 70fbb50609f8680399669a0b62196d18a9183809f6b550a39b1a2611b842fc93
              • Instruction Fuzzy Hash: B3513672205B40DAEB12DF22E8403DD33A9F758B88F554515EB8D17BAAEF38C566C384
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: CriticalSection$EnterExceptionFileHeaderLeaveRaise
              • String ID: SeDebugPrivilege
              • API String ID: 2444850325-2896544425
              • Opcode ID: 47d8983b96d37c3e8854e2e4cbbe1dba1b62a19109350f9d8f540ca4deb4a241
              • Instruction ID: f1f92afc38bd9f4ddb9e79221918fe44b65bcaace029efc352db289fed50697a
              • Opcode Fuzzy Hash: 47d8983b96d37c3e8854e2e4cbbe1dba1b62a19109350f9d8f540ca4deb4a241
              • Instruction Fuzzy Hash: 20416C32714A8482EB12DF26E990399B360F798BD0F508126EB9D47BB5DF39C955CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID: U
              • API String ID: 442123175-4171548499
              • Opcode ID: 48194efef41d634dfaafc76d3ac8d096a32dcf7b3a92be0930006c4cd2cb2571
              • Instruction ID: 0471a06396b1ad8b7ae2f15c87dca4ada56b6efaa703bd25428672b7ac151f78
              • Opcode Fuzzy Hash: 48194efef41d634dfaafc76d3ac8d096a32dcf7b3a92be0930006c4cd2cb2571
              • Instruction Fuzzy Hash: F041A272724A8486EB21DF66E4447EA67A0F79C7C4F948021EF8D87BA8DB3CC541C740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: _set_errno_from_matherr
              • String ID: exp
              • API String ID: 1187470696-113136155
              • Opcode ID: 23fb8bf8561696ed20789f4b5315ada3f67038f5de7566c309f028128f6b7feb
              • Instruction ID: 4b4ea9116dfd52d7bfed5474c20783261fbe1eeadf6c2c7b2c28c3331a2a0795
              • Opcode Fuzzy Hash: 23fb8bf8561696ed20789f4b5315ada3f67038f5de7566c309f028128f6b7feb
              • Instruction Fuzzy Hash: 23211336A11A148EE751DF79D4407EC33B0FB4D788F401525FA0A97B5ADB38C4418B84
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
              • String ID: bad locale name
              • API String ID: 1838369231-1405518554
              • Opcode ID: 802ff0980d04b4db02e5ba51858d71f3f779e2e030b5ec0d2da0c67aacc4f2da
              • Instruction ID: 012a4c23d11e70e4875300475464f06cbea90c8a51559425b988c7c1f862b1d2
              • Opcode Fuzzy Hash: 802ff0980d04b4db02e5ba51858d71f3f779e2e030b5ec0d2da0c67aacc4f2da
              • Instruction Fuzzy Hash: FF118273512B8089DB45DF76E88039937A5FB5CB84F285529EF8D4375AEB34C5A0C340
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: ExceptionFileHeaderRaise
              • String ID: csm
              • API String ID: 2573137834-1018135373
              • Opcode ID: 44996603751e475c21f511c15604da97b45f5dbdc84fbf61fd74fa057623675e
              • Instruction ID: 97096e95f0a54c85afef7ed1224f34eec0d21f81e9d769d8f74bf3c6f37c6066
              • Opcode Fuzzy Hash: 44996603751e475c21f511c15604da97b45f5dbdc84fbf61fd74fa057623675e
              • Instruction Fuzzy Hash: C011F872614B8482EB628F16F44039AB7E5F788BC4F688225EF8D47B68DF3CC5518B00
              APIs
              Strings
              • bad lexical cast: source type value could not be interpreted as target, xrefs: 000000014003C1B5
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID: bad lexical cast: source type value could not be interpreted as target
              • API String ID: 73155330-1048129864
              • Opcode ID: f3bb27ac5047e19dedf0d6da02468c2e3f585c9b51c22ee196a804300db88823
              • Instruction ID: e86fb346fa771a227f78ccbf78225370e6b6e86b001ce4119a58be2a8374efb9
              • Opcode Fuzzy Hash: f3bb27ac5047e19dedf0d6da02468c2e3f585c9b51c22ee196a804300db88823
              • Instruction Fuzzy Hash: 81F06D72A1274190ED1BE32294A179A22E09F8D7F0F500B25A779437F5EA7CC1A19740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: Call3Client
              • String ID: ProfSvc_Group$RpcSs
              • API String ID: 3485104391-3334544503
              • Opcode ID: 3ed6a751fb5f92ac7acbe13990157098f9866c2bdd419afd221b180d999669f2
              • Instruction ID: 1d081a55aff4297c1fe0a1371b611127ee1f05e2046a89e31c42fb846dc7a33a
              • Opcode Fuzzy Hash: 3ed6a751fb5f92ac7acbe13990157098f9866c2bdd419afd221b180d999669f2
              • Instruction Fuzzy Hash: 3FF0343A618F45C2DA22EF02F48478A33A4F389B98FA04525EB8D53734EF38C555CB40
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: asw_process_storage_allocate_connector
              • API String ID: 1646373207-1936732423
              • Opcode ID: 355904bb20010df249d9f112ddb9b3fafe9b2d7e850c0db1054c1d88b9a4d7da
              • Instruction ID: a866c2790b832b27c4b0a52729c54a8bf83d1d104be047b08cff1080df31d475
              • Opcode Fuzzy Hash: 355904bb20010df249d9f112ddb9b3fafe9b2d7e850c0db1054c1d88b9a4d7da
              • Instruction Fuzzy Hash: 68D00274662E4091EA1BAB63EC9539932B0B74CB91FA0142ADA4A03730EE3D959A8740
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2267902459.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
              • Associated: 00000000.00000002.2267889538.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267953665.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267985374.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2267998971.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268013211.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2268026814.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: asw_process_storage_deallocate_connector
              • API String ID: 1646373207-2412585098
              • Opcode ID: 7fbf2e3eae8837fc89484dcb5c3e227af1717040b68a3726fc97e25be653a77c
              • Instruction ID: b342fbb4cc203b2b891b2666d10f6c58ec410c46130ef509588b26ae7f2f9580
              • Opcode Fuzzy Hash: 7fbf2e3eae8837fc89484dcb5c3e227af1717040b68a3726fc97e25be653a77c
              • Instruction Fuzzy Hash: EED01274612F0091EA0BAB63EC4139832B0B74CB90FA0002ADB0A03730EF3C919A8300