Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6Pk1nTmcHN.exe

Overview

General Information

Sample name:6Pk1nTmcHN.exe
renamed because original name is a hash value
Original sample name:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe
Analysis ID:1509585
MD5:d0d55a8f4965a4d3f661b3ea268f578b
SHA1:a063be1a85bba3ffc65554d3b4c0ae1a45638451
SHA256:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda
Tags:62-192-173-45exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to debug other processes
Contains functionality to delete services
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • 6Pk1nTmcHN.exe (PID: 2308 cmdline: "C:\Users\user\Desktop\6Pk1nTmcHN.exe" MD5: D0D55A8F4965A4D3F661B3EA268F578B)
    • WerFault.exe (PID: 1184 cmdline: C:\Windows\system32\WerFault.exe -u -p 2308 -s 1292 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6Pk1nTmcHN.exeReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 RegOpenKeyExW,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GlobalMemoryStatusEx,GetDiskFreeSpaceExW,GetSystemTimes,QueryPerformanceCounter,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,0_2_000000014005A7A0
Source: Binary string: C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\avDump.pdb source: 6Pk1nTmcHN.exe
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: weblineinfo.com
Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005F7000.00000004.00000020.00020000.00000000.sdmp, 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues0
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues?K
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesrue
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_3_0053D65A NtAllocateVirtualMemory,0_3_0053D65A
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_3_0053D6CA NtProtectVirtualMemory,0_3_0053D6CA
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400026F0 GetFileAttributesW,CreateFileW,NtSystemDebugControl,CloseHandle,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_00000001400026F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400597D0 NtOpenKey,NtQueryKey,NtDeleteKey,NtClose,RegCloseKey,SetLastError,0_2_00000001400597D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140059900 NtQueryKey,NtDeleteKey,NtClose,RegCloseKey,SetLastError,0_2_0000000140059900
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140059C10 RegCloseKey,SetLastError,RegSetValueExW,RegCloseKey,SetLastError,NtClose,0_2_0000000140059C10
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02317A50 NtSetContextThread,0_2_02317A50
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02334360 NtCreateThreadEx,0_2_02334360
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02334740 NtFreeVirtualMemory,0_2_02334740
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,0_2_0231F3A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02334FF0 NtQueueApcThread,0_2_02334FF0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02318149 NtSetContextThread,0_2_02318149
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023071B0 NtClose,0_2_023071B0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023345F0 NtDuplicateObject,0_2_023345F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023351C0 NtReadVirtualMemory,0_2_023351C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140029200: CreateFileW,GetLastError,DeviceIoControl,GetLastError,CloseHandle,0_2_0000000140029200
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014006F0E00_2_000000014006F0E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400991100_2_0000000140099110
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000C2000_2_000000014000C200
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400482300_2_0000000140048230
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400263B00_2_00000001400263B0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005F3E00_2_000000014005F3E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400914200_2_0000000140091420
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400144700_2_0000000140014470
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000B5C00_2_000000014000B5C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400896080_2_0000000140089608
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400016700_2_0000000140001670
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400146990_2_0000000140014699
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400087000_2_0000000140008700
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014009A7380_2_000000014009A738
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400997900_2_0000000140099790
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A00_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400367A00_2_00000001400367A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400597D00_2_00000001400597D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400897F00_2_00000001400897F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014001D7F00_2_000000014001D7F0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400768100_2_0000000140076810
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400158600_2_0000000140015860
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000F8D00_2_000000014000F8D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014002D9400_2_000000014002D940
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400429D00_2_00000001400429D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400899DC0_2_00000001400899DC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008BA280_2_000000014008BA28
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008AA440_2_000000014008AA44
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140040A500_2_0000000140040A50
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC00_2_0000000140048AC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140018AF00_2_0000000140018AF0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140032B000_2_0000000140032B00
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000CB800_2_000000014000CB80
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089BC40_2_0000000140089BC4
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140097BEC0_2_0000000140097BEC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140098C600_2_0000000140098C60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014002FD100_2_000000014002FD10
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089DB00_2_0000000140089DB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014008BDF40_2_000000014008BDF4
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005EE200_2_000000014005EE20
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140092E140_2_0000000140092E14
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140094E300_2_0000000140094E30
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED00_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_00000001400A3F0C0_2_00000001400A3F0C
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140072F200_2_0000000140072F20
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140042F800_2_0000000140042F80
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140089F980_2_0000000140089F98
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014000AFE00_2_000000014000AFE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023272200_2_02327220
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023302100_2_02330210
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023116A00_2_023116A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023142A00_2_023142A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023282A00_2_023282A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023266E00_2_023266E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231BED00_2_0231BED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023066C00_2_023066C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0230A7300_2_0230A730
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02332F600_2_02332F60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02331F400_2_02331F40
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02322BB00_2_02322BB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023213A30_2_023213A3
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231CBE00_2_0231CBE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0232FBC00_2_0232FBC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023328120_2_02332812
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023314900_2_02331490
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231B4E00_2_0231B4E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023191200_2_02319120
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023095000_2_02309500
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231A1000_2_0231A100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02305D600_2_02305D60
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023245500_2_02324550
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02314DB00_2_02314DB0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0232B5E00_2_0232B5E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023255E00_2_023255E0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023099D00_2_023099D0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_023155C00_2_023155C0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: String function: 00000001400142A0 appears 74 times
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2308 -s 1292
Source: 6Pk1nTmcHN.exeBinary or memory string: OriginalFilename vs 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeBinary or memory string: OriginalFilenameavDump.exe* vs 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeBinary string: Unable to retrieve the path of the module!Unable to store the path of the module!Unable to get the path of the module!SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersCommon AppDataUnable to retrieve a path of the known folder ({})!%LOCALAPPDATA%%APPDATA%ProgramFilesSOFTWARE\Microsoft\Windows\CurrentVersionProgramFilesDirCommonProgramFilesCommonFilesDir\\?\Unable to convert NT path '{}' to a volume GUID path!Unable to enumerate volumes!\Device\LanmanRedirector\Unable to retrieve volume paths for volume '{}'!\SystemRoot\\Device\Mup\WSL ProcessString environment expansion failed due to unexpected buffer sizeString environment expansion failedCannot open registry keyCannot create registry keyUnable to open registry key handle using NtOpenKeyCannot delete registry keyCannot query kernel mode registry key pathCannot delete registry valueCannot delete registry key treeCannot write key valueCannot query registry valueCannot query registry value dataCannot query registry value sizeCannot query registry data due to value changed too oftenbad variant access0
Source: classification engineClassification label: mal60.evad.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 RegOpenKeyExW,GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GlobalMemoryStatusEx,GetDiskFreeSpaceExW,GetSystemTimes,QueryPerformanceCounter,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0231F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,0_2_0231F3A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC0 OpenSCManagerW,OpenServiceW,QueryServiceStatus,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,ControlService,StartServiceW,GetLastError,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,0_2_0000000140048AC0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2308
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ad21202d-ad89-4eb7-8a6e-56a08869d5a2Jump to behavior
Source: 6Pk1nTmcHN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 6Pk1nTmcHN.exeReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Users\user\Desktop\6Pk1nTmcHN.exe "C:\Users\user\Desktop\6Pk1nTmcHN.exe"
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2308 -s 1292
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 6Pk1nTmcHN.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 6Pk1nTmcHN.exeStatic file information: File size 1461248 > 1048576
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 6Pk1nTmcHN.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\BUILD\work\e0dd96435fde7cb0\BUILDS\Release\x64\avDump.pdb source: 6Pk1nTmcHN.exe
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: 6Pk1nTmcHN.exeStatic PE information: real checksum: 0x12d7e1 should be: 0x168df2
Source: 6Pk1nTmcHN.exeStatic PE information: section name: .didat
Source: 6Pk1nTmcHN.exeStatic PE information: section name: _RDATA
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140048AC0 OpenSCManagerW,OpenServiceW,QueryServiceStatus,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,RegCloseKey,SetLastError,ControlService,StartServiceW,GetLastError,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,GetLastError,0_2_0000000140048AC0
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 rdtsc 0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_02324D00
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-52210
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeAPI coverage: 3.4 %
Source: Amcache.hve.6.drBinary or memory string: VMware
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.0000000000627000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWw
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.0000000000599000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455368009.0000000000627000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: 6Pk1nTmcHN.exe, 00000000.00000002.2455730810.0000000002439000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: 9VmcI
Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.6.drBinary or memory string: vmci.sys
Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.6.drBinary or memory string: VMware20,1
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_000000014005A7A0 rdtsc 0_2_000000014005A7A0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0230CCE0 LdrGetProcedureAddress,0_2_0230CCE0
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140088100 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000140088100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140015860 OpenProcess,K32GetProcessImageFileNameW,CloseHandle,DebugActiveProcess,DebugSetProcessKillOnExit,WaitForDebugEvent,SetEvent,RtlEnterCriticalSection,RtlLeaveCriticalSection,CloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,OpenProcess,DebugBreakProcess,CloseHandle,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle,ContinueDebugEvent,CloseHandle,OpenProcess,ReadProcessMemory,OpenThread,GetThreadContext,DebugSetProcessKillOnExit,CloseHandle,CloseHandle,OpenThread,SetThreadToken,CloseHandle,GetThreadContext,GetSystemTimeAsFileTime,GetFileAttributesExW,CloseHandle,DebugActiveProcessStop,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,0_2_0000000140015860
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140088100 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000140088100
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140079AD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140079AD8

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: target process: unknownJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: target process: unknownJump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeThread register set: unknown 1Jump to behavior
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140079FFC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0000000140079FFC
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_02324D00 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,0_2_02324D00
Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\6Pk1nTmcHN.exeCode function: 0_2_0000000140030ED0 QueryServiceConfig2W,ChangeServiceConfig2W,GetLastError,SetDllDirectoryW,GetModuleHandleW,GetProcAddress,GetFileAttributesW,StartServiceCtrlDispatcherW,GetLastError,OpenSCManagerW,OpenServiceW,DeleteService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,SetConsoleCtrlHandler,WaitForSingleObject,RpcServerUnregisterIf,RpcServerUnregisterIf,RpcServerUnregisterIf,OpenSCManagerW,GetModuleFileNameW,CreateServiceW,OpenServiceW,QueryServiceConfig2W,RpcStringBindingComposeW,RpcBindingFromStringBindingW,RpcStringFreeW,CloseServiceHandle,CloseServiceHandle,ChangeServiceConfigW,OpenSCManagerW,OpenServiceW,ControlService,GetLastError,GetLastError,CloseServiceHandle,GetLastError,CloseServiceHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,_invalid_parameter_noinfo_noreturn,GetLastError,GetLastError,GetLastError,0_2_0000000140030ED0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
14
Windows Service
14
Windows Service
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
22
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
21
Process Injection
21
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Image File Execution Options Injection
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Image File Execution Options Injection
1
Obfuscated Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
6Pk1nTmcHN.exe16%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://weblineinfo.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
weblineinfo.com
62.192.173.45
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.6.drfalse
    • URL Reputation: safe
    unknown
    https://weblineinfo.com/6Pk1nTmcHN.exe, 00000000.00000002.2455368009.00000000005F7000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    62.192.173.45
    weblineinfo.comLithuania
    25780HUGESERVER-NETWORKSUSfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1509585
    Start date and time:2024-09-11 20:26:33 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 17s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:6Pk1nTmcHN.exe
    renamed because original name is a hash value
    Original Sample Name:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda.exe
    Detection:MAL
    Classification:mal60.evad.winEXE@2/5@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 83%
    • Number of executed functions: 19
    • Number of non-executed functions: 187
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.182.143.212
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: 6Pk1nTmcHN.exe
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    62.192.173.4549GqFpn1V8.exeGet hashmaliciousBruteRatelBrowse
      sGfciyumij.exeGet hashmaliciousBruteRatelBrowse
        10kmr9d7.dllGet hashmaliciousUnknownBrowse
          10kmr9d7.dllGet hashmaliciousUnknownBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            weblineinfo.com49GqFpn1V8.exeGet hashmaliciousBruteRatelBrowse
            • 62.192.173.45
            sGfciyumij.exeGet hashmaliciousBruteRatelBrowse
            • 62.192.173.45
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            HUGESERVER-NETWORKSUS49GqFpn1V8.exeGet hashmaliciousBruteRatelBrowse
            • 62.192.173.45
            sGfciyumij.exeGet hashmaliciousBruteRatelBrowse
            • 62.192.173.45
            sbuvJk8Zn8.exeGet hashmaliciousXenoRATBrowse
            • 2.58.85.196
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            10kmr9d7.dllGet hashmaliciousUnknownBrowse
            • 62.192.173.45
            mirai.spc.elfGet hashmaliciousMiraiBrowse
            • 171.22.79.159
            ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
            • 2.58.84.229
            https://denizfirsatgsmtektikbuo.xyz/Get hashmaliciousHTMLPhisherBrowse
            • 2.58.85.5
            x86.elfGet hashmaliciousMirai, MoobotBrowse
            • 107.161.53.91
            No context
            No context
            Process:C:\Windows\System32\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.9442687486897229
            Encrypted:false
            SSDEEP:192:CWgoCmkcAnq2Qy0FfeciIYj4v2zuiFSZ24lO82w0:DCmInq2Q5FfeciIYj5zuiFSY4lO82w0
            MD5:A704680D33C2B55469E937988833680B
            SHA1:EC08D41C16E0BA536D6F0AEAA17C5E1F02C522B0
            SHA-256:4284D4F79FF4769401CE5B08950CC959788971B7044706348EF287C77B621750
            SHA-512:6DF99488EA426A03C1A72D42386007A3CBCF61A1727A3BA83E3F3CDD74C94557D2D126A08FBB373C5AA16FCEC78189D6E54F174D383773433A7D68BFEDF62E68
            Malicious:true
            Reputation:low
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.5.5.2.8.8.1.7.2.5.9.8.3.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.5.5.2.8.8.2.2.7.2.8.6.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.3.1.2.9.a.c.0.-.c.9.d.0.-.4.e.9.2.-.9.2.9.c.-.8.8.2.b.e.2.4.a.f.c.2.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.5.4.8.4.4.e.-.3.a.4.e.-.4.f.a.b.-.a.7.b.d.-.1.d.0.a.3.4.4.8.6.0.e.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.6.P.k.1.n.T.m.c.H.N...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.a.v.D.u.m.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.0.4.-.0.0.0.1.-.0.0.1.4.-.0.e.f.0.-.3.7.4.0.7.8.0.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.8.9.d.6.e.4.a.b.5.e.c.c.d.1.6.a.2.8.7.1.6.a.6.4.f.2.6.2.0.f.2.0.0.0.0.0.9.0.4.!.0.0.0.0.a.0.6.3.b.e.1.a.8.5.b.b.a.3.f.f.c.6.5.5.5.4.d.3.b.4.c.0.a.e.1.a.4.5.6.3.8.4.5.1.!.6.P.k.1.n.T.m.c.H.N...e.
            Process:C:\Windows\System32\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Wed Sep 11 18:28:02 2024, 0x1205a4 type
            Category:dropped
            Size (bytes):135962
            Entropy (8bit):1.4462114707591813
            Encrypted:false
            SSDEEP:384:X6bFnqjJ3K3xmw7nK71U+6W+B0qdgC8Uzl:X6bFnqNK3pbhek0qdgZ8
            MD5:6574B40254ED32EC8BA3AE5970A2A304
            SHA1:26FB01C14CF4A85D0799311FB46E6E03C580E9CA
            SHA-256:6F4FC60140A346B5303D6F61510DAC3693A5D9DC4C32A12E43EACBD4DC96EBB0
            SHA-512:EDC6A90BC0E0E8BB20ADE8E08690422423F11A8BEA912AE9B3AC825EA5BA7B0A7960D7D3AD98989A2B951D2F8A09B6D552CDB9203E5408174E7D7FF446C91A36
            Malicious:false
            Reputation:low
            Preview:MDMP..a..... .......2..f........................D...............8U..........T.......8...........T............2..B.......................................................................................................eJ..............Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8790
            Entropy (8bit):3.703100657028306
            Encrypted:false
            SSDEEP:192:R6l7wVeJMXt5Vne6Y9+qPOgmf6Hc+YprM89bONcflam:R6lXJMdK6YUqPOgmf6Hc+EOGfJ
            MD5:953FA0AF94B710BCE49E142B4CBB56B3
            SHA1:2BA5E6424FEB5BD745DF3F66E4BD2E1EEEC9A1D4
            SHA-256:B278EDCF2397F116213D6557C4AC563A48B32993193B54689971AAF73F13F6E8
            SHA-512:AC4A687B2310D18E7A43ED9DFB4209A017AB49EAADF7DEB92AF87498D71A84D5FFC429CEFB1CF40BC9827FE70D68570AD8B24B909567EDEDA7BD33B7B509700D
            Malicious:false
            Reputation:low
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.0.8.<./.P.i.
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4717
            Entropy (8bit):4.463971182618637
            Encrypted:false
            SSDEEP:48:cvIwWl8zs+NJg771I9nwayWpW8VY4Ym8M4JASHFUmyq85qZg2UIaWKGd:uIjf+nI70wW7VMJAKJK2UIaWKGd
            MD5:A823F268BDEBE9D56851C635534FA045
            SHA1:E468AA61073D6597EAAB5D498F51B321FA95640E
            SHA-256:CEBE97C00228F5E98C5EE2B9997FEBE9D7CBD353939412324B4E769B8E0D7E22
            SHA-512:C2E846609E6A5BAE74079F5A496C68FBABC5BCDAFF26208324A768DBE316F3E71410F49C2ACB4E2E653AF484170F75E6097C264ACF6AEA0810F37DE766AF3BB9
            Malicious:false
            Reputation:low
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="495930" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
            Process:C:\Windows\System32\WerFault.exe
            File Type:MS Windows registry file, NT/2000 or above
            Category:dropped
            Size (bytes):1835008
            Entropy (8bit):4.46605234047467
            Encrypted:false
            SSDEEP:6144:aIXfpi67eLPU9skLmb0b4dWSPKaJG8nAgejZMMhA2gX4WABl0uNPdwBCswSbt:vXD94dWlLZMM6YFHt+t
            MD5:3B66E24B9E30B7C8CF680F88389E6C10
            SHA1:D094AED64E6F503D82C8A4C65BF60D9C0AB75CBF
            SHA-256:0975A274933F53C0CB4A330D0EB2E84ED813B25688A0E8E7679596E8E80E88FA
            SHA-512:41C7337152D7F13961F412DF1236F071AE341F3B5E2DB462AE075F7A3359BC6332A5A0206833880CB9E018FA97B567A7ED7ED62E621E045C0EC415AF8AFA1588
            Malicious:false
            Reputation:low
            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..Ux..................................................................................................................................................................................................................................................................................................................................................a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):6.9455237392770535
            TrID:
            • Win64 Executable GUI (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:6Pk1nTmcHN.exe
            File size:1'461'248 bytes
            MD5:d0d55a8f4965a4d3f661b3ea268f578b
            SHA1:a063be1a85bba3ffc65554d3b4c0ae1a45638451
            SHA256:21f77e85724543222e6cd3089fc7c741373b4b4362d25b103490c7ce84d20cda
            SHA512:3f63e14ba2b4dfee860ca307a9e5b18cc7119cda03a474f8820cdfd1ac15d003a7f3e6d95af26e08f2d367c7f9b38f64028a234fadb6b54b5c5d5582a45a3a07
            SSDEEP:24576:tCAMa2xF/U2MtmHZD+4of1c2OhTP4KOqh0lhSMXlCTgnbGJkdV4KN7zc01Octq:VMa2xFs2MgHo4of1cPhbLeKgnbGJIV4w
            TLSH:E065BE1A7BAC00F8D1BEC0B88D67591AEA72785543219BDF57E0DE161F63AE05E3E700
            File Content Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........i.;..oh..oh..oh.zli..oh.zjix.oh.zki..oh...h..oh..ki..oh..li..oh.|ji..oh..ji..oh.p.h..oh..oh..oh.zni..oh..nhX.oh..fi..oh..oi..o
            Icon Hash:cc8d0d191e1e107c
            Entrypoint:0x14005e280
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x140000000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, GUARD_CF
            Time Stamp:0x65BBAE0A [Thu Feb 1 14:43:22 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:30c7d68b242fb27be994b0b3521d918b
            Signature Valid:
            Signature Issuer:
            Signature Validation Error:
            Error Number:
            Not Before, Not After
              Subject Chain
                Version:
                Thumbprint MD5:
                Thumbprint SHA-1:
                Thumbprint SHA-256:
                Serial:
                Instruction
                dec eax
                sub esp, 28h
                call 00007F3891024528h
                dec eax
                add esp, 28h
                jmp 00007F38910085F3h
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                dec eax
                mov dword ptr [esp+10h], ebx
                dec eax
                mov dword ptr [esp+08h], ecx
                push edi
                dec eax
                sub esp, 20h
                dec eax
                mov edi, dword ptr [esp+30h]
                dec eax
                lea edx, dword ptr [0008B7E5h]
                dec eax
                mov ecx, edi
                call 00007F3891009B92h
                dec eax
                lea eax, dword ptr [0008B856h]
                dec eax
                mov dword ptr [edi], eax
                dec eax
                lea ecx, dword ptr [edi+28h]
                xor eax, eax
                dec eax
                mov dword ptr [edi+28h], eax
                dec eax
                mov dword ptr [edi+30h], eax
                call 00007F389100C531h
                dec eax
                lea ecx, dword ptr [edi+28h]
                call 00007F389100C534h
                dec eax
                mov ebx, dword ptr [esp+38h]
                dec eax
                mov eax, edi
                dec eax
                add esp, 20h
                pop edi
                ret
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                dec eax
                mov dword ptr [esp+08h], ecx
                dec eax
                sub esp, 68h
                dec eax
                mov eax, dword ptr [esp+70h]
                dec eax
                mov ecx, dword ptr [eax+38h]
                dec eax
                test ecx, ecx
                je 00007F38910087C5h
                dec eax
                mov eax, dword ptr [ecx]
                dec eax
                mov eax, dword ptr [eax+10h]
                call dword ptr [000553ACh]
                nop
                dec eax
                add esp, 68h
                ret
                call 00007F389100B526h
                nop
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                int3
                mov dword ptr [esp+10h], edx
                dec eax
                mov dword ptr [esp+00h], ecx
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x1017500xe4.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x1018340x8c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1190000x530cc.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10e0000x8538.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x1274480x2978.rsrc
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x16d0000x14c0.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0xe9dd40x8c.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0xea0000x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xd4ae00x140.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0xb30000x6c0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x1014bc0x40.rdata
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000xb145c0xb16001eaabf70aff8e3cc929bbdbf2e5aad9dFalse0.46967219432699087data6.381906257673845IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0xb30000x500280x50200ff07adedf636d6bc3ffbc263edcd3727False0.40760591361154447data5.894067518653125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x1040000x91f80x5e0091ca1c15198d6861a02e90789db46d34False0.14261968085106383DOS executable (block device driver)4.538365175655119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .pdata0x10e0000x85380x8600d733668419143445c8b94be87defbb16False0.49577308768656714data5.949404504623925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .didat0x1170000x500x200701067eceeac6e2ef2c50b8ee0c87575False0.080078125data0.68918657910872IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                _RDATA0x1180000x1f40x2000683c4b4834a30f99b0319cb260168dbFalse0.53515625data4.234704000558715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x1190000x530cc0x532004a91685c811c0b0ca3dacd69b1653b02False0.9509163533834587data7.921776188107435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x16d0000x14c00x1600fe11f6a0fd50e632ba0e66abf1859a99False0.3915127840909091data5.329570431313898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x1193280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.3108108108108108
                RT_ICON0x1194500x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.8648843930635838
                RT_ICON0x1199b80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.25806451612903225
                RT_ICON0x119ca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7454873646209387
                RT_ICON0x11a5480xb6d0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.999423076923077
                RT_ICON0x125c180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7659574468085106
                RT_ICON0x1260800x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7971311475409836
                RT_ICON0x126a080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7448405253283302
                RT_ICON0x127ab00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6373443983402489
                RT_ICON0x12a0580x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5634152102031176
                RT_GROUP_ICON0x12e2800x92dataEnglishUnited States0.6917808219178082
                RT_VERSION0x12e3140x374dataEnglishUnited States0.4592760180995475
                RT_ANICURSOR0x12e6880x3d74adata0.9980295723059566
                RT_MANIFEST0x16bdd40x2f6XML 1.0 document, ASCII text, with very long lines (719)EnglishUnited States0.5158311345646438
                DLLImport
                RPCRT4.dllNdrClientCall3, NdrServerCall2, RpcStringBindingComposeW, RpcServerUnregisterIf, RpcServerRegisterIfEx, RpcServerUseProtseqEpW, I_RpcBindingInqLocalClientPID, RpcStringFreeW, RpcBindingFromStringBindingW, NdrServerCallAll
                SHELL32.dllSHGetFolderPathW
                ntdll.dllNtSystemDebugControl, VerSetConditionMask, RtlPcToFileHeader, RtlCaptureContext, NtClose, NtOpenKey, NtQueryKey, RtlNtStatusToDosError, NtDeleteKey, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlUnwindEx, RtlUnwind
                KERNEL32.dllGetProcessHeap, HeapFree, SetLastError, GetModuleHandleExW, GetCurrentThreadId, Sleep, LocalFree, SetFilePointerEx, UnlockFileEx, LockFileEx, GetFileSizeEx, ReadFile, CompareStringW, GetCurrentThread, WriteFile, InitializeCriticalSectionEx, FlushFileBuffers, GetFileInformationByHandle, GetFullPathNameW, OutputDebugStringA, FileTimeToSystemTime, GetCurrentProcessId, TlsAlloc, TlsGetValue, TlsSetValue, FreeLibrary, GetSystemInfo, QueryPerformanceFrequency, QueryPerformanceCounter, ExpandEnvironmentStringsW, GetFileAttributesW, LoadLibraryExW, GetWindowsDirectoryW, GetSystemDirectoryW, HeapAlloc, VirtualProtect, HeapReAlloc, GlobalMemoryStatusEx, GetExitCodeThread, TlsFree, MoveFileExW, FindClose, CreateDirectoryW, FindFirstFileExW, FindNextFileW, QueryDosDeviceW, GetEnvironmentVariableW, ReleaseSRWLockExclusive, SetFileInformationByHandle, GetDiskFreeSpaceExW, K32GetMappedFileNameW, FindFirstVolumeW, FindNextVolumeW, GetVolumePathNamesForVolumeNameW, FindVolumeClose, VirtualQuery, GetSystemTimes, GetTickCount64, RaiseException, SleepConditionVariableSRW, GetCommandLineA, GetStdHandle, FreeLibraryAndExitThread, ExitThread, CreateThread, InitializeCriticalSectionAndSpinCount, InterlockedPushEntrySList, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetModuleFileNameW, SetConsoleCtrlHandler, SetDllDirectoryW, WaitForSingleObject, GetProcessId, GetNamedPipeServerProcessId, GetFileTime, MultiByteToWideChar, ContinueDebugEvent, DebugActiveProcessStop, GetFileAttributesExW, GetSystemTimeAsFileTime, ReadProcessMemory, OpenThread, DebugBreakProcess, SetEvent, WaitForDebugEvent, DebugSetProcessKillOnExit, DebugActiveProcess, WideCharToMultiByte, VirtualQueryEx, GetThreadContext, K32GetProcessImageFileNameW, K32GetModuleBaseNameW, K32EnumProcessModules, WaitForMultipleObjects, CreateEventW, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, DeleteFileW, VerifyVersionInfoW, K32GetPerformanceInfo, DeviceIoControl, CreateFileW, GetLastError, CloseHandle, OpenProcess, GetProcAddress, GetModuleHandleW, GetCurrentProcess, TerminateProcess, GetCommandLineW, ExitProcess, GetFileType, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetConsoleOutputCP, GetConsoleMode, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, HeapSize, WriteConsoleW, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, GetLocaleInfoEx, LCMapStringEx, EncodePointer, DecodePointer, WakeAllConditionVariable, WakeConditionVariable, GetCPInfo, LoadLibraryExA, GetStringTypeW, WaitForSingleObjectEx, FormatMessageA
                USER32.dllRegisterClassExW, GetClassInfoExW
                ADVAPI32.dllCryptReleaseContext, CryptGenRandom, CryptAcquireContextW, RegDeleteTreeW, RegQueryInfoKeyW, RegDeleteValueW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, RegOpenKeyExW, StartServiceW, QueryServiceStatus, RevertToSelf, ImpersonateSelf, OpenThreadToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, CloseServiceHandle, ControlService, ChangeServiceConfigW, CreateServiceW, DeleteService, OpenServiceW, OpenSCManagerW, StartServiceCtrlDispatcherW, ChangeServiceConfig2W, QueryServiceConfig2W, RegisterServiceCtrlHandlerExW, SetServiceStatus, SetThreadToken
                NameOrdinalAddress
                asw_process_storage_allocate_connector10x14005cbe0
                asw_process_storage_deallocate_connector20x14005cc10
                on_avast_dll_unload30x140056660
                onexit_register_connector_avast_240x14005c9e0
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Sep 11, 2024 20:27:30.357014894 CEST49730443192.168.2.462.192.173.45
                Sep 11, 2024 20:27:30.357105017 CEST4434973062.192.173.45192.168.2.4
                Sep 11, 2024 20:27:30.357225895 CEST49730443192.168.2.462.192.173.45
                Sep 11, 2024 20:27:30.365940094 CEST49730443192.168.2.462.192.173.45
                Sep 11, 2024 20:27:30.365974903 CEST4434973062.192.173.45192.168.2.4
                Sep 11, 2024 20:28:02.483127117 CEST49730443192.168.2.462.192.173.45
                TimestampSource PortDest PortSource IPDest IP
                Sep 11, 2024 20:27:30.177025080 CEST5467553192.168.2.41.1.1.1
                Sep 11, 2024 20:27:30.351072073 CEST53546751.1.1.1192.168.2.4
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Sep 11, 2024 20:27:30.177025080 CEST192.168.2.41.1.1.10x9bbbStandard query (0)weblineinfo.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Sep 11, 2024 20:27:30.351072073 CEST1.1.1.1192.168.2.40x9bbbNo error (0)weblineinfo.com62.192.173.45A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:14:27:25
                Start date:11/09/2024
                Path:C:\Users\user\Desktop\6Pk1nTmcHN.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\6Pk1nTmcHN.exe"
                Imagebase:0x140000000
                File size:1'461'248 bytes
                MD5 hash:D0D55A8F4965A4D3F661B3EA268F578B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:6
                Start time:14:28:01
                Start date:11/09/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 2308 -s 1292
                Imagebase:0x7ff7f81a0000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:2.1%
                  Dynamic/Decrypted Code Coverage:99.2%
                  Signature Coverage:29.9%
                  Total number of Nodes:923
                  Total number of Limit Nodes:36
                  execution_graph 51437 2307830 51438 2307885 51437->51438 51439 230788a InternetOpenW 51437->51439 51438->51439 51440 2307898 InternetConnectW 51439->51440 51456 2307aed 51439->51456 51441 23078dd HttpOpenRequestW 51440->51441 51440->51456 51445 2307931 51441->51445 51441->51456 51442 2307b0e InternetCloseHandle 51444 2307b17 51442->51444 51443 2307b60 51444->51443 51446 2307b56 51444->51446 51448 2307b8c 51444->51448 51447 23079cb HttpSendRequestA 51445->51447 51445->51456 51446->51443 51449 232b4e0 RtlFreeHeap 51446->51449 51450 23079e4 51447->51450 51447->51456 51462 230a050 RtlFreeHeap 51448->51462 51449->51443 51457 2307a24 51450->51457 51458 232b4e0 51450->51458 51452 2307ba4 51454 232b4e0 RtlFreeHeap 51452->51454 51454->51443 51455 232b4e0 RtlFreeHeap 51455->51456 51456->51442 51456->51444 51457->51455 51459 232b523 51458->51459 51460 232b4f0 51458->51460 51459->51457 51460->51459 51461 232b511 RtlFreeHeap 51460->51461 51461->51459 51462->51452 51463 23071b0 51464 23071c6 51463->51464 51471 2302950 51464->51471 51467 23071f5 51488 2334360 51467->51488 51470 230732d 51496 23116a0 51471->51496 51473 2302959 51668 23101a0 51473->51668 51475 2302963 51476 2310f99 51475->51476 51872 230cce0 51475->51872 51476->51467 51479 230cce0 LdrGetProcedureAddress 51480 2310f13 51479->51480 51481 230cce0 LdrGetProcedureAddress 51480->51481 51482 2310f3c 51481->51482 51483 230cce0 LdrGetProcedureAddress 51482->51483 51484 2310f5b 51483->51484 51485 230cce0 LdrGetProcedureAddress 51484->51485 51486 2310f7a 51485->51486 51487 230cce0 LdrGetProcedureAddress 51486->51487 51487->51476 51490 23343bd 51488->51490 51489 230730e 51492 2334ff0 51489->51492 51490->51489 51491 233444e NtCreateThreadEx 51490->51491 51491->51489 51494 2335011 51492->51494 51493 233506c 51493->51470 51494->51493 51495 233506a NtQueueApcThread 51494->51495 51495->51493 51497 23116a9 51496->51497 51498 23121e1 51497->51498 51499 230cce0 LdrGetProcedureAddress 51497->51499 51498->51473 51500 23116c8 51499->51500 51501 230cce0 LdrGetProcedureAddress 51500->51501 51502 23116e0 51501->51502 51503 230cce0 LdrGetProcedureAddress 51502->51503 51504 23116f8 51503->51504 51505 230cce0 LdrGetProcedureAddress 51504->51505 51506 2311710 51505->51506 51507 230cce0 LdrGetProcedureAddress 51506->51507 51508 2311728 51507->51508 51509 230cce0 LdrGetProcedureAddress 51508->51509 51510 2311740 51509->51510 51511 230cce0 LdrGetProcedureAddress 51510->51511 51512 2311758 51511->51512 51513 230cce0 LdrGetProcedureAddress 51512->51513 51514 2311770 51513->51514 51515 230cce0 LdrGetProcedureAddress 51514->51515 51516 2311788 51515->51516 51517 230cce0 LdrGetProcedureAddress 51516->51517 51518 23117a0 51517->51518 51519 230cce0 LdrGetProcedureAddress 51518->51519 51520 23117b8 51519->51520 51521 230cce0 LdrGetProcedureAddress 51520->51521 51522 23117d0 51521->51522 51523 230cce0 LdrGetProcedureAddress 51522->51523 51524 23117e8 51523->51524 51525 230cce0 LdrGetProcedureAddress 51524->51525 51526 2311800 51525->51526 51527 230cce0 LdrGetProcedureAddress 51526->51527 51528 2311818 51527->51528 51529 230cce0 LdrGetProcedureAddress 51528->51529 51530 2311830 51529->51530 51531 230cce0 LdrGetProcedureAddress 51530->51531 51532 2311848 51531->51532 51533 230cce0 LdrGetProcedureAddress 51532->51533 51534 2311860 51533->51534 51535 230cce0 LdrGetProcedureAddress 51534->51535 51536 2311878 51535->51536 51537 230cce0 LdrGetProcedureAddress 51536->51537 51538 2311890 51537->51538 51539 230cce0 LdrGetProcedureAddress 51538->51539 51540 23118a8 51539->51540 51541 230cce0 LdrGetProcedureAddress 51540->51541 51542 23118c0 51541->51542 51543 230cce0 LdrGetProcedureAddress 51542->51543 51544 23118d8 51543->51544 51545 230cce0 LdrGetProcedureAddress 51544->51545 51546 23118f0 51545->51546 51547 230cce0 LdrGetProcedureAddress 51546->51547 51548 2311908 51547->51548 51549 230cce0 LdrGetProcedureAddress 51548->51549 51550 2311920 51549->51550 51551 230cce0 LdrGetProcedureAddress 51550->51551 51552 2311938 51551->51552 51553 230cce0 LdrGetProcedureAddress 51552->51553 51554 2311950 51553->51554 51555 230cce0 LdrGetProcedureAddress 51554->51555 51556 2311968 51555->51556 51557 230cce0 LdrGetProcedureAddress 51556->51557 51558 2311980 51557->51558 51559 230cce0 LdrGetProcedureAddress 51558->51559 51560 2311998 51559->51560 51561 230cce0 LdrGetProcedureAddress 51560->51561 51562 23119b0 51561->51562 51563 230cce0 LdrGetProcedureAddress 51562->51563 51564 23119c8 51563->51564 51565 230cce0 LdrGetProcedureAddress 51564->51565 51566 23119e0 51565->51566 51567 230cce0 LdrGetProcedureAddress 51566->51567 51568 23119f8 51567->51568 51569 230cce0 LdrGetProcedureAddress 51568->51569 51570 2311a10 51569->51570 51571 230cce0 LdrGetProcedureAddress 51570->51571 51572 2311a28 51571->51572 51573 230cce0 LdrGetProcedureAddress 51572->51573 51574 2311a40 51573->51574 51575 230cce0 LdrGetProcedureAddress 51574->51575 51576 2311a58 51575->51576 51577 230cce0 LdrGetProcedureAddress 51576->51577 51578 2311a70 51577->51578 51579 230cce0 LdrGetProcedureAddress 51578->51579 51580 2311a88 51579->51580 51581 230cce0 LdrGetProcedureAddress 51580->51581 51582 2311aa0 51581->51582 51583 230cce0 LdrGetProcedureAddress 51582->51583 51584 2311ab8 51583->51584 51585 230cce0 LdrGetProcedureAddress 51584->51585 51586 2311ad0 51585->51586 51587 230cce0 LdrGetProcedureAddress 51586->51587 51588 2311ae8 51587->51588 51589 230cce0 LdrGetProcedureAddress 51588->51589 51590 2311b00 51589->51590 51591 230cce0 LdrGetProcedureAddress 51590->51591 51592 2311b18 51591->51592 51593 230cce0 LdrGetProcedureAddress 51592->51593 51594 2311b30 51593->51594 51595 230cce0 LdrGetProcedureAddress 51594->51595 51596 2311b48 51595->51596 51597 230cce0 LdrGetProcedureAddress 51596->51597 51598 2311b60 51597->51598 51599 230cce0 LdrGetProcedureAddress 51598->51599 51600 2311b78 51599->51600 51601 230cce0 LdrGetProcedureAddress 51600->51601 51602 2311b90 51601->51602 51603 230cce0 LdrGetProcedureAddress 51602->51603 51604 2311bc1 51603->51604 51605 230cce0 LdrGetProcedureAddress 51604->51605 51606 2311bf2 51605->51606 51607 230cce0 LdrGetProcedureAddress 51606->51607 51608 2311c23 51607->51608 51609 230cce0 LdrGetProcedureAddress 51608->51609 51610 2311c54 51609->51610 51611 230cce0 LdrGetProcedureAddress 51610->51611 51612 2311c85 51611->51612 51613 230cce0 LdrGetProcedureAddress 51612->51613 51614 2311cb6 51613->51614 51615 230cce0 LdrGetProcedureAddress 51614->51615 51616 2311ce7 51615->51616 51617 230cce0 LdrGetProcedureAddress 51616->51617 51618 2311d18 51617->51618 51619 230cce0 LdrGetProcedureAddress 51618->51619 51620 2311d49 51619->51620 51621 230cce0 LdrGetProcedureAddress 51620->51621 51622 2311d7a 51621->51622 51623 230cce0 LdrGetProcedureAddress 51622->51623 51624 2311dab 51623->51624 51625 230cce0 LdrGetProcedureAddress 51624->51625 51626 2311ddc 51625->51626 51627 230cce0 LdrGetProcedureAddress 51626->51627 51628 2311e0d 51627->51628 51629 230cce0 LdrGetProcedureAddress 51628->51629 51630 2311e3e 51629->51630 51631 230cce0 LdrGetProcedureAddress 51630->51631 51632 2311e6f 51631->51632 51633 230cce0 LdrGetProcedureAddress 51632->51633 51634 2311ea0 51633->51634 51635 230cce0 LdrGetProcedureAddress 51634->51635 51636 2311ed1 51635->51636 51637 230cce0 LdrGetProcedureAddress 51636->51637 51638 2311f02 51637->51638 51639 230cce0 LdrGetProcedureAddress 51638->51639 51640 2311f33 51639->51640 51641 230cce0 LdrGetProcedureAddress 51640->51641 51642 2311f64 51641->51642 51643 230cce0 LdrGetProcedureAddress 51642->51643 51644 2311f95 51643->51644 51645 230cce0 LdrGetProcedureAddress 51644->51645 51646 2311fc6 51645->51646 51647 230cce0 LdrGetProcedureAddress 51646->51647 51648 2311ff7 51647->51648 51649 230cce0 LdrGetProcedureAddress 51648->51649 51650 2312028 51649->51650 51651 230cce0 LdrGetProcedureAddress 51650->51651 51652 2312059 51651->51652 51653 230cce0 LdrGetProcedureAddress 51652->51653 51654 231208a 51653->51654 51655 230cce0 LdrGetProcedureAddress 51654->51655 51656 23120bb 51655->51656 51657 230cce0 LdrGetProcedureAddress 51656->51657 51658 23120ec 51657->51658 51659 230cce0 LdrGetProcedureAddress 51658->51659 51660 231211d 51659->51660 51661 230cce0 LdrGetProcedureAddress 51660->51661 51662 231214e 51661->51662 51663 230cce0 LdrGetProcedureAddress 51662->51663 51664 231217f 51663->51664 51665 230cce0 LdrGetProcedureAddress 51664->51665 51666 23121b0 51665->51666 51667 230cce0 LdrGetProcedureAddress 51666->51667 51667->51498 51669 23101ce 51668->51669 51670 230cce0 LdrGetProcedureAddress 51669->51670 51871 2310e4a 51669->51871 51671 2310228 51670->51671 51672 230cce0 LdrGetProcedureAddress 51671->51672 51673 2310243 51672->51673 51674 230cce0 LdrGetProcedureAddress 51673->51674 51675 231026c 51674->51675 51676 230cce0 LdrGetProcedureAddress 51675->51676 51677 231028b 51676->51677 51678 230cce0 LdrGetProcedureAddress 51677->51678 51679 23102aa 51678->51679 51680 230cce0 LdrGetProcedureAddress 51679->51680 51681 23102c9 51680->51681 51682 230cce0 LdrGetProcedureAddress 51681->51682 51683 23102e8 51682->51683 51684 230cce0 LdrGetProcedureAddress 51683->51684 51685 2310307 51684->51685 51686 230cce0 LdrGetProcedureAddress 51685->51686 51687 2310326 51686->51687 51688 230cce0 LdrGetProcedureAddress 51687->51688 51689 2310345 51688->51689 51690 230cce0 LdrGetProcedureAddress 51689->51690 51691 2310364 51690->51691 51692 230cce0 LdrGetProcedureAddress 51691->51692 51693 2310383 51692->51693 51694 230cce0 LdrGetProcedureAddress 51693->51694 51695 23103a2 51694->51695 51696 230cce0 LdrGetProcedureAddress 51695->51696 51697 23103c1 51696->51697 51698 230cce0 LdrGetProcedureAddress 51697->51698 51699 23103e0 51698->51699 51700 230cce0 LdrGetProcedureAddress 51699->51700 51701 23103ff 51700->51701 51702 230cce0 LdrGetProcedureAddress 51701->51702 51703 231041e 51702->51703 51704 230cce0 LdrGetProcedureAddress 51703->51704 51705 231043d 51704->51705 51706 230cce0 LdrGetProcedureAddress 51705->51706 51707 231045c 51706->51707 51708 230cce0 LdrGetProcedureAddress 51707->51708 51709 231047b 51708->51709 51710 230cce0 LdrGetProcedureAddress 51709->51710 51711 231049a 51710->51711 51712 230cce0 LdrGetProcedureAddress 51711->51712 51713 23104b9 51712->51713 51714 230cce0 LdrGetProcedureAddress 51713->51714 51715 23104d8 51714->51715 51716 230cce0 LdrGetProcedureAddress 51715->51716 51717 23104f7 51716->51717 51718 230cce0 LdrGetProcedureAddress 51717->51718 51719 2310516 51718->51719 51720 230cce0 LdrGetProcedureAddress 51719->51720 51721 2310535 51720->51721 51722 230cce0 LdrGetProcedureAddress 51721->51722 51723 2310554 51722->51723 51724 230cce0 LdrGetProcedureAddress 51723->51724 51725 2310573 51724->51725 51726 230cce0 LdrGetProcedureAddress 51725->51726 51727 2310592 51726->51727 51728 230cce0 LdrGetProcedureAddress 51727->51728 51729 23105b1 51728->51729 51730 230cce0 LdrGetProcedureAddress 51729->51730 51731 23105d0 51730->51731 51732 230cce0 LdrGetProcedureAddress 51731->51732 51733 23105ef 51732->51733 51734 230cce0 LdrGetProcedureAddress 51733->51734 51735 231060e 51734->51735 51736 230cce0 LdrGetProcedureAddress 51735->51736 51737 231062d 51736->51737 51738 230cce0 LdrGetProcedureAddress 51737->51738 51739 231064c 51738->51739 51740 230cce0 LdrGetProcedureAddress 51739->51740 51741 231066b 51740->51741 51742 230cce0 LdrGetProcedureAddress 51741->51742 51743 231068a 51742->51743 51744 230cce0 LdrGetProcedureAddress 51743->51744 51745 23106a9 51744->51745 51746 230cce0 LdrGetProcedureAddress 51745->51746 51747 23106c8 51746->51747 51748 230cce0 LdrGetProcedureAddress 51747->51748 51749 23106e7 51748->51749 51750 230cce0 LdrGetProcedureAddress 51749->51750 51751 2310706 51750->51751 51752 230cce0 LdrGetProcedureAddress 51751->51752 51753 2310725 51752->51753 51754 230cce0 LdrGetProcedureAddress 51753->51754 51755 2310744 51754->51755 51756 230cce0 LdrGetProcedureAddress 51755->51756 51757 2310763 51756->51757 51758 230cce0 LdrGetProcedureAddress 51757->51758 51759 2310782 51758->51759 51760 230cce0 LdrGetProcedureAddress 51759->51760 51761 23107a1 51760->51761 51762 230cce0 LdrGetProcedureAddress 51761->51762 51763 23107c0 51762->51763 51764 230cce0 LdrGetProcedureAddress 51763->51764 51765 23107df 51764->51765 51766 230cce0 LdrGetProcedureAddress 51765->51766 51767 23107fe 51766->51767 51768 230cce0 LdrGetProcedureAddress 51767->51768 51769 231081d 51768->51769 51770 230cce0 LdrGetProcedureAddress 51769->51770 51771 231083c 51770->51771 51772 230cce0 LdrGetProcedureAddress 51771->51772 51773 231085b 51772->51773 51774 230cce0 LdrGetProcedureAddress 51773->51774 51775 231087a 51774->51775 51776 230cce0 LdrGetProcedureAddress 51775->51776 51777 2310899 51776->51777 51778 230cce0 LdrGetProcedureAddress 51777->51778 51779 23108b8 51778->51779 51780 230cce0 LdrGetProcedureAddress 51779->51780 51781 23108d7 51780->51781 51782 230cce0 LdrGetProcedureAddress 51781->51782 51783 23108f6 51782->51783 51784 230cce0 LdrGetProcedureAddress 51783->51784 51785 2310915 51784->51785 51786 230cce0 LdrGetProcedureAddress 51785->51786 51787 2310934 51786->51787 51788 230cce0 LdrGetProcedureAddress 51787->51788 51789 2310953 51788->51789 51790 230cce0 LdrGetProcedureAddress 51789->51790 51791 2310972 51790->51791 51792 230cce0 LdrGetProcedureAddress 51791->51792 51793 2310991 51792->51793 51794 230cce0 LdrGetProcedureAddress 51793->51794 51795 23109b0 51794->51795 51796 230cce0 LdrGetProcedureAddress 51795->51796 51797 23109cf 51796->51797 51798 230cce0 LdrGetProcedureAddress 51797->51798 51799 23109ee 51798->51799 51800 230cce0 LdrGetProcedureAddress 51799->51800 51801 2310a0d 51800->51801 51802 230cce0 LdrGetProcedureAddress 51801->51802 51803 2310a2c 51802->51803 51804 230cce0 LdrGetProcedureAddress 51803->51804 51805 2310a4b 51804->51805 51806 230cce0 LdrGetProcedureAddress 51805->51806 51807 2310a6a 51806->51807 51808 230cce0 LdrGetProcedureAddress 51807->51808 51809 2310a89 51808->51809 51810 230cce0 LdrGetProcedureAddress 51809->51810 51811 2310aa8 51810->51811 51812 230cce0 LdrGetProcedureAddress 51811->51812 51813 2310ac7 51812->51813 51814 230cce0 LdrGetProcedureAddress 51813->51814 51815 2310ae6 51814->51815 51816 230cce0 LdrGetProcedureAddress 51815->51816 51817 2310b05 51816->51817 51818 230cce0 LdrGetProcedureAddress 51817->51818 51819 2310b24 51818->51819 51820 230cce0 LdrGetProcedureAddress 51819->51820 51821 2310b43 51820->51821 51822 230cce0 LdrGetProcedureAddress 51821->51822 51823 2310b62 51822->51823 51824 230cce0 LdrGetProcedureAddress 51823->51824 51825 2310b81 51824->51825 51826 230cce0 LdrGetProcedureAddress 51825->51826 51827 2310ba0 51826->51827 51828 230cce0 LdrGetProcedureAddress 51827->51828 51829 2310bbf 51828->51829 51830 230cce0 LdrGetProcedureAddress 51829->51830 51831 2310bde 51830->51831 51832 230cce0 LdrGetProcedureAddress 51831->51832 51833 2310bfd 51832->51833 51834 230cce0 LdrGetProcedureAddress 51833->51834 51835 2310c1c 51834->51835 51836 230cce0 LdrGetProcedureAddress 51835->51836 51837 2310c3b 51836->51837 51838 230cce0 LdrGetProcedureAddress 51837->51838 51839 2310c5a 51838->51839 51840 230cce0 LdrGetProcedureAddress 51839->51840 51841 2310c79 51840->51841 51842 230cce0 LdrGetProcedureAddress 51841->51842 51843 2310c98 51842->51843 51844 230cce0 LdrGetProcedureAddress 51843->51844 51845 2310cb7 51844->51845 51846 230cce0 LdrGetProcedureAddress 51845->51846 51847 2310cd6 51846->51847 51848 230cce0 LdrGetProcedureAddress 51847->51848 51849 2310cf5 51848->51849 51850 230cce0 LdrGetProcedureAddress 51849->51850 51851 2310d14 51850->51851 51852 230cce0 LdrGetProcedureAddress 51851->51852 51853 2310d33 51852->51853 51854 230cce0 LdrGetProcedureAddress 51853->51854 51855 2310d52 51854->51855 51856 230cce0 LdrGetProcedureAddress 51855->51856 51857 2310d71 51856->51857 51858 230cce0 LdrGetProcedureAddress 51857->51858 51859 2310d90 51858->51859 51860 230cce0 LdrGetProcedureAddress 51859->51860 51861 2310daf 51860->51861 51862 230cce0 LdrGetProcedureAddress 51861->51862 51863 2310dce 51862->51863 51864 230cce0 LdrGetProcedureAddress 51863->51864 51865 2310ded 51864->51865 51866 230cce0 LdrGetProcedureAddress 51865->51866 51867 2310e0c 51866->51867 51868 230cce0 LdrGetProcedureAddress 51867->51868 51869 2310e2b 51868->51869 51870 230cce0 LdrGetProcedureAddress 51869->51870 51870->51871 51871->51475 51874 230cd1b 51872->51874 51873 230cdbf 51873->51479 51874->51873 51875 230cd9b LdrGetProcedureAddress 51874->51875 51875->51873 51876 2307bf0 51877 2307c06 51876->51877 51893 2302930 51877->51893 51879 2307c24 52032 2308ed0 51879->52032 51881 2307d64 52065 2307f70 51881->52065 51883 2307d8c 52206 2324d00 GetUserNameW GetComputerNameExW 51883->52206 51885 2307f54 51886 2307da4 51886->51885 52238 2334740 51886->52238 51890 2318c60 CreateFiber 51891 2307e3b 51890->51891 51891->51885 51891->51890 51892 2314700 RtlFreeHeap 51891->51892 52242 2313d90 7 API calls 51891->52242 52243 2308bc0 9 API calls 51891->52243 51892->51891 52244 230ffe0 51893->52244 51899 230f5f5 51899->51879 51900 2302943 51900->51899 51901 230cce0 LdrGetProcedureAddress 51900->51901 51902 230ee10 51901->51902 51903 230cce0 LdrGetProcedureAddress 51902->51903 51904 230ee2b 51903->51904 51905 230cce0 LdrGetProcedureAddress 51904->51905 51906 230ee54 51905->51906 51907 230cce0 LdrGetProcedureAddress 51906->51907 51908 230ee73 51907->51908 51909 230cce0 LdrGetProcedureAddress 51908->51909 51910 230ee92 51909->51910 51911 230cce0 LdrGetProcedureAddress 51910->51911 51912 230eeb1 51911->51912 51913 230cce0 LdrGetProcedureAddress 51912->51913 51914 230eed0 51913->51914 51915 230cce0 LdrGetProcedureAddress 51914->51915 51916 230eeef 51915->51916 51917 230cce0 LdrGetProcedureAddress 51916->51917 51918 230ef0e 51917->51918 51919 230cce0 LdrGetProcedureAddress 51918->51919 51920 230ef2d 51919->51920 51921 230cce0 LdrGetProcedureAddress 51920->51921 51922 230ef4c 51921->51922 51923 230cce0 LdrGetProcedureAddress 51922->51923 51924 230ef6b 51923->51924 51925 230cce0 LdrGetProcedureAddress 51924->51925 51926 230ef8a 51925->51926 51927 230cce0 LdrGetProcedureAddress 51926->51927 51928 230efa9 51927->51928 51929 230cce0 LdrGetProcedureAddress 51928->51929 51930 230efc8 51929->51930 51931 230cce0 LdrGetProcedureAddress 51930->51931 51932 230efe7 51931->51932 51933 230cce0 LdrGetProcedureAddress 51932->51933 51934 230f006 51933->51934 51935 230cce0 LdrGetProcedureAddress 51934->51935 51936 230f025 51935->51936 51937 230cce0 LdrGetProcedureAddress 51936->51937 51938 230f044 51937->51938 51939 230cce0 LdrGetProcedureAddress 51938->51939 51940 230f063 51939->51940 51941 230cce0 LdrGetProcedureAddress 51940->51941 51942 230f082 51941->51942 51943 230cce0 LdrGetProcedureAddress 51942->51943 51944 230f0a1 51943->51944 51945 230cce0 LdrGetProcedureAddress 51944->51945 51946 230f0c0 51945->51946 51947 230cce0 LdrGetProcedureAddress 51946->51947 51948 230f0df 51947->51948 51949 230cce0 LdrGetProcedureAddress 51948->51949 51950 230f0fe 51949->51950 51951 230cce0 LdrGetProcedureAddress 51950->51951 51952 230f11d 51951->51952 51953 230cce0 LdrGetProcedureAddress 51952->51953 51954 230f13c 51953->51954 51955 230cce0 LdrGetProcedureAddress 51954->51955 51956 230f15b 51955->51956 51957 230cce0 LdrGetProcedureAddress 51956->51957 51958 230f17a 51957->51958 51959 230cce0 LdrGetProcedureAddress 51958->51959 51960 230f199 51959->51960 51961 230cce0 LdrGetProcedureAddress 51960->51961 51962 230f1b8 51961->51962 51963 230cce0 LdrGetProcedureAddress 51962->51963 51964 230f1d7 51963->51964 51965 230cce0 LdrGetProcedureAddress 51964->51965 51966 230f1f6 51965->51966 51967 230cce0 LdrGetProcedureAddress 51966->51967 51968 230f215 51967->51968 51969 230cce0 LdrGetProcedureAddress 51968->51969 51970 230f234 51969->51970 51971 230cce0 LdrGetProcedureAddress 51970->51971 51972 230f253 51971->51972 51973 230cce0 LdrGetProcedureAddress 51972->51973 51974 230f272 51973->51974 51975 230cce0 LdrGetProcedureAddress 51974->51975 51976 230f291 51975->51976 51977 230cce0 LdrGetProcedureAddress 51976->51977 51978 230f2b0 51977->51978 51979 230cce0 LdrGetProcedureAddress 51978->51979 51980 230f2cf 51979->51980 51981 230cce0 LdrGetProcedureAddress 51980->51981 51982 230f2ee 51981->51982 51983 230cce0 LdrGetProcedureAddress 51982->51983 51984 230f30d 51983->51984 51985 230cce0 LdrGetProcedureAddress 51984->51985 51986 230f32c 51985->51986 51987 230cce0 LdrGetProcedureAddress 51986->51987 51988 230f34b 51987->51988 51989 230cce0 LdrGetProcedureAddress 51988->51989 51990 230f36a 51989->51990 51991 230cce0 LdrGetProcedureAddress 51990->51991 51992 230f389 51991->51992 51993 230cce0 LdrGetProcedureAddress 51992->51993 51994 230f3a8 51993->51994 51995 230cce0 LdrGetProcedureAddress 51994->51995 51996 230f3c7 51995->51996 51997 230cce0 LdrGetProcedureAddress 51996->51997 51998 230f3e6 51997->51998 51999 230cce0 LdrGetProcedureAddress 51998->51999 52000 230f405 51999->52000 52001 230cce0 LdrGetProcedureAddress 52000->52001 52002 230f424 52001->52002 52003 230cce0 LdrGetProcedureAddress 52002->52003 52004 230f443 52003->52004 52005 230cce0 LdrGetProcedureAddress 52004->52005 52006 230f462 52005->52006 52007 230cce0 LdrGetProcedureAddress 52006->52007 52008 230f481 52007->52008 52009 230cce0 LdrGetProcedureAddress 52008->52009 52010 230f4a0 52009->52010 52011 230cce0 LdrGetProcedureAddress 52010->52011 52012 230f4bf 52011->52012 52013 230cce0 LdrGetProcedureAddress 52012->52013 52014 230f4de 52013->52014 52015 230cce0 LdrGetProcedureAddress 52014->52015 52016 230f4fd 52015->52016 52017 230cce0 LdrGetProcedureAddress 52016->52017 52018 230f51c 52017->52018 52019 230cce0 LdrGetProcedureAddress 52018->52019 52020 230f53b 52019->52020 52021 230cce0 LdrGetProcedureAddress 52020->52021 52022 230f55a 52021->52022 52023 230cce0 LdrGetProcedureAddress 52022->52023 52024 230f579 52023->52024 52025 230cce0 LdrGetProcedureAddress 52024->52025 52026 230f598 52025->52026 52027 230cce0 LdrGetProcedureAddress 52026->52027 52028 230f5b7 52027->52028 52029 230cce0 LdrGetProcedureAddress 52028->52029 52030 230f5d6 52029->52030 52031 230cce0 LdrGetProcedureAddress 52030->52031 52031->51899 52316 2324ce0 52032->52316 52037 2333de0 RtlFreeHeap 52038 23090af 52037->52038 52039 2333de0 RtlFreeHeap 52038->52039 52040 2309110 52039->52040 52041 2333de0 RtlFreeHeap 52040->52041 52042 230916c 52041->52042 52043 2333de0 RtlFreeHeap 52042->52043 52044 23091a1 52043->52044 52045 2333de0 RtlFreeHeap 52044->52045 52046 23091f1 52045->52046 52047 2333de0 RtlFreeHeap 52046->52047 52048 2309222 52047->52048 52049 2333de0 RtlFreeHeap 52048->52049 52050 230925a 52049->52050 52051 2333de0 RtlFreeHeap 52050->52051 52052 23092af 52051->52052 52053 2333de0 RtlFreeHeap 52052->52053 52054 23092f1 52053->52054 52055 2333de0 RtlFreeHeap 52054->52055 52056 2309333 52055->52056 52057 2333de0 RtlFreeHeap 52056->52057 52058 2309347 52057->52058 52059 2333de0 RtlFreeHeap 52058->52059 52060 2309362 52059->52060 52061 2333de0 RtlFreeHeap 52060->52061 52062 230938e 52061->52062 52063 2333de0 RtlFreeHeap 52062->52063 52064 23093c1 52063->52064 52064->51881 52066 2307fb8 52065->52066 52067 2307f99 52065->52067 52069 2307fda 52066->52069 52070 2333de0 RtlFreeHeap 52066->52070 52068 2333de0 RtlFreeHeap 52067->52068 52068->52066 52322 2325560 52069->52322 52070->52069 52073 2325560 RtlFreeHeap 52078 2308066 52073->52078 52075 230802a 52075->52073 52076 2308088 52077 2325560 RtlFreeHeap 52076->52077 52082 230809c 52077->52082 52078->52076 52079 232b4e0 RtlFreeHeap 52078->52079 52079->52076 52080 23080be 52081 2325560 RtlFreeHeap 52080->52081 52086 23080d2 52081->52086 52082->52080 52084 232b4e0 RtlFreeHeap 52082->52084 52083 23080f4 52085 2325560 RtlFreeHeap 52083->52085 52084->52080 52090 2308108 52085->52090 52086->52083 52087 232b4e0 RtlFreeHeap 52086->52087 52087->52083 52088 230812a 52089 2325560 RtlFreeHeap 52088->52089 52094 230813e 52089->52094 52090->52088 52092 232b4e0 RtlFreeHeap 52090->52092 52091 2308160 52093 2325560 RtlFreeHeap 52091->52093 52092->52088 52098 2308174 52093->52098 52094->52091 52095 232b4e0 RtlFreeHeap 52094->52095 52095->52091 52096 2308197 52097 2325560 RtlFreeHeap 52096->52097 52102 23081ab 52097->52102 52098->52096 52099 232b4e0 RtlFreeHeap 52098->52099 52099->52096 52100 23081d4 52101 2325560 RtlFreeHeap 52100->52101 52103 23081e8 52101->52103 52102->52100 52104 232b4e0 RtlFreeHeap 52102->52104 52105 230823d 52103->52105 52327 231be20 RtlFreeHeap 52103->52327 52104->52100 52107 2325560 RtlFreeHeap 52105->52107 52128 2308251 52107->52128 52108 2308214 52112 232b4e0 RtlFreeHeap 52108->52112 52109 230838a 52110 2325560 RtlFreeHeap 52109->52110 52111 230839e 52110->52111 52113 2325560 RtlFreeHeap 52111->52113 52114 2308235 52112->52114 52118 23083ba 52113->52118 52115 232b4e0 RtlFreeHeap 52114->52115 52115->52105 52116 2308430 52117 2325560 RtlFreeHeap 52116->52117 52119 2308444 52117->52119 52118->52116 52133 232b4e0 RtlFreeHeap 52118->52133 52194 2308b86 52118->52194 52120 230846d 52119->52120 52330 231be20 RtlFreeHeap 52119->52330 52127 2325560 RtlFreeHeap 52120->52127 52121 230835d 52125 232b4e0 RtlFreeHeap 52121->52125 52122 2308322 52122->52121 52329 230a050 RtlFreeHeap 52122->52329 52129 230837d 52125->52129 52126 2308460 52130 232b4e0 RtlFreeHeap 52126->52130 52132 230848e 52127->52132 52128->52109 52128->52122 52328 230a050 RtlFreeHeap 52128->52328 52134 232b4e0 RtlFreeHeap 52129->52134 52130->52120 52135 23084b7 52132->52135 52331 231be20 RtlFreeHeap 52132->52331 52136 2308423 52133->52136 52134->52109 52139 2325560 RtlFreeHeap 52135->52139 52137 232b4e0 RtlFreeHeap 52136->52137 52137->52116 52142 23084d8 52139->52142 52140 23084aa 52141 232b4e0 RtlFreeHeap 52140->52141 52141->52135 52143 2308501 52142->52143 52332 231be20 RtlFreeHeap 52142->52332 52146 2325560 RtlFreeHeap 52143->52146 52145 23084f4 52147 232b4e0 RtlFreeHeap 52145->52147 52148 2308522 52146->52148 52147->52143 52149 230854b 52148->52149 52333 231be20 RtlFreeHeap 52148->52333 52152 2325560 RtlFreeHeap 52149->52152 52151 230853e 52153 232b4e0 RtlFreeHeap 52151->52153 52154 230856c 52152->52154 52153->52149 52155 2308595 52154->52155 52334 231be20 RtlFreeHeap 52154->52334 52158 2325560 RtlFreeHeap 52155->52158 52157 2308588 52160 232b4e0 RtlFreeHeap 52157->52160 52159 23085b6 52158->52159 52161 2325560 RtlFreeHeap 52159->52161 52160->52155 52162 23085d2 52161->52162 52163 232b4e0 RtlFreeHeap 52162->52163 52162->52194 52164 2308625 52163->52164 52165 232b4e0 RtlFreeHeap 52164->52165 52166 230865e 52165->52166 52167 2325560 RtlFreeHeap 52166->52167 52168 2308672 52167->52168 52169 232b4e0 RtlFreeHeap 52168->52169 52168->52194 52170 2308797 52169->52170 52171 232b4e0 RtlFreeHeap 52170->52171 52172 23087a4 52171->52172 52173 2325560 RtlFreeHeap 52172->52173 52174 23087b8 52173->52174 52175 232b4e0 RtlFreeHeap 52174->52175 52174->52194 52176 23087ec 52175->52176 52177 2325560 RtlFreeHeap 52176->52177 52178 2308800 52177->52178 52179 232b4e0 RtlFreeHeap 52178->52179 52178->52194 52180 230882d 52179->52180 52181 2325560 RtlFreeHeap 52180->52181 52182 2308841 52181->52182 52183 2325560 RtlFreeHeap 52182->52183 52184 230885d 52183->52184 52185 232b4e0 RtlFreeHeap 52184->52185 52184->52194 52186 2308897 52185->52186 52187 2325560 RtlFreeHeap 52186->52187 52188 23088ab 52187->52188 52189 232b4e0 RtlFreeHeap 52188->52189 52188->52194 52190 23089c8 52189->52190 52191 232b4e0 RtlFreeHeap 52190->52191 52192 23089d5 52191->52192 52193 2325560 RtlFreeHeap 52192->52193 52203 23089eb 52193->52203 52194->51883 52195 2308aec 52205 2308b47 52195->52205 52336 231be20 RtlFreeHeap 52195->52336 52196 232b4e0 RtlFreeHeap 52198 2308b79 52196->52198 52199 232b4e0 RtlFreeHeap 52198->52199 52199->52194 52201 2308b2a 52204 232b4e0 RtlFreeHeap 52201->52204 52202 232b4e0 RtlFreeHeap 52202->52203 52203->52194 52203->52195 52203->52202 52335 231be20 RtlFreeHeap 52203->52335 52204->52205 52205->52196 52207 2324db1 52206->52207 52208 2324dc7 GetComputerNameExW 52206->52208 52207->52208 52209 2324def 52208->52209 52210 2324df3 GetTokenInformation 52209->52210 52215 2324e4e 52209->52215 52211 2324e1c 52210->52211 52210->52215 52212 2324e3e 52211->52212 52213 2333de0 RtlFreeHeap 52211->52213 52214 2333de0 RtlFreeHeap 52212->52214 52213->52212 52214->52215 52337 231dfc0 52215->52337 52218 2324eaa GetNativeSystemInfo 52220 2324ed3 52218->52220 52221 2324ee8 52218->52221 52219 2333de0 RtlFreeHeap 52219->52218 52223 2333de0 RtlFreeHeap 52220->52223 52221->52220 52222 2324f17 52221->52222 52224 2333de0 RtlFreeHeap 52222->52224 52225 2324f15 52223->52225 52224->52225 52227 2333de0 RtlFreeHeap 52225->52227 52230 2324f67 52225->52230 52226 2324f8f GetAdaptersInfo 52228 2324fbb 52226->52228 52229 2324fdd 52226->52229 52227->52230 52231 232b4e0 RtlFreeHeap 52228->52231 52229->52228 52233 2324fea GetAdaptersInfo 52229->52233 52230->52226 52232 2324fc5 52231->52232 52234 232b4e0 RtlFreeHeap 52232->52234 52233->52228 52237 2324fff 52233->52237 52235 2324fcd 52234->52235 52235->51886 52236 2333de0 RtlFreeHeap 52236->52237 52237->52228 52237->52236 52240 2334759 52238->52240 52239 23347af 52239->51891 52240->52239 52241 23347ad NtFreeVirtualMemory 52240->52241 52241->52239 52242->51891 52243->51891 52246 230fff9 52244->52246 52245 2302939 52264 230f8a0 52245->52264 52246->52245 52247 230cce0 LdrGetProcedureAddress 52246->52247 52248 2310072 52247->52248 52249 230cce0 LdrGetProcedureAddress 52248->52249 52250 231008d 52249->52250 52251 230cce0 LdrGetProcedureAddress 52250->52251 52252 23100b6 52251->52252 52253 230cce0 LdrGetProcedureAddress 52252->52253 52254 23100d5 52253->52254 52255 230cce0 LdrGetProcedureAddress 52254->52255 52256 23100f4 52255->52256 52257 230cce0 LdrGetProcedureAddress 52256->52257 52258 2310113 52257->52258 52259 230cce0 LdrGetProcedureAddress 52258->52259 52260 2310132 52259->52260 52261 230cce0 LdrGetProcedureAddress 52260->52261 52262 2310151 52261->52262 52263 230cce0 LdrGetProcedureAddress 52262->52263 52263->52245 52265 230f8da 52264->52265 52266 230cce0 LdrGetProcedureAddress 52265->52266 52271 230293e 52265->52271 52267 230f900 52266->52267 52268 230cce0 LdrGetProcedureAddress 52267->52268 52269 230f91b 52268->52269 52270 230cce0 LdrGetProcedureAddress 52269->52270 52270->52271 52272 2313470 52271->52272 52274 2313489 52272->52274 52273 2313493 52273->51900 52274->52273 52275 230cce0 LdrGetProcedureAddress 52274->52275 52276 2313502 52275->52276 52277 230cce0 LdrGetProcedureAddress 52276->52277 52278 231351d 52277->52278 52279 230cce0 LdrGetProcedureAddress 52278->52279 52280 2313546 52279->52280 52281 230cce0 LdrGetProcedureAddress 52280->52281 52282 2313565 52281->52282 52283 230cce0 LdrGetProcedureAddress 52282->52283 52284 2313584 52283->52284 52285 230cce0 LdrGetProcedureAddress 52284->52285 52286 23135a3 52285->52286 52287 230cce0 LdrGetProcedureAddress 52286->52287 52288 23135c2 52287->52288 52289 230cce0 LdrGetProcedureAddress 52288->52289 52290 23135e1 52289->52290 52291 230cce0 LdrGetProcedureAddress 52290->52291 52292 2313600 52291->52292 52293 230cce0 LdrGetProcedureAddress 52292->52293 52294 231361f 52293->52294 52295 230cce0 LdrGetProcedureAddress 52294->52295 52296 231363e 52295->52296 52297 230cce0 LdrGetProcedureAddress 52296->52297 52298 231365d 52297->52298 52299 230cce0 LdrGetProcedureAddress 52298->52299 52300 231367c 52299->52300 52301 230cce0 LdrGetProcedureAddress 52300->52301 52302 231369b 52301->52302 52303 230cce0 LdrGetProcedureAddress 52302->52303 52304 23136ba 52303->52304 52305 230cce0 LdrGetProcedureAddress 52304->52305 52306 23136d9 52305->52306 52307 230cce0 LdrGetProcedureAddress 52306->52307 52308 23136f8 52307->52308 52309 230cce0 LdrGetProcedureAddress 52308->52309 52310 2313717 52309->52310 52311 230cce0 LdrGetProcedureAddress 52310->52311 52312 2313736 52311->52312 52313 230cce0 LdrGetProcedureAddress 52312->52313 52314 2313755 52313->52314 52315 230cce0 LdrGetProcedureAddress 52314->52315 52315->52273 52317 2308eee CreateMutexExA 52316->52317 52318 2333de0 52317->52318 52320 2333e14 52318->52320 52319 2308f71 52319->52037 52320->52319 52321 232b4e0 RtlFreeHeap 52320->52321 52321->52320 52323 2308016 52322->52323 52324 232557b 52322->52324 52323->52075 52326 231be20 RtlFreeHeap 52323->52326 52324->52323 52325 232b4e0 RtlFreeHeap 52324->52325 52325->52323 52326->52075 52327->52108 52328->52128 52329->52121 52330->52126 52331->52140 52332->52145 52333->52151 52334->52157 52335->52203 52336->52201 52338 231dff1 52337->52338 52339 232b4e0 RtlFreeHeap 52338->52339 52340 231e03d 52338->52340 52339->52340 52340->52218 52340->52219 52341 23155c0 52345 2315609 52341->52345 52342 2334360 NtCreateThreadEx 52343 2315795 52342->52343 52346 2315eed 52343->52346 52377 23345f0 52343->52377 52345->52342 52345->52346 52347 23157d1 52347->52346 52381 231f3a0 52347->52381 52350 2334ff0 NtQueueApcThread 52351 2315e84 52350->52351 52351->52346 52352 2334ff0 NtQueueApcThread 52351->52352 52353 2315eb0 52352->52353 52353->52346 52354 2315ec5 52353->52354 52356 2334ff0 NtQueueApcThread 52353->52356 52354->52346 52355 2334ff0 NtQueueApcThread 52354->52355 52357 2315ee9 52355->52357 52358 2315f0e 52356->52358 52357->52346 52360 2334ff0 NtQueueApcThread 52357->52360 52358->52346 52359 2334ff0 NtQueueApcThread 52358->52359 52359->52354 52361 2315f67 52360->52361 52361->52346 52362 2334ff0 NtQueueApcThread 52361->52362 52363 2315f93 52362->52363 52363->52346 52364 2334ff0 NtQueueApcThread 52363->52364 52365 2315fbf 52364->52365 52365->52346 52366 2315fd4 52365->52366 52367 2334ff0 NtQueueApcThread 52365->52367 52366->52346 52368 2334ff0 NtQueueApcThread 52366->52368 52367->52366 52369 2315ff8 52368->52369 52369->52346 52370 2316033 52369->52370 52372 2334ff0 NtQueueApcThread 52369->52372 52370->52346 52371 2334ff0 NtQueueApcThread 52370->52371 52373 2316057 52371->52373 52372->52370 52373->52346 52374 2334ff0 NtQueueApcThread 52373->52374 52375 23160a9 52374->52375 52375->52346 52376 2334ff0 NtQueueApcThread 52375->52376 52376->52346 52379 2334621 52377->52379 52378 2334686 52378->52347 52379->52378 52380 2334684 NtDuplicateObject 52379->52380 52380->52378 52382 231f3bd 52381->52382 52383 231f3f2 CreateToolhelp32Snapshot 52382->52383 52384 231f610 52383->52384 52385 231f418 Thread32First 52383->52385 52386 232b4e0 RtlFreeHeap 52384->52386 52385->52384 52392 231f439 52385->52392 52388 231f61c 52386->52388 52387 231f5fc Thread32Next 52387->52384 52387->52392 52389 2315871 52388->52389 52390 232b4e0 RtlFreeHeap 52388->52390 52389->52346 52389->52350 52390->52389 52392->52387 52393 231f5fa NtResumeThread 52392->52393 52394 23351c0 52392->52394 52393->52387 52396 23351e2 52394->52396 52395 233523e 52395->52392 52396->52395 52397 233523c NtReadVirtualMemory 52396->52397 52397->52395 52398 14009a1b0 52403 14009a1c1 _set_errno_from_matherr 52398->52403 52399 14009a1f6 RtlAllocateHeap 52401 14009a210 52399->52401 52399->52403 52400 14009a212 52406 140091a90 11 API calls _set_errno_from_matherr 52400->52406 52403->52399 52403->52400 52405 140097b04 RtlEnterCriticalSection RtlLeaveCriticalSection std::_Facet_Register 52403->52405 52405->52403 52406->52401

                  Control-flow Graph

                  APIs
                  • GetUserNameW.ADVAPI32 ref: 02324D92
                  • GetComputerNameExW.KERNELBASE ref: 02324DA7
                  • GetComputerNameExW.KERNELBASE ref: 02324DD6
                  • GetTokenInformation.KERNELBASE ref: 02324E12
                  • GetNativeSystemInfo.KERNELBASE ref: 02324EC4
                  • GetAdaptersInfo.IPHLPAPI ref: 02324FB0
                  • GetAdaptersInfo.IPHLPAPI ref: 02324FF5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
                  • String ID:
                  • API String ID: 1596153048-0
                  • Opcode ID: 734901508a68811e876b4a3c5d65e8c7476ff381839600de737bf5e9afc0d482
                  • Instruction ID: d2cbb88933b55a9fa0dfc3f03c848f18925cf3217a285f7feb5c1ab8f47b4862
                  • Opcode Fuzzy Hash: 734901508a68811e876b4a3c5d65e8c7476ff381839600de737bf5e9afc0d482
                  • Instruction Fuzzy Hash: 93917431218B488FEB65EB14D8557DAB7E6FBD4700F40852DE94AC3290DB78EA45CB83

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Thread32$CreateFirstNextSnapshotToolhelp32
                  • String ID: 0
                  • API String ID: 3779972765-4108050209
                  • Opcode ID: 6a3b6698b668788de6e2e14965d81c56222b994650be3d337df0d4b3b48050f1
                  • Instruction ID: d0b5504f88d9410a2ed689bf480ca039c756c17d3046b3f12396c9270f57f476
                  • Opcode Fuzzy Hash: 6a3b6698b668788de6e2e14965d81c56222b994650be3d337df0d4b3b48050f1
                  • Instruction Fuzzy Hash: 51619130218B888FD7A4EF29D854BAAF7E6FB88304F50456DE58EC3251DB74E545CB42

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 263 230cce0-230cd19 264 230cd1b-230cd1f 263->264 265 230cd25-230cd48 call 2317d90 264->265 266 230cdcc 264->266 270 230cdc4-230cdc7 265->270 271 230cd4a-230cd63 265->271 268 230cdce-230cdde 266->268 270->264 272 230cd65-230cd6d 271->272 273 230cdbf-230cdc2 271->273 272->273 274 230cd6f-230cdbd call 2331270 * 2 LdrGetProcedureAddress 272->274 273->268 274->268
                  APIs
                  • LdrGetProcedureAddress.NTDLL ref: 0230CDB2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressProcedure
                  • String ID:
                  • API String ID: 3653107232-0
                  • Opcode ID: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                  • Instruction ID: e679209bb6d31c641c2fbb3017cb23a4c125bcc92ba805a45e2b082802dc3d99
                  • Opcode Fuzzy Hash: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                  • Instruction Fuzzy Hash: 7631C471128B488BC7689F08DC866BAB7E4FB85311F50162FE58AC3651E630F8468BD7

                  Control-flow Graph

                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
                  • Instruction ID: 73e9ac730e88868a771b08ed5845479a74c0e6ece9d6cf64f39870defdeafa7f
                  • Opcode Fuzzy Hash: 62d6cbcc5dfeb1084a9cc122a67364a682b6f2504e530092aaea3ef2afdda240
                  • Instruction Fuzzy Hash: 0A418670128B488FE358DF28D8997AAB7E1FB48315F50466DE45AC32D5CB78D846CB81

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 390 2334360-23343bb 391 23343d3-23343ea 390->391 392 23343bd-23343d0 390->392 393 23343f0-233440f call 230e050 391->393 394 23344a4-23344bc 391->394 392->391 398 2334411-2334419 393->398 399 2334450-233449d 393->399 398->399 400 233441b-2334449 call 230101b 398->400 399->394 402 233444e NtCreateThreadEx 400->402 402->399
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                  • Instruction ID: 9c3064f493beb86f2150d1a5c71e44ffe6b4acf3a78e770ee7c7df0d8eeec614
                  • Opcode Fuzzy Hash: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                  • Instruction Fuzzy Hash: CA411DB151CB488FD7749F0CA8466EAB7E0FB99720F00492FD5C983211DB75A4428BC3

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 431 23345f0-233461f 432 2334621-233462a 431->432 433 233462d-233463f 431->433 432->433 434 2334641-233465b call 230e050 433->434 435 23346ae-23346bc 433->435 439 2334686-23346a7 434->439 440 233465d-2334665 434->440 439->435 440->439 441 2334667-233467f call 230102a 440->441 443 2334684 NtDuplicateObject 441->443 443->439
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
                  • Instruction ID: a2e7de945c38aed6485feb77d58f6e9f9b03894b33f8e6dd0d03b94b153358fb
                  • Opcode Fuzzy Hash: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
                  • Instruction Fuzzy Hash: 7B21817161DB489FE714DF08D846AAAB7E5FB88725F20091FE589C3320D7749480CB83

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 444 23351c0-23351e0 445 23351e2-23351e9 444->445 446 23351ec-23351fe 444->446 445->446 447 2335200-233521a call 230e050 446->447 448 2335257-2335263 446->448 452 233523e-2335250 447->452 453 233521c-2335224 447->453 452->448 453->452 454 2335226-2335237 call 2301045 453->454 456 233523c NtReadVirtualMemory 454->456 456->452
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
                  • Instruction ID: 27e89f9916e18db6f7560ec66f0224b2a347e887c9110e14b0509c7180a0e8be
                  • Opcode Fuzzy Hash: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
                  • Instruction Fuzzy Hash: 8E110670668B488FDB14DF089846ABAB3E4F78C315F80481EE889C3650D775D580CB83

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 457 2317a50-2317a8b call 23347d0 460 2317ac1-2317ac2 457->460 461 2317a8d 457->461 464 2317aca-2317af9 call 23352f0 460->464 462 2317aa3-2317aa6 461->462 463 2317a8f-2317a91 461->463 462->464 467 2317aa8-2317ab4 462->467 465 2317a93-2317a96 463->465 466 2317ab6-2317abf 463->466 470 2317afe-2317b0c 464->470 465->464 469 2317a98-2317aa1 465->469 466->464 467->464 469->464
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                  • Instruction ID: 1857e25dfa6faaa42e188918da49d1e5e642649d571089b4d7cc6abbcd192cbe
                  • Opcode Fuzzy Hash: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                  • Instruction Fuzzy Hash: CB110270128B885FE7289B1CD84A376B3D5F789314F58051DE989C23C0DBB592888A83
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                  • Instruction ID: d3a11c2e6be095b0b74aa1088ef2b7726dd592dad5b65d2d588163ccda2b882d
                  • Opcode Fuzzy Hash: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                  • Instruction Fuzzy Hash: 34117370618B498FDB149F589846BAAB7E4F75C755F80081EE889C2650D7769580CAC3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                  • Instruction ID: 827d51592c9d65258b527738403e58bc58772cf8a1453ecb3757dd93434e7533
                  • Opcode Fuzzy Hash: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                  • Instruction Fuzzy Hash: 9D01B530628B458FEB08EB1894576B677F2FB89714F10491EE59AC3750DB39EA418B83
                  Memory Dump Source
                  • Source File: 00000000.00000003.1717833671.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
                  • Instruction ID: 4ea7449681efce282d2670d86deeb029b1950ded4b223f0d262e585cfb931f00
                  • Opcode Fuzzy Hash: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
                  • Instruction Fuzzy Hash: 80F044B0628B448BD744DF2984CA6357BE1FBDC755F24452EE899C7361CB359842CB43
                  Memory Dump Source
                  • Source File: 00000000.00000003.1717833671.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
                  • Instruction ID: addb20d51f7e1123cb2fe26cb62f261bcd7b5fe4b925cc89dce0e44594c390fd
                  • Opcode Fuzzy Hash: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
                  • Instruction Fuzzy Hash: 59F08270A28F444BCB04AF2C884A63A77E1FBE8645F54462EE848D7361DB35E942CB43
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                  • Instruction ID: 9cab7961c947c0c4920e7d91043c74581c24ec598b89dad951f2ed48e57c2e44
                  • Opcode Fuzzy Hash: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                  • Instruction Fuzzy Hash: B7D0A97248DB188EE7309AA8F8833E8B3D0F780328F80482EC18CC2002D63E40468B06

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 67 2307830-2307883 68 2307885-2307888 67->68 69 230788a-2307892 InternetOpenW 67->69 68->69 70 2307898-23078d7 InternetConnectW 69->70 71 2307af9-2307afd 69->71 70->71 72 23078dd-230792b HttpOpenRequestW 70->72 73 2307aff-2307b0c 71->73 72->73 76 2307931-230793b 72->76 74 2307b17-2307b1a 73->74 75 2307b0e-2307b11 InternetCloseHandle 73->75 77 2307b25-2307b28 74->77 78 2307b1c-2307b1d 74->78 75->74 79 2307990-23079ab 76->79 80 230793d-2307945 76->80 82 2307b33-2307b3b 77->82 83 2307b2a-2307b2b 77->83 78->77 79->73 91 23079b1-23079ba 79->91 80->79 81 2307947-230798b call 2332750 * 2 80->81 81->79 85 2307bd0-2307be3 82->85 86 2307b41-2307b4b 82->86 83->82 89 2307b62-2307b73 86->89 90 2307b4d-2307b54 call 2331230 86->90 92 2307b75-2307b78 89->92 93 2307b7a-2307b8a call 230cb60 89->93 90->89 104 2307b56-2307b60 call 232b4e0 90->104 95 23079e6-2307a0a 91->95 96 23079bc-23079de call 2331270 HttpSendRequestA 91->96 92->85 92->93 107 2307bba-2307bce call 2331410 93->107 108 2307b8c-2307bb8 call 230a050 call 232b4e0 93->108 106 2307a0c 95->106 96->73 111 23079e4-2307a16 96->111 104->85 106->96 107->85 107->104 108->85 116 2307a24-2307a3b call 232b4c0 111->116 117 2307a18-2307a1f call 232b4e0 111->117 125 2307a3f-2307a5b 116->125 117->116 127 2307a61-2307a69 125->127 128 2307ae3-2307af7 call 232b4e0 125->128 127->128 130 2307a6b-2307a7e 127->130 128->75 130->128 133 2307a80-2307a86 130->133 133->128 134 2307a88-2307a96 133->134 135 2307a98-2307aaa 134->135 136 2307aac-2307aaf call 232b4c0 134->136 139 2307ab4-2307ade call 23244a0 135->139 136->139 139->125
                  APIs
                  • InternetOpenW.WININET ref: 0230788A
                  • InternetConnectW.WININET ref: 023078CB
                  • HttpOpenRequestW.WININET ref: 0230791F
                  • HttpSendRequestA.WININET ref: 023079DA
                  • InternetCloseHandle.WININET ref: 02307B11
                    • Part of subcall function 0232B4E0: RtlFreeHeap.NTDLL ref: 0232B51D
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Internet$HttpOpenRequest$CloseConnectFreeHandleHeapSend
                  • String ID:
                  • API String ID: 3224957877-0
                  • Opcode ID: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
                  • Instruction ID: fa8515a770b55e0f3191c72cb9c9c2d6d16f5cbe46f6099685f7caa55802a448
                  • Opcode Fuzzy Hash: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
                  • Instruction Fuzzy Hash: E9A1B630228A098FDB24EF19D8A576BF7E5FB98344F04456DD84AC3291DF74E845CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000003.1717833671.0000000000500000.00000040.00001000.00020000.00000000.sdmp, Offset: 00500000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_500000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
                  • Instruction ID: 942d3d408808ab8b33129023ebd1494536d369ce030809ab161135f4121942f5
                  • Opcode Fuzzy Hash: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
                  • Instruction Fuzzy Hash: D5A1953161CB088FDB54EF1CD885BAABBE1FB98710F50456DE48AC7265DB34E845CB82

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 189 2308ed0-2308fc1 call 2324ce0 CreateMutexExA call 2333de0 194 2308fc7-2309007 189->194 194->194 195 2309009-23093d0 call 2333de0 * 14 194->195
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CreateMutex
                  • String ID:
                  • API String ID: 1964310414-0
                  • Opcode ID: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                  • Instruction ID: ea25e62750799ec1ad0867afdb4d48029559ea1d52fff70e0dab5d1c0f7255c3
                  • Opcode Fuzzy Hash: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                  • Instruction Fuzzy Hash: 37E10071518A0D8FE751EF14E894BA6BBF4F768340F60467BE84EC3264DB389245CB86

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 224 2318c60-2318ca3 call 2301000 227 2318d34-2318d43 224->227 228 2318ca9-2318cb9 224->228 237 2318e2e-2318e3a 227->237 229 2318cf3-2318cf8 228->229 230 2318cbb-2318ced call 2301104 228->230 232 2318cfa-2318d09 229->232 233 2318d1f-2318d2f 229->233 230->229 236 2318d0b-2318d0f 232->236 233->237 238 2318d11-2318d18 236->238 239 2318d48-2318d54 236->239 238->236 241 2318d1a-2318de2 call 23066c0 238->241 242 2318d5d-2318d64 239->242 255 2318de4-2318df6 241->255 256 2318df9-2318e0b CreateFiber 241->256 244 2318d91-2318d98 242->244 245 2318d66-2318d79 242->245 244->242 246 2318d9a 244->246 245->244 250 2318d7b-2318d80 245->250 246->237 250->244 252 2318d82-2318d8b call 2334000 250->252 252->244 255->256 258 2318e13-2318e2d call 23066c0 256->258 258->237
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CreateFiber
                  • String ID:
                  • API String ID: 3765768292-0
                  • Opcode ID: 93f026081dbdd0704688566a40b49887aa3b7977c0bffc28660abc2339b77c2a
                  • Instruction ID: e831167a29fcd7a46cac08c4adab1b257d45c0532a2f53e3f5a488d3fd229990
                  • Opcode Fuzzy Hash: 93f026081dbdd0704688566a40b49887aa3b7977c0bffc28660abc2339b77c2a
                  • Instruction Fuzzy Hash: 4A51F731618E184FEB6CAF289C5976573D5FB58310F20032AE99BC31E1DB3498428BC6

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 339 14009a1b0-14009a1bf 340 14009a1cf-14009a1df 339->340 341 14009a1c1-14009a1cd 339->341 342 14009a1f6-14009a20e RtlAllocateHeap 340->342 341->340 343 14009a212-14009a21d call 140091a90 341->343 344 14009a210 342->344 345 14009a1e1-14009a1e8 call 14009564c 342->345 348 14009a21f-14009a224 343->348 344->348 345->343 351 14009a1ea-14009a1f4 call 140097b04 345->351 351->342 351->343
                  APIs
                  • RtlAllocateHeap.NTDLL(?,?,00000000,0000000140098926,?,?,?,000000014008808F,?,?,00000000,000000014008832A), ref: 000000014009A205
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 9f54f83c219c4149c215936c9b1e3b5a93792f556c5099100a8e44297067ea87
                  • Instruction ID: feed11c58d774232235c950f9d55905fdae63acc7960014812c9abe5af6e187b
                  • Opcode Fuzzy Hash: 9f54f83c219c4149c215936c9b1e3b5a93792f556c5099100a8e44297067ea87
                  • Instruction Fuzzy Hash: B2F0BEB034260040FE9B9BA799013E612946B9EBC4F4C44307F0A873F2EE3CC8808260

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 354 232b4e0-232b4ee 355 232b523-232b52f 354->355 356 232b4f0-232b505 354->356 356->355 358 232b507-232b51d call 2324ce0 RtlFreeHeap 356->358 358->355
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                  • Instruction ID: d1295094617ef2e9d0083dfd8bf41cb798ec88147c495ff06539f0c078a8e757
                  • Opcode Fuzzy Hash: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                  • Instruction Fuzzy Hash: 33F03030310A188FEB18E7BAACC877177E7FB9C3457448054A445CA154DB38D445CB41
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Service$ErrorLast$HandleOpen$Close$BindingConditionConfig2ManagerMaskServerStringUnregister_invalid_parameter_noinfo_noreturn$CtrlFileModuleQuery$AddressAttributesChangeComposeConsoleControlCreateDeleteDirectoryDispatcherFreeFromHandlerInfoNameObjectProcSingleStartVerifyVersionWait_invalid_parameter_noinfo
                  • String ID: " /runassvc$*$/register$/runasapp$/runassvc$/unregister$6373$:$AvDumper$ControlService(SERVICE_CONTROL_UNREGISTER) failure: gle={}$Debugger app is starting.$Debugger service is starting.$DeleteService(self) failure: gle={}$E502$Logs$OpenSCManager failure: gle={}$OpenService failure: gle={}$ProfSvc_Group$RpcSS$RpcSs$SYSTEM\CurrentControlSet\Services\$ServicesActive$SetDefaultDllDirectories$StartServer failure: retval={}$StartServiceCtrlDispatcher failure: gle={}$Unable to create debugger rpc endpoint!$Unable to create service '{}'!$Unable to modify debugger service binary path!$Unable to modify debugger service configuration using c_ChangeConfig!$Unable to open service '{}'!$Unable to open the service control manager!$Unable to query own process module path!$Unable to set debug service as antimalware process!$kernel32.dll$ncalrpc
                  • API String ID: 3192065050-1795711860
                  • Opcode ID: ea9b68894bb3cbd4bb5cf007b3b3174e66252b921e17b0a0989a0938eb955c47
                  • Instruction ID: 932e22e956f5bd5acfd8ba59a66f833d8126d0bb355dcdbcc5ae485dd3a19278
                  • Opcode Fuzzy Hash: ea9b68894bb3cbd4bb5cf007b3b3174e66252b921e17b0a0989a0938eb955c47
                  • Instruction Fuzzy Hash: 3BD24D72619BC496EB62DF26E8503DA73A0F78DB80F508115EB8D43AB9DF38C585CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Process$CloseDebugHandle$Open$CriticalSection$Event_invalid_parameter_noinfo_noreturn$ActiveEnterErrorLastLeaveNameThread$BaseBreakContextContinueEnumExitFileImageKillMemoryModuleModulesReadStopWait__std_exception_destroy
                  • String ID: - Cause: $ PID: $*$689A$689A$689A$689A$689A$689A$689A$@$Cause: VectoredExceptionHandler$Debugger attached to process: $Debugger exception 0x{:08X} successfully dumped process {} into '{}' (dump level: {})$Debugging of own process is not supported$EXCEPTION_DEBUG_EVENT Process:{} Thread:{} Exception:0x{:08X} FirstChance:{} ExceptionFlags:0x{:08X}$Event:{} Process:{} Thread:{}$F59A$F59A$F59A$F59A$F59A$F59A$F59A$H$Process exited: {}, PID: {}, Exit Code: {}$RIP_EVENT occurred {}:{}!$U$Unable to disable kill on exit$Unable to start debugging of process with id {}, error code: {}$Unable to wait for debugging event of process with id {}, error code: {}$d$unp%u%ux-manual.mdmp$unp%u%ux-unhandled.mdmp$verifier.dll
                  • API String ID: 1934789087-895941338
                  • Opcode ID: 52befe47cdb3fd150a0f9306a4cabdf493931040b5e64e686eb257149541a435
                  • Instruction ID: 0058b21d05951af80c70cb3c119dfb6efd6361c6d656cde952f6fdf10c487868
                  • Opcode Fuzzy Hash: 52befe47cdb3fd150a0f9306a4cabdf493931040b5e64e686eb257149541a435
                  • Instruction Fuzzy Hash: EC037C72609BC486E732DB26E5403DEB3A0F799784F508216EBCC47AA9DF39D584CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLast$_invalid_parameter_noinfo_noreturn$AddressHandleProc$CloseFile$AttributesControlCreateDeviceInfoModuleOpenPerformanceProcess
                  • String ID: PerfInfo [MB]: CommitTotal: %llu, CommitLimit: %llu, PhysAvail: %llu, KrnlPaged: %llu, KrnlNonPaged: %llu, Handles: %u, Processe$1$9CC4$9CC4$9CC4$Dump file '{}' could not be created, error code: {}$Dump file {} already exists$Dumped by AvDump$E26A$E26A$E26A$Failed to dump process with error {:#x}$Failed to dump process with error {:#x}, retrying with limited dump content settings...$Failed to dump process with error {:#x}, retrying with minimal content settings...$Failed to open process with id {}, error code: {}$MiniDumpWriteDump failed, error: {}$PssCaptureSnapshot$PssFreeSnapshot$PssQuerySnapshot$dmp$dump$kernel32.dll$mdmp
                  • API String ID: 376777773-3630350583
                  • Opcode ID: 3fb77e9cb2fcd3bb1a688ff8889f6d9e8b069020ce7dcae4adb0504b958aed3d
                  • Instruction ID: d5e5fab381148c1bff7a856c653db2bd1001b950a7f209c7094abfbe4ae606ec
                  • Opcode Fuzzy Hash: 3fb77e9cb2fcd3bb1a688ff8889f6d9e8b069020ce7dcae4adb0504b958aed3d
                  • Instruction Fuzzy Hash: 65A24672600BC49AEB62CF36E8843DD33A5F748798F504216EB9D5BAA9DF34C695C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: <$Argument dump_file not specified$Command-line usage$Invalid arguments supplied$Not enough arguments supplied$address of the exception pointers structure$amount of information to include in minidump. 0 - default, 1 - full memory.$attach to process as debugger and watch it for exceptions$comment$create dump containing data segments information$create dump containing process handle information$create live kernel memory dump$data_segs$dbg$dump_file$dump_level$exception_ptr$filename of dump to generate$flood control - minimal interval in minutes to elapse since saving last dump. Default is 60.$handle_data$help$kernel$min_interval$optional comment to include into dump$pid$process ID to dump$this, obviously$thread ID that caused the exception$thread_id
                  • API String ID: 3668304517-1605023467
                  • Opcode ID: 5625fb0db9f62f2a542038e45993453e20a38afa67aa1cf11e76f809a3986bca
                  • Instruction ID: b754154605ab7baf9f5a4d4cad2f16c90aa88233fc16587ab0b277c547277488
                  • Opcode Fuzzy Hash: 5625fb0db9f62f2a542038e45993453e20a38afa67aa1cf11e76f809a3986bca
                  • Instruction Fuzzy Hash: 8403F572614BC481EA22DB26E4843EE6361F7897D4F905116FB9D07AFAEF78C984C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLastService$Close$Handle$Open$QueryStatus$ControlManagerSleepStart
                  • String ID: !$ErrorControl$O$SYSTEM\CurrentControlSet\Services\$ServicesActive$Start$Type$Unable to open the service '{}'!$Unable to open the service control manager!$Unable to query status of the service '{}'!$Unable to send control code {} to the service '{}'!$Unable to start the service '{}'!
                  • API String ID: 914021282-1139266149
                  • Opcode ID: 650a7d3c880a9c04a8784dffdabddba7ef7e5863e4024906fb18aff839f78393
                  • Instruction ID: e746428b034b753f819b5fc75678727d8781594847a1229f713a5b317e7df695
                  • Opcode Fuzzy Hash: 650a7d3c880a9c04a8784dffdabddba7ef7e5863e4024906fb18aff839f78393
                  • Instruction Fuzzy Hash: 9A528FB2614BC09AEB62DF26D8807DD73A0F74878CF405125FB8957AA9EF78C684C744
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: minutes) was not yet reached $+$6373$6373$9$E502$E502$Lsass dumping is not supported$Minimum interval between dumps ($SeDebugPrivilege$Successfully dumped kernel memory into '{}'$Successfully dumped process {} into '{}' (dump level: {})$\\.\pipe\lsass$last.dump
                  • API String ID: 3668304517-1309060305
                  • Opcode ID: 3959f13308a53d779ee7367f625bf2d3a64f108ade1a3bf03b5012af82bcf960
                  • Instruction ID: f7c574caa26f615195f0bafb14573898e7189bc56f31540c36fcf2833535e9d3
                  • Opcode Fuzzy Hash: 3959f13308a53d779ee7367f625bf2d3a64f108ade1a3bf03b5012af82bcf960
                  • Instruction Fuzzy Hash: A6826F72609BC486E772DF16E4503DAB3A0F789B94F508126EB9943BA9DF3CC544CB40
                  APIs
                    • Part of subcall function 0000000140049500: OpenSCManagerW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049535
                    • Part of subcall function 0000000140049500: OpenServiceW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049562
                    • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049575
                    • Part of subcall function 0000000140049500: CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049591
                    • Part of subcall function 0000000140049500: CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 000000014004959B
                  • RtlEnterCriticalSection.NTDLL ref: 00000001400146BF
                    • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 00000001400495C4
                    • Part of subcall function 0000000140049500: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049606
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLastService$CloseHandleOpen$CriticalEnterManagerSection
                  • String ID: +$689A$Bprotect$BprotectEx$Driver incompatible with debugger detected.$F59A$Unable to create sync event$^
                  • API String ID: 2384786053-2103501719
                  • Opcode ID: 6246e33e4d18522323e2979d310de36177014b67129b8993640bb0660fbd4a61
                  • Instruction ID: acc6ca1ac3d4bcc98d97c1d460dc2bf6ac9bcfe21a9f3a416ce2b6d3651b1c6f
                  • Opcode Fuzzy Hash: 6246e33e4d18522323e2979d310de36177014b67129b8993640bb0660fbd4a61
                  • Instruction Fuzzy Hash: 08129E32615BC486E762DF16E4903DAB3A4FB8DB84F518126EB8907BB4DF79C484CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                  • String ID: ($gfffffff$gfffffff$gfffffff
                  • API String ID: 1944019136-2044015736
                  • Opcode ID: 5136b0d809f81acb1283958e3410d931ada9a6dbe5a2ad97a49ecc9ad0ed624f
                  • Instruction ID: cadec9307002fb482afa7b70277d176585e481f7c60079d498e52ce0c2159b11
                  • Opcode Fuzzy Hash: 5136b0d809f81acb1283958e3410d931ada9a6dbe5a2ad97a49ecc9ad0ed624f
                  • Instruction Fuzzy Hash: 74B2BE72704BC482EA629B26E4447EEB3A1F789BD4F445611EB9E07BA9DF7CC481C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Crypt$ContextCurrentSystemTime$AcquireCounterDiskFileFreeGlobalMemoryOpenPerformanceProcessQueryRandomReleaseSpaceStatusThreadTimes
                  • String ID: @$Cannot open registry key$Microsoft Base Cryptographic Provider v1.0
                  • API String ID: 641596549-1296241995
                  • Opcode ID: 8bbcdc25e91c0466fedc14985ca10bf9c7be634f727564f723196ec6c475a166
                  • Instruction ID: c9c06d2097c26ed99e9b658cc0718fdec311c56a7e8b571f4b331795d7023104
                  • Opcode Fuzzy Hash: 8bbcdc25e91c0466fedc14985ca10bf9c7be634f727564f723196ec6c475a166
                  • Instruction Fuzzy Hash: 001351B36186818BDB55CF29E4513AE77F0F79A784F541126F38A87699EB3EC904CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: File$ConditionMask$Process$AttributesCloseControlCreateCurrentDebugDeleteErrorExceptionHandleHeaderInfoLastRaiseSystemTerminateVerifyVersion_invalid_parameter_noinfo_noreturn
                  • String ID: 3$Dump file '{}' could not be created, error code: {}$Dump file {} already exists$NtSystemDebugControl failed, status: {:#010x}$Windows 8.1 or later is required for live kernel dumping$dmp$mdmp
                  • API String ID: 2346179174-4051622449
                  • Opcode ID: f2ed98436135c8495667bffc05249207030db6e999f3df43ce323f906c08814b
                  • Instruction ID: d2532aca21d2b9b7f68ee8878676270b080208754356df25d40381f4caa891a8
                  • Opcode Fuzzy Hash: f2ed98436135c8495667bffc05249207030db6e999f3df43ce323f906c08814b
                  • Instruction Fuzzy Hash: C0D14A72610B8496EB22DF66E8803DD73B4F7897A8F504216EB9D53AB9EF38C545C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                  • API String ID: 808467561-2761157908
                  • Opcode ID: 126489c02f89f32444c53208c887ce3e7162916d31ce3ead66bec1882e9e6cee
                  • Instruction ID: 378258da1df3d0a3be93c01209ba7d409c16e2a030b42d5069ed35b0a8a1d70a
                  • Opcode Fuzzy Hash: 126489c02f89f32444c53208c887ce3e7162916d31ce3ead66bec1882e9e6cee
                  • Instruction Fuzzy Hash: FFB2DF76A142908BE766CF6AD440BEE77A1F3A87C8F505315EB0657EA8D734DA80CF40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: (=
                  • API String ID: 3668304517-3258547529
                  • Opcode ID: 56c9b8a907e4f7f30388f79c6fff3c512a22a2b609b44b23b3cfdbfec8c230fe
                  • Instruction ID: d3026dc617975dbc0fae11b53bcd1b8976c14ad3504770994b9723004f1809d4
                  • Opcode Fuzzy Hash: 56c9b8a907e4f7f30388f79c6fff3c512a22a2b609b44b23b3cfdbfec8c230fe
                  • Instruction Fuzzy Hash: C3429E72A14B8481EB12CB2AE4813EE6361F799BD4F509215FB9D13BAADF38C5D0C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: gfffffff
                  • API String ID: 3668304517-1523873471
                  • Opcode ID: ea0bed14f6fd8a221ce5c85f356cd70518ca9004aa46f6dc453517bd3c9c7151
                  • Instruction ID: 973354c1fd7a855e06744c45f1c7becab9a41793762c757bf87d089ddaceaf43
                  • Opcode Fuzzy Hash: ea0bed14f6fd8a221ce5c85f356cd70518ca9004aa46f6dc453517bd3c9c7151
                  • Instruction Fuzzy Hash: 0B32BFB2601B8482FA26DB26E4843DE6361F789BD0F549522EB5D07BEADF7CC485C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskErrorLastOpen
                  • String ID: Group$SYSTEM\CurrentControlSet\Services\$Tag
                  • API String ID: 2342203223-3512472385
                  • Opcode ID: f2b4027a297b2d02ffeec11c995bceafd04a3ff707c0ce089216ac103398882c
                  • Instruction ID: dba7bc752a1d05e0ded33738caa6f39dbac0386adf53da9ba466901ce0d3c83c
                  • Opcode Fuzzy Hash: f2b4027a297b2d02ffeec11c995bceafd04a3ff707c0ce089216ac103398882c
                  • Instruction Fuzzy Hash: 70128072619FC091EA71DB15E4503EEA3A1F7D9780F505625EBCD53AA9EF38C584CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: _token$option
                  • API String ID: 3668304517-4023011786
                  • Opcode ID: 97091d6cb97254faeec8e4a5df26bfbf1ffdc79699f9418e2058bf893ef362fa
                  • Instruction ID: acddcaf35ce4b853b78acbe7e4be319e569b1b970cdae44850855107222bc432
                  • Opcode Fuzzy Hash: 97091d6cb97254faeec8e4a5df26bfbf1ffdc79699f9418e2058bf893ef362fa
                  • Instruction Fuzzy Hash: 4222BB32714A4086FB12CF6AC9483ED2362F70DBD8FA45A11EF5D57AEADB74C5869300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: File$CloseErrorHandleLastLockUnlock
                  • String ID: couldn't obtain shared file lock
                  • API String ID: 1994953073-3717060661
                  • Opcode ID: 5381214164cbfcde355a917efa3f1e5b70d4e5fc025e5a7ce08c79cf7592e1e1
                  • Instruction ID: 6dc9c28dc2bbea5aeb0c5c8121b6d775b216b4a95e7ee356a531a1ee5e03f9c1
                  • Opcode Fuzzy Hash: 5381214164cbfcde355a917efa3f1e5b70d4e5fc025e5a7ce08c79cf7592e1e1
                  • Instruction Fuzzy Hash: B6514D72618BC085EA71DB26E8513DAB3A5F7D9790F509325A7ED43AB9DF38C184CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Close$ErrorLast$Create$Value
                  • String ID: Cannot write key value
                  • API String ID: 1320403711-3393872497
                  • Opcode ID: 2ec7a2271ba602718d70749ecf442ff4a7b786d39cc7c46cb2ff517a004f99a4
                  • Instruction ID: 2ec24c23424257bf2840f2bcad33e52d2911314c2e675eb45ae1497282b7bbf1
                  • Opcode Fuzzy Hash: 2ec7a2271ba602718d70749ecf442ff4a7b786d39cc7c46cb2ff517a004f99a4
                  • Instruction Fuzzy Hash: 6241BF32215B8086EB62DF62E4957DA77A4FB88BC4F284125FF8A03765DF39C441CB10
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Close$DeleteErrorLastOpen$QueryTree
                  • String ID: Cannot delete registry key$Cannot query kernel mode registry key path
                  • API String ID: 2384582698-3324586067
                  • Opcode ID: 408225df95bdd7a8a36108006d88b0aaea0ba40410c2e6995d3acb5101e31627
                  • Instruction ID: c0185c5e7e07c172dddb39523b0b6857f3cb2cbd74be1f292dc2529af919b534
                  • Opcode Fuzzy Hash: 408225df95bdd7a8a36108006d88b0aaea0ba40410c2e6995d3acb5101e31627
                  • Instruction Fuzzy Hash: D4412B72618BC092EB11DF66E4943DAB3A0FBD9780F505525FBC983A69EF78C548CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$Cpp_errorLeaveThrow_std::_$CloseCreateEnterErrorEventHandleInitializeLastMultipleObjectsWait
                  • String ID:
                  • API String ID: 2765073912-0
                  • Opcode ID: ecd216b08f9fd74a9c1be6b230cc400d8d31eb2996f637f51f31818544e1adf8
                  • Instruction ID: 4046915ed44fe326b562858b187994a8cd86b385aa076283e19239acc64219b5
                  • Opcode Fuzzy Hash: ecd216b08f9fd74a9c1be6b230cc400d8d31eb2996f637f51f31818544e1adf8
                  • Instruction Fuzzy Hash: 66A16B32605BC486E7A29F12F4947DAB3A8FB8DB84F558116EB89477B0DF79C484CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                  • String ID:
                  • API String ID: 1239891234-0
                  • Opcode ID: 4fa09d09ecd95d6422647266fe9199911d7ff3209486aff70f905c38b8d44fbd
                  • Instruction ID: 5f295c627d3f4a1f9ab801dadf57347dc710ed6b506405f99e25ff6f7181c6b6
                  • Opcode Fuzzy Hash: 4fa09d09ecd95d6422647266fe9199911d7ff3209486aff70f905c38b8d44fbd
                  • Instruction Fuzzy Hash: D6313832614F8096EB61CF66E8443DA73A4F788798F504126EB9D43BA9EF38C655CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: File$CloseErrorHandleLastLockUnlock
                  • String ID:
                  • API String ID: 1994953073-0
                  • Opcode ID: 8293c3e118a1685d0d8fe61e27a1e9435cf05ca2b7879448cc97020c69cf5e24
                  • Instruction ID: b19ae1d1ca8e9597a534420853a95dbf5c266e96ab2866330c5e9f2adbdeadb8
                  • Opcode Fuzzy Hash: 8293c3e118a1685d0d8fe61e27a1e9435cf05ca2b7879448cc97020c69cf5e24
                  • Instruction Fuzzy Hash: EF22A272704B9085EB22CB26E4443EDA3A1F7997D4F954326EBAD43AE8DF38C585C704
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                  • String ID:
                  • API String ID: 1177325624-0
                  • Opcode ID: 11f514c96b4bc136fc0dcfa8cbf9ceb26a26f6227072a4a38d10f0bf4c1ad5fb
                  • Instruction ID: 2a976e20c7c07be9545e79cd8fd8f730cedcea555264f88cf5bc0e3db44d78e7
                  • Opcode Fuzzy Hash: 11f514c96b4bc136fc0dcfa8cbf9ceb26a26f6227072a4a38d10f0bf4c1ad5fb
                  • Instruction Fuzzy Hash: 66213032614B8097E7128F66F84579AB7A4F78DBE4F540229FB9943BA4DB38D845CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: %$+
                  • API String ID: 3668304517-2626897407
                  • Opcode ID: ba850d6aa618e8a5ef159dc3786b625165af67347b89d150aaef4c85da97bd4d
                  • Instruction ID: a0d898dbe7d671f5170276f5073ab47a7f6217a54e0e881cc844ee19e376ab2e
                  • Opcode Fuzzy Hash: ba850d6aa618e8a5ef159dc3786b625165af67347b89d150aaef4c85da97bd4d
                  • Instruction Fuzzy Hash: 1502F532708A8489F722CB66E4903ED73B1E7997C8F548116FF491BBA9DB39D946C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: %$+
                  • API String ID: 3668304517-2626897407
                  • Opcode ID: ef3cfa6880285422245a7e8038cad12d370277293f6718c99b629d3b3881f313
                  • Instruction ID: 5f2076fc5d2f6f41c57a6eed74219a67e11487e96eb78a4c63318edaad5f1c3e
                  • Opcode Fuzzy Hash: ef3cfa6880285422245a7e8038cad12d370277293f6718c99b629d3b3881f313
                  • Instruction Fuzzy Hash: E602F732705A8489F722CB66E4903ED73B1E7997C8F148215FF495BBA9DB39CA46C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: memcpy_s
                  • String ID:
                  • API String ID: 1502251526-3916222277
                  • Opcode ID: c10be92ccd777733aec77242fd83f6c250c9f7e3d5896467feec955041489aac
                  • Instruction ID: 743f78193035bc79f1e57e9f59dd1a4a70d6b0a9934cb31c37873dd6cb708058
                  • Opcode Fuzzy Hash: c10be92ccd777733aec77242fd83f6c250c9f7e3d5896467feec955041489aac
                  • Instruction Fuzzy Hash: 2EC1F47271568587EB21CF1AE088BEEB7A1F3D87C4F458225EB4A47B94DB38D805CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                  • String ID:
                  • API String ID: 2933794660-0
                  • Opcode ID: 695b2c72f8245567a92a4f97253ef12cd3ec153a36e762290f020759e5a569ed
                  • Instruction ID: 1bd70d2ee80f52086e0b2869b45f11ac886149a817778f7592ab05b98df556ae
                  • Opcode Fuzzy Hash: 695b2c72f8245567a92a4f97253ef12cd3ec153a36e762290f020759e5a569ed
                  • Instruction Fuzzy Hash: A3110376710F008AEB01CFA6E8543A933A8F75DB98F440E25EB6D87BA4DB78C1948240
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: $ $ $(
                  • API String ID: 0-3698178323
                  • Opcode ID: 5c31586f011da146f7a0e2f3f26b49a2f6bf0a272a270216fad1032cc7f56bac
                  • Instruction ID: 56ed98dba78e34fca3f2bd122c47688c0148ab4bdb7ab316b3d037c329e58e2d
                  • Opcode Fuzzy Hash: 5c31586f011da146f7a0e2f3f26b49a2f6bf0a272a270216fad1032cc7f56bac
                  • Instruction Fuzzy Hash: 2AD16F706187888FE779DF28D899BAAB7E5FB88704F40492DD48EC3251DF74A445CB82
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3668304517-0
                  • Opcode ID: 0c5e3ae4d7f34646f4bf7f9aecd518afe444cf5d875dbf0ec729c9109402b926
                  • Instruction ID: 54353db618213540d5186c5b37f8c69dbfbe8609b719d997372a201807642c31
                  • Opcode Fuzzy Hash: 0c5e3ae4d7f34646f4bf7f9aecd518afe444cf5d875dbf0ec729c9109402b926
                  • Instruction Fuzzy Hash: 0D22BD72614B8485EB12DF66E4843EE73A1F7897D4F509212FB9D03AAADF38C585C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressProcedure
                  • String ID: $'2O$U/$\8j
                  • API String ID: 3653107232-658286377
                  • Opcode ID: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
                  • Instruction ID: bdc8b00fc2f658a74a6f408954fbbabe4d77246bbb27c0f876bd56659503106d
                  • Opcode Fuzzy Hash: 4935f0f32ad2d9a935451ba930207134b4bd1056c48635d3548c9aa2ad88d671
                  • Instruction Fuzzy Hash: E1425374A606444FE7A8EFB8E86872536E7F79D3407609A6B9409C33B4DE7C98039F50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: $0$@
                  • API String ID: 0-2347541974
                  • Opcode ID: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
                  • Instruction ID: 3cc7740318adf931cadd1ae4e79554da7afcdecce33e5bff69b611314268b7a1
                  • Opcode Fuzzy Hash: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
                  • Instruction Fuzzy Hash: 9D223F30218B588FE7B4EF28D855B9AB7E2FB98314F50461D958EC3290DF749549CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: Software\$product-reg-key$reg-key
                  • API String ID: 0-2334822848
                  • Opcode ID: 4da8e0afcb8e9388d06a71be1f86bb65f70ed54fc2075c05b62e08a328c0d3e9
                  • Instruction ID: e83f2201b4e9165746cb3b0bdb132f8ea2f66838df7c5e4937a6000ac8bf2a60
                  • Opcode Fuzzy Hash: 4da8e0afcb8e9388d06a71be1f86bb65f70ed54fc2075c05b62e08a328c0d3e9
                  • Instruction Fuzzy Hash: 7512E032A14B8492E702DF75C4413ED6370FBA8788F516226FB89676BAEF34D695C340
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLast$Value
                  • String ID: -_.$C$U
                  • API String ID: 1883355122-122348360
                  • Opcode ID: 893563df212f572994940df262ea965a83ddd967e6897792fc41d3a3a4659922
                  • Instruction ID: 47f83df31a620841db7f71abc47568d93323410f9af05f2c893c73b2928b2718
                  • Opcode Fuzzy Hash: 893563df212f572994940df262ea965a83ddd967e6897792fc41d3a3a4659922
                  • Instruction Fuzzy Hash: 7DE1AB3220164096EB66EF27E4847ED27A1F78CBD4F548226FF4A07BA5EB74C655C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ExceptionRaise_clrfp
                  • String ID:
                  • API String ID: 15204871-0
                  • Opcode ID: 65681df75707a92f2bc7e9ada3ab695fd425c163f5d037de68b2fc66d7e5ee35
                  • Instruction ID: 523b48fd9272ed22601a5be54fc0fee5876a28af2ee06b70f9afebd8834ef710
                  • Opcode Fuzzy Hash: 65681df75707a92f2bc7e9ada3ab695fd425c163f5d037de68b2fc66d7e5ee35
                  • Instruction Fuzzy Hash: B8B11C77610B848BEB16CF2AC88639D77A0F389B98F158915EB5D877B4CB39C852C740
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: )$p
                  • API String ID: 0-1764766951
                  • Opcode ID: ee93447394ec2e47e78dee34ba32a62090d93dde5ca2884970cb00b8fe4b969e
                  • Instruction ID: ced4a2f65aae668b5d3f416012c33f0593a06b98a33017af6c34cd5e6d1c9657
                  • Opcode Fuzzy Hash: ee93447394ec2e47e78dee34ba32a62090d93dde5ca2884970cb00b8fe4b969e
                  • Instruction Fuzzy Hash: CA02DE30628B588FE774DF28D8557AAB7E6FB88308F504A2DD48ED3290DF749549CB42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: e+000$gfff
                  • API String ID: 0-3030954782
                  • Opcode ID: 04352b12e251caef85448169595c1d977d113804befc2cbc0cfa0fe36bdb305b
                  • Instruction ID: da49b78225b27d5c317bd1a457599b25e9e006a51047f6e63fa0380021a18e3c
                  • Opcode Fuzzy Hash: 04352b12e251caef85448169595c1d977d113804befc2cbc0cfa0fe36bdb305b
                  • Instruction Fuzzy Hash: 8E5159737186C446E7268F3AE9157997B91F348BD4F48D221EBA84BBE5CB39C444C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressProcedure
                  • String ID: !yOr
                  • API String ID: 3653107232-2868905794
                  • Opcode ID: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
                  • Instruction ID: 884e62cc5f46fe2f43daa542b401d7c49b863043fc4284b0717f2ed5fb892d82
                  • Opcode Fuzzy Hash: a344c6b9773561e1a8feff107ffa0bbb357e6f0ee830072877925764f08a3291
                  • Instruction Fuzzy Hash: 81124F30218B488FD7B8EF28D855BAAB7E2FB99304F50496D948EC3690DF74D945CB42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: P
                  • API String ID: 0-3110715001
                  • Opcode ID: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
                  • Instruction ID: c9dfdb3a05c9c1a9d9d93bb8a0126dfad574dcbba947eb0ee3b65c75ec1e5d8e
                  • Opcode Fuzzy Hash: fc71c7b77c584ab428780ddc863f287b4ad5f6815cb57d0fe849b24e33f4b176
                  • Instruction Fuzzy Hash: F5025230218B484FE779AF68D4587AAB7D3FB98308F50452DE48AC3295DF78D946CB42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: (
                  • API String ID: 0-3887548279
                  • Opcode ID: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
                  • Instruction ID: 97300179506a525884eb5a906817a9fb46ad9078d730b59108f3c36bc63d8c83
                  • Opcode Fuzzy Hash: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
                  • Instruction Fuzzy Hash: FBF1A170628B488FD768DF28849676EB7DAFBCC304F50462DE08EC3695CB34D8568B42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: gfff
                  • API String ID: 0-1553575800
                  • Opcode ID: 8a2dcf9ab7c55880f9a741755fadcef32c767d2ea98bcf1b8f9d0d040eefc798
                  • Instruction ID: 2e6303e5c84755d0e2fedad68920bbbdbb98dc67d56c676ba306184c5d9a5104
                  • Opcode Fuzzy Hash: 8a2dcf9ab7c55880f9a741755fadcef32c767d2ea98bcf1b8f9d0d040eefc798
                  • Instruction Fuzzy Hash: DA1215B262978086EB22CF26F1407EE7791F358BC4F149126FB4A47BA5DB78C945CB10
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: gfff
                  • API String ID: 0-1553575800
                  • Opcode ID: 188657171af1e0757aff3f81c85895f20b7be6e38f1443b3f445cd7df4c45def
                  • Instruction ID: 419e06eae31c9b0086dba08d0a635922e550bfd7c4935c9a990d6660b0d2045f
                  • Opcode Fuzzy Hash: 188657171af1e0757aff3f81c85895f20b7be6e38f1443b3f445cd7df4c45def
                  • Instruction Fuzzy Hash: DB0229B522868582E72ACA2BE5547FC6695F388BC0F558137FF4B877F4E639CA408311
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: c30bd7ab68d751d74eb6e3fcd089575567a5f3ab528e208d543831b4295961bd
                  • Instruction ID: c86acf0697317c6e04b0281086dc78695b2f9adec44c7f2e3f1dc9a3134360ab
                  • Opcode Fuzzy Hash: c30bd7ab68d751d74eb6e3fcd089575567a5f3ab528e208d543831b4295961bd
                  • Instruction Fuzzy Hash: 71D1B670628B584FE774DF68C4957BAB7D2FB89304F14866ED4CEC3252DB3494498B82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8
                  • API String ID: 0-4194326291
                  • Opcode ID: 6bbf3d654b950b392ce32ff54005e7a4c88c8c4e5069d455d2263e1fb34e77d3
                  • Instruction ID: 54ad5be8a3a8c2449f8dee187edceaed3f28c8df9013a111fc3b86cc6eb3835b
                  • Opcode Fuzzy Hash: 6bbf3d654b950b392ce32ff54005e7a4c88c8c4e5069d455d2263e1fb34e77d3
                  • Instruction Fuzzy Hash: 4BC18430228B484FE778EB28D8557AAB7D6FBC8304F50456DD59AC3290DF74D946CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
                  • Instruction ID: 58eb790a425d2e654e1adbed0b1471094a38efa13445de134dfce58e4184e228
                  • Opcode Fuzzy Hash: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
                  • Instruction Fuzzy Hash: BA919330228B584FD768AF2CD85676AB7D6FB88304F50452DE48AC3251DF79D9468B82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: @
                  • API String ID: 0-2766056989
                  • Opcode ID: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
                  • Instruction ID: 77e99e101771207c77fe38ed4d14137b8a1a1c25b4469f9413451d3bd71f08e2
                  • Opcode Fuzzy Hash: 59a31fbeb8a05151edb759329d96371e831f95528c315330fb92cc5f8aafcbf3
                  • Instruction Fuzzy Hash: DFA12070228B044BE768EB2CD45575BBBD2FBC8708F50862DB08ED3690CB79D9418B87
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: gfffffff
                  • API String ID: 0-1523873471
                  • Opcode ID: 9da3902cafaa54ea0f26fcf8c8641c2ae7e0a60bf2e2409ba9268231b238ef55
                  • Instruction ID: 45631be74bca65ee0c029d0995144cdcef367947e7f1576268a430681ad91ba9
                  • Opcode Fuzzy Hash: 9da3902cafaa54ea0f26fcf8c8641c2ae7e0a60bf2e2409ba9268231b238ef55
                  • Instruction Fuzzy Hash: 2EA133737057C486EB32CB2AA4607DE7B95E769BC4F049122EF8A477A5DA3DC901CB01
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: gj
                  • API String ID: 0-4203073231
                  • Opcode ID: 100eea8c5719e573b0f57fdb57933fa8d496c7bc56ea0f9008c025b70b65f920
                  • Instruction ID: a116e9c95324fa8595d9ae91701c575426a3e033bb2937926ad2e21f17145bb8
                  • Opcode Fuzzy Hash: 100eea8c5719e573b0f57fdb57933fa8d496c7bc56ea0f9008c025b70b65f920
                  • Instruction Fuzzy Hash: 6381F8732157C48FD309CF6898402AD7BA4F325F08F9C826DDB809B34ACA34D9A5C7A5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
                  • Instruction ID: ffe99cd3f050875ff7dc60bd43677a0aea1ff59ce491df0ad9511e3ea0b2c46d
                  • Opcode Fuzzy Hash: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
                  • Instruction Fuzzy Hash: 14625734720B064BEB29DF2DDCE66A673DAFB8C740B844574AC46C72C9DF34E8418A65
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CreateFirstSnapshotThread32Toolhelp32
                  • String ID:
                  • API String ID: 490256885-0
                  • Opcode ID: 981f0971402d7281a867420ae6825c153d13a7eb141935b46ef7612b15631b0c
                  • Instruction ID: 83d422f3277f74973af09c1a0ae7328ae299dac946f1170d14ba58addfb9d042
                  • Opcode Fuzzy Hash: 981f0971402d7281a867420ae6825c153d13a7eb141935b46ef7612b15631b0c
                  • Instruction Fuzzy Hash: CC629370218B088FD7A4DF18D895BA6B7E1FB98304F6146BED44DC7265DF34A846CB82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: 6ed7e8d2c7d9338698d87b8b7149cf556e2881883802bf60fb96d9698b45afc0
                  • Instruction ID: e11528149e15d80dfba7b1f190b07388ff691fa9ba317cc9ae468a1c38aa5fd7
                  • Opcode Fuzzy Hash: 6ed7e8d2c7d9338698d87b8b7149cf556e2881883802bf60fb96d9698b45afc0
                  • Instruction Fuzzy Hash: 32428430328B584BD769BB18DC517AAB7D6FBD8704F50856DA48AC3290DF38DA45CAC3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
                  • Instruction ID: f58875975f512e694411d87f31ea34c732f7719d36140aa21b53b2910de87f6c
                  • Opcode Fuzzy Hash: d6a83add80c015651db2210a2c8c18f03a1d4ada41add862ec9d8abcd3fa1614
                  • Instruction Fuzzy Hash: 14221E70218B888FE7B5EF18C855BEAB7E1FB98305F508A5DD48EC3290DB749545CB82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 85d6e6732e53faa95cd3743e2378d3a887562cd9e05599d55a6b56c32021c76b
                  • Instruction ID: 2031991f789854849d8a887f9292cbb26d957e80ec6c0c045ddbc40e58dcf59f
                  • Opcode Fuzzy Hash: 85d6e6732e53faa95cd3743e2378d3a887562cd9e05599d55a6b56c32021c76b
                  • Instruction Fuzzy Hash: 35120A30218B488FE7A5EB28D895BABB7E1FB98305F504A5D948EC32A0DF74D545CB42
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: faae51807ddb49513d4786620cdd6c550b09a0d8d4213f58ccc1b562f963a966
                  • Instruction ID: b7037c2cbbcfe99637e64824125650fc0ba0fae8ecec9fa2d7d9ace1a3aef260
                  • Opcode Fuzzy Hash: faae51807ddb49513d4786620cdd6c550b09a0d8d4213f58ccc1b562f963a966
                  • Instruction Fuzzy Hash: CFF15430728B484FD769EB28D86576AB7D3FBC8344F50452DA08AC3291DF78D9468B87
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1e573f32f122f45f3bb05125e8f2b0bf86f8e17a829f365963d033b070a9e4f
                  • Instruction ID: 66fd05c5b885140976aa7e1247ddb41b929de21df99f4b63eb482e4587c12f88
                  • Opcode Fuzzy Hash: b1e573f32f122f45f3bb05125e8f2b0bf86f8e17a829f365963d033b070a9e4f
                  • Instruction Fuzzy Hash: 0BF13370318B488FE765DF28D8557ABB7D2FB88314F50462DA48AC32A0DF78D945CB82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 93e8d057c5f9894473d845d1c83c9ad02595634ce579fe39b255221776393a4b
                  • Instruction ID: c95722b297681990262d781d6c54b3ecc264fb3fa3402c6e05d6cad8d3ce86a0
                  • Opcode Fuzzy Hash: 93e8d057c5f9894473d845d1c83c9ad02595634ce579fe39b255221776393a4b
                  • Instruction Fuzzy Hash: 94F14170218B488FE768EF18D8657AAB7D5FB89308F50492DE48EC3291DB78D545CB83
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 580a3a3c83426d8ff6b88dfef7fa52f3433e29507ba5bdf8adfca3bd01625a3b
                  • Instruction ID: 4579a8a5ef6b61bf1da3c99f0adb5fd1486e3e554a092a480512724684266e35
                  • Opcode Fuzzy Hash: 580a3a3c83426d8ff6b88dfef7fa52f3433e29507ba5bdf8adfca3bd01625a3b
                  • Instruction Fuzzy Hash: 95F17130218B488FD778EF28D4947AAB7E6FB88704F50462E948EC3291DF34D945CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
                  • Instruction ID: d479f9aae4c24ecc1aae44f150ba90439749eebc18fed671276ae3c8b60d087b
                  • Opcode Fuzzy Hash: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
                  • Instruction Fuzzy Hash: 0BD15D30328B484FD769EB2CD86576AB7D2FBC8304F50456DA48AC3291DF78D9468B82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
                  • Instruction ID: 37cea4706d70bb09e36625a4d111f91d15040b29c79a9fa1cf077947430cda51
                  • Opcode Fuzzy Hash: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
                  • Instruction Fuzzy Hash: 89D16130328B484FDB69EB2CD455B6AB7E2FBD9344F90456DA08AC3251DF34E945CB82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e2c60be4ab458fd0de4f10b45d507592baae063c69ce48d6c2cccd2856e2d476
                  • Instruction ID: cdbd6d1a16a8e0e3d4a4337008ea41b7dc649f08b0b7c8d95fbcce9c25ceabd7
                  • Opcode Fuzzy Hash: e2c60be4ab458fd0de4f10b45d507592baae063c69ce48d6c2cccd2856e2d476
                  • Instruction Fuzzy Hash: 51D14AB2B049550BEB29CA1FB581BA9A695F3DC7C0F05A126EF8683BF0E775C845C700
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
                  • Instruction ID: f032387dc33bd59dedde1e9aca371a72cf5f8c881e9931f3bf1e0388f9cd7a85
                  • Opcode Fuzzy Hash: b817203ba3c4443f5fb8480b07f75b397d38fcfc8ae896fd7bf819042d688969
                  • Instruction Fuzzy Hash: F0D1503021CB488FDB68EF29E85575AB7E5FB98304F10056EE58AC3260DF74E945CB82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a71e2ed1c5bd6be6eb256dc2b4a77e1885c532c0b5c69f70e3d6037aa8625fe
                  • Instruction ID: 41f9efc63f10987e87eef9c0ba2c1b3175a2bc8af11e52f96ac2596889cf3b43
                  • Opcode Fuzzy Hash: 2a71e2ed1c5bd6be6eb256dc2b4a77e1885c532c0b5c69f70e3d6037aa8625fe
                  • Instruction Fuzzy Hash: C2C15F7021CB484FE778EF28D8597AAB7D6FB98304F50462D958EC3290DF74D54A8B82
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
                  • Instruction ID: cb6f5659acbc0c3e3c2e105981d1932c65292e72866390db11ada82e181ea9b2
                  • Opcode Fuzzy Hash: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
                  • Instruction Fuzzy Hash: 2AC13170328B444FE768EB2CD46576ABBD2FB8C348F50456DE08AC3291DB78D9458B87
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3e9146de42fe06b3e918654735bac583dd07de0fd27d2d2d1bc3f54f1f3bf6c7
                  • Instruction ID: 03ec3d44de05fd666a70fe56bf2f7e115c799be4fe0443e434daaa8e0cd68dd6
                  • Opcode Fuzzy Hash: 3e9146de42fe06b3e918654735bac583dd07de0fd27d2d2d1bc3f54f1f3bf6c7
                  • Instruction Fuzzy Hash: 11C13673B2425087D7ACCF1AE810A6A7B96F3C8754741A12DEA1B93B80DE39CC45CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 35121771ef7e3a2a21f4fe77380e6306a785aec2d0abbaad6edc0a9a8a3c264d
                  • Instruction ID: 711fc9cbed791bafeb9942fecf9ad6579a287c36ff07293391c35c06956e8bb9
                  • Opcode Fuzzy Hash: 35121771ef7e3a2a21f4fe77380e6306a785aec2d0abbaad6edc0a9a8a3c264d
                  • Instruction Fuzzy Hash: A2D12BB273665046EB27CF2AF414BEA6691F398BC4F185124FF4A47BA4DB39C940CB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0a02068b51a8db8e48cbbecbd50ab68d20f8956ba6d06c6d8de2256c976014b4
                  • Instruction ID: 19551dc1b382e6e948458b19ea9d1326cec31ff93c2248c0597341d4f913b867
                  • Opcode Fuzzy Hash: 0a02068b51a8db8e48cbbecbd50ab68d20f8956ba6d06c6d8de2256c976014b4
                  • Instruction Fuzzy Hash: CED1BA7762064486EB7A8F2A9450BAD37A0F70CBC8F545226FF49437E6DB35CA46CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
                  • Instruction ID: 15f489f3cad45d883332e1d63106f09b618d3195bdebcc1797942e39f619eb8b
                  • Opcode Fuzzy Hash: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
                  • Instruction Fuzzy Hash: B7B10C70228B488FDB68DF1CD459B9AB7E5FB99304F50892DA08EC3251CB74D945CB43
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1ee1200db8e1ef7a7e1f657d3d6c118d16c3f2ddcba2727c09fdfbcc369e9b4a
                  • Instruction ID: a26132ffcb03175a20d539ed755665c717936d486e66848fb88558251d16acdb
                  • Opcode Fuzzy Hash: 1ee1200db8e1ef7a7e1f657d3d6c118d16c3f2ddcba2727c09fdfbcc369e9b4a
                  • Instruction Fuzzy Hash: 2FD1BA3360064486EB6A8F2B80507EE2BA1F70DBC8F544206EF59177FADB75CA46C345
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92dcddac20bf2a85382346e7c818b7a8622ac2cf6c43a00e52d6e282357d0b4a
                  • Instruction ID: 8f94db66012aa4d571d50976098dcbfdbeb1a14f4af6ba6295157503f4ec0b17
                  • Opcode Fuzzy Hash: 92dcddac20bf2a85382346e7c818b7a8622ac2cf6c43a00e52d6e282357d0b4a
                  • Instruction Fuzzy Hash: 4581C13061C7488FD719DF1CD89876ABBE5FB99304F15462DE58AC3291DB74E802CB92
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e0a5733841054f35ee6a67558ffbf079e1ddf009b8a0c96e68972e1481134178
                  • Instruction ID: 2bdbea7d7c10ac6044f066501ee86dca2032a23fa607238a4a2fff40eb8e0564
                  • Opcode Fuzzy Hash: e0a5733841054f35ee6a67558ffbf079e1ddf009b8a0c96e68972e1481134178
                  • Instruction Fuzzy Hash: A7B19E73204B5486F7668F3AC0503AC3BA0F74EF89F284219EB4A47BA6CB39C651C745
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e3b91349162c491fd9d3cfd84cd5ae5e35a4a82b261b7411649656c0553dd378
                  • Instruction ID: e60a8c4b2552d29fb97310efb39fedef81bcafe08a45545273653e4b6d61c138
                  • Opcode Fuzzy Hash: e3b91349162c491fd9d3cfd84cd5ae5e35a4a82b261b7411649656c0553dd378
                  • Instruction Fuzzy Hash: 47911572601A8486FB668B37D5187E972E1F70DBE0F44422AEF6A17BE5D738DD848700
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d88b30173d776bbec4e7b8c9e55c8544666a1e7114d5e494066a9e934f1503d
                  • Instruction ID: 00cd9de9fe2c8728540a55737d053312021d889e0e09c000a9c56b72403b59af
                  • Opcode Fuzzy Hash: 1d88b30173d776bbec4e7b8c9e55c8544666a1e7114d5e494066a9e934f1503d
                  • Instruction Fuzzy Hash: 4991F2F2204B4086FA62CA27E5247F976E1E34DBE0F59C221AF2907BE5D778D941B701
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 3215553584-0
                  • Opcode ID: 23ccc7ce9506a8c1c07d39999f756624c159b71199f188e85533ac9785993f0d
                  • Instruction ID: 01408dce989196f21b784dde59595df15d8acd0e8679eb71819d0b645f1a3049
                  • Opcode Fuzzy Hash: 23ccc7ce9506a8c1c07d39999f756624c159b71199f188e85533ac9785993f0d
                  • Instruction Fuzzy Hash: 62819E72200A1086EB65CF2AD4953AD33A0F788BE8F148626FF6E87BA5CF35C5418740
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 50f347f940c396187d4bfaa3c273b676c370f4d474c152167812ccf1e7673009
                  • Instruction ID: bd34691a7d67022634f9f1a61710223e65fd5656631df14b3dfee9598cc9dd5a
                  • Opcode Fuzzy Hash: 50f347f940c396187d4bfaa3c273b676c370f4d474c152167812ccf1e7673009
                  • Instruction Fuzzy Hash: F181937261878046EB75CF1FA4803AABA91F78E7D4F544229FB9D47BA9DB3DC5408B00
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455581737.0000000002301000.00000020.00001000.00020000.00000000.sdmp, Offset: 02301000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_2301000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9eb25984bbb84b506b7442a44f1ea2276f7130761b53bd599e6125853a15f57f
                  • Instruction ID: 4887273439543c85dde077dbccf8d3e5ebfd5c00573153ce68b53127abe4e0b2
                  • Opcode Fuzzy Hash: 9eb25984bbb84b506b7442a44f1ea2276f7130761b53bd599e6125853a15f57f
                  • Instruction Fuzzy Hash: 443169311AA78D4ED32D496C98463B137CAF79760BF28623DC9D7C3663DA26444BC541
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d1c3a0ccb6cd29ade6edb59abc650c0a6808c7d2b219c7f99c84549879a4588
                  • Instruction ID: d81f174727280bfae3e1c8d2c25fc94816d80b7737fdfd02cb4f58fea932a1ae
                  • Opcode Fuzzy Hash: 5d1c3a0ccb6cd29ade6edb59abc650c0a6808c7d2b219c7f99c84549879a4588
                  • Instruction Fuzzy Hash: A951C377604A11C3E72E9F2AC1543AC27A0F75ABA8F190119EF5A177E9CB35CE41C780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0ecb8b9979793c10852181b7fabf84e18f565fc6bcd5914c49afb4f525614f51
                  • Instruction ID: 79d5927eb58122ca7903d854d3224612b5208078e6fd7df8917aa9357f895dd0
                  • Opcode Fuzzy Hash: 0ecb8b9979793c10852181b7fabf84e18f565fc6bcd5914c49afb4f525614f51
                  • Instruction Fuzzy Hash: B851B173600A5482E72AAF2AC1543AC37E1F759FA8F184215EF46177E9CB36DE81C784
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 18b92091dba8f0accac89cfe48fde3d5d16b91869aa58acc72bd8e1dec618566
                  • Instruction ID: 3fffde151232361014340c8c5a34b6e9530ca69be43a7a409e4eaad890ce83b0
                  • Opcode Fuzzy Hash: 18b92091dba8f0accac89cfe48fde3d5d16b91869aa58acc72bd8e1dec618566
                  • Instruction Fuzzy Hash: DD51ED7321065086E72EAF2AD1543AC3BA0F359BD8F294109EF4A177E9CB35CE81C780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e2df5fec1a36e68530e0f9a86e93240da32b657597d58bd2d4df2635b41feada
                  • Instruction ID: 268ec1035cc9012f911c526a7eb253b1ec329f76e70e69a9d96f9b92d1566653
                  • Opcode Fuzzy Hash: e2df5fec1a36e68530e0f9a86e93240da32b657597d58bd2d4df2635b41feada
                  • Instruction Fuzzy Hash: 6B519B73604A5086E76E9F2AC1943AC3BA0F759B98F1D0119EF4A577A9C735CE82C780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e563b16fecf21a8b005dd336b56f4fbbb0e43b582ea3f098d82972a22c6ae1f7
                  • Instruction ID: f2dfb29b7e83f9ed2624e5c96aca5b4a5c3ee50fe1cbf1a6b696d063b6e16715
                  • Opcode Fuzzy Hash: e563b16fecf21a8b005dd336b56f4fbbb0e43b582ea3f098d82972a22c6ae1f7
                  • Instruction Fuzzy Hash: 6751FE3761865083E72AAF2AC1543AC27A0F759BD8F294119EF4A177F8DB35CE91C780
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 485612231-0
                  • Opcode ID: d3a50af7144745bcb85e305d7bf68092fdcb426cdbbc72fc98c5a77fbff44355
                  • Instruction ID: 2314152a2322c01b06b3399aa4dd9aaba0ac4941e7d2f78a4612815ca04ce106
                  • Opcode Fuzzy Hash: d3a50af7144745bcb85e305d7bf68092fdcb426cdbbc72fc98c5a77fbff44355
                  • Instruction Fuzzy Hash: 1D419D72310A5482EB44CF2BE9657A9A3A2B74CFD4F499026FF4D87B69DA38C1428340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLastThread$CloseCurrentHandleOpenSelfToken$ImpersonateRevert
                  • String ID: Unable to adjust token privilege '{}'!$Unable to assign the process impersonation token to the thread!$Unable to lookup privilege '{}'!$Unable to obtain the thread access token!
                  • API String ID: 475273544-197369002
                  • Opcode ID: 6749da1815b9244086f365902ad23cd0f73f55f9474e7ad92115bfaa5316c3ea
                  • Instruction ID: 14ed016d7a4ab3e69fe32eb5d2e51fe92fb5a36cbff291dcdc9b33d0a68bc050
                  • Opcode Fuzzy Hash: 6749da1815b9244086f365902ad23cd0f73f55f9474e7ad92115bfaa5316c3ea
                  • Instruction Fuzzy Hash: 37413871210A4592FB12AFA2E8547E92360FB8DB88F544021EB8E436B5DF3CD949C751
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLast$AddressHandleModuleProc
                  • String ID: GetModuleHandleW ({})$GetProcAddress ({})$GetProductInfo$RtlGetVersion$Unable to convert processor architecture ({}) to platform enumeration!$kernel32$ntdll
                  • API String ID: 1762409328-1915291428
                  • Opcode ID: 9d7484a7e32ca5d575654e4c2a5ec3eb30f234ca3929b35e0a70397d6b37d418
                  • Instruction ID: 15b0a89f4416b3568538fbf9990143a13fd2117f3695a2507b66dd78fb4fd6fe
                  • Opcode Fuzzy Hash: 9d7484a7e32ca5d575654e4c2a5ec3eb30f234ca3929b35e0a70397d6b37d418
                  • Instruction Fuzzy Hash: 29A14932600A8599EB5ADF66E4503EC73A0E75C7C8F948026FB8D47AB8DF39C959C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$CloseConcurrency::cancel_current_taskErrorLast
                  • String ID: /$/$6$Group$SYSTEM\CurrentControlSet\Control\GroupOrderList$SYSTEM\CurrentControlSet\Services\$Tag$The order list of the service group '{}' is malformed!
                  • API String ID: 973969752-2315443231
                  • Opcode ID: 8fff48f6f37925aaabf05bbd2da003f2930900839ed49e0dcd490e852b0a9f6d
                  • Instruction ID: 28ba2f08aa28f84ab621e218dfddfaa96cb2f13f9b34cb6f248e2f46ba81bf10
                  • Opcode Fuzzy Hash: 8fff48f6f37925aaabf05bbd2da003f2930900839ed49e0dcd490e852b0a9f6d
                  • Instruction Fuzzy Hash: 13A18A72211A8489EB62DF26E8407DD73A4F74C7D8F504626EB9D47BA9EF38C684C344
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Concurrency::cancel_current_taskLockit::_Lockit::~_$Locinfo::_Locinfo_ctor
                  • String ID: bad locale name$false$true
                  • API String ID: 1486878244-1062449267
                  • Opcode ID: 3c2b06e2966f11c69d513af3ac03665a241348d72241f8d7a8a453f8c069b74a
                  • Instruction ID: 3fd87f393ecb69b85c6b269462077d7561ae56962a89af143662b5c7ec8c1c71
                  • Opcode Fuzzy Hash: 3c2b06e2966f11c69d513af3ac03665a241348d72241f8d7a8a453f8c069b74a
                  • Instruction Fuzzy Hash: F5913B36606B4086FB22DF62E8503D973A1FB88BC4F144519AF8D67AAADB38C951C744
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$EnvironmentErrorExpandLastStrings_invalid_parameter_noinfo_noreturn
                  • String ID: 5$Unable to convert NT path '{}' to a volume GUID path!$Unable to enumerate volumes!$Unable to retrieve a path of the known folder ({})!$WSL Process$\\?\
                  • API String ID: 2353729461-3251487983
                  • Opcode ID: a971b00b6b545ec4fa32ac5bf8f1b4fc5e6327b307be9eea3f768c1d2fd21dbf
                  • Instruction ID: 2b3ceb743f5014c40e1a22504b0814f19971f4b522418f385d7f29021a5ccfb4
                  • Opcode Fuzzy Hash: a971b00b6b545ec4fa32ac5bf8f1b4fc5e6327b307be9eea3f768c1d2fd21dbf
                  • Instruction Fuzzy Hash: 2C516772710A849AEB11DF26E4903DD33A4F758788F508522FB9C47AA9EB38D6A5C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Server$Register$ServiceUnregister$Status$CtrlErrorHandlerLastObjectProtseqSingleWait
                  • String ID: ,$6373$E502$RegisterServiceCtrlHandlerEx failure: gle={}$StartServer failure: retval={}
                  • API String ID: 548640598-1530989511
                  • Opcode ID: 63b4c982e2e00fcf33e1d6dfd9c0f91330e22ee9ccfe943ffa94c78227f84723
                  • Instruction ID: 50e07fc66846bfbe4260a933a509bbc77413dc35a1dc1dc72b1564673e37ba95
                  • Opcode Fuzzy Hash: 63b4c982e2e00fcf33e1d6dfd9c0f91330e22ee9ccfe943ffa94c78227f84723
                  • Instruction Fuzzy Hash: 455126B6B10B14DAF702DFA6E8943CD33B1B748798F504116EA492BA68DF78D549CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: BaseCloseHandleModuleNameOpenProcessQueryVirtual
                  • String ID: PID: $689A$Exception address: $Exception code: $Exception in: $Exception params: $F59A
                  • API String ID: 855635403-3050060412
                  • Opcode ID: 8a8765307c712108a0947df3e5f330cae9942757cb6adf4cefaa7f41d658f88e
                  • Instruction ID: 12fd3af4425f6e6040738bb35b357383cfac07cb84db7fad37d320cb61551e6d
                  • Opcode Fuzzy Hash: 8a8765307c712108a0947df3e5f330cae9942757cb6adf4cefaa7f41d658f88e
                  • Instruction Fuzzy Hash: 4A023A72211AC49AEB61DF66E8943DD73A0F789788F504116EB4D4BB79EF38C645C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskLocinfo::_Locinfo_ctor
                  • String ID: bad locale name$false$true
                  • API String ID: 354050835-1062449267
                  • Opcode ID: f7e4faf5650d59538b5a59f5a4b8092bc18465b3856432a638800222781c1f9e
                  • Instruction ID: 5840e447b6844cdc5e1156469c82ff91de1907e4bc45fdb6f1b7e9f9b7996533
                  • Opcode Fuzzy Hash: f7e4faf5650d59538b5a59f5a4b8092bc18465b3856432a638800222781c1f9e
                  • Instruction Fuzzy Hash: D1B16B32615B8086EB12DF22E8803DE77A1FB887C8F145615FB8D1BA6ADF78C591C740
                  APIs
                  • OpenSCManagerW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049535
                  • OpenServiceW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049562
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049575
                  • CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049591
                  • CloseServiceHandle.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 000000014004959B
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 00000001400495C4
                    • Part of subcall function 000000014007B650: RtlPcToFileHeader.NTDLL ref: 000000014007B6A0
                    • Part of subcall function 000000014007B650: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,000000014001302F), ref: 000000014007B6E1
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000001400144FC), ref: 0000000140049606
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLastService$CloseHandleOpen$ExceptionFileHeaderManagerRaise
                  • String ID: $ServicesActive$Unable to open the service '{}'!$Unable to open the service control manager!
                  • API String ID: 2158513109-1786243909
                  • Opcode ID: a0523da25f66c11f40c07f91ab1d6dd001669a241499180a9da8d916ced0475a
                  • Instruction ID: cf9ba95a574f67e8951b34db8deb6be0d0de46db6f0ccc00a4b8aebf5161a491
                  • Opcode Fuzzy Hash: a0523da25f66c11f40c07f91ab1d6dd001669a241499180a9da8d916ced0475a
                  • Instruction Fuzzy Hash: B4313671214B4092EA12EF22E8543E963A4FB8DBC0FA14025FB8E43A75EF3CC955C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Value$ErrorLast$Heap$AllocateFree
                  • String ID:
                  • API String ID: 3174826731-0
                  • Opcode ID: 04a89daeb5ac5b50f33649e46550b0b56fd2029df7522eb5f8f153315faf9387
                  • Instruction ID: 8748f7850ea9bbf3ecbb45585572b62d9a9752533651cb9be03a1a6b81690c8e
                  • Opcode Fuzzy Hash: 04a89daeb5ac5b50f33649e46550b0b56fd2029df7522eb5f8f153315faf9387
                  • Instruction Fuzzy Hash: 0F412D7430524482FA6BA77769513E952419B8C7F4F280B28BF764BBF7DE38D4014B01
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseHandle$RevertSelf
                  • String ID: Unable to adjust token privilege '{}'!$Unable to lookup privilege '{}'!$Unable to remove the impersonation token from the thread!
                  • API String ID: 680554984-1021965375
                  • Opcode ID: 7d74c2ae68d176f80f8f39417a9f00b875dfe7e1de54d8cc7cf82b9b6e49ae03
                  • Instruction ID: cdf82a8bf0ce1fab008b22b615ef9f68c67fd5b9f83432e90ad38faf9f776c0f
                  • Opcode Fuzzy Hash: 7d74c2ae68d176f80f8f39417a9f00b875dfe7e1de54d8cc7cf82b9b6e49ae03
                  • Instruction Fuzzy Hash: 7E515972604F80A6EB12DF62E8507ED33B0FB48B88F544426EB8D57AA9DF38C555C780
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                  • String ID: -$pid
                  • API String ID: 3936042273-2050111806
                  • Opcode ID: 39459574276101e149e668f5135789d0d5408215e88b59f5a015b6c16a9c453e
                  • Instruction ID: fabfce5da7018e4877c0198e1f144d975b50803577cf2ec6f4d5724cba0d4fa3
                  • Opcode Fuzzy Hash: 39459574276101e149e668f5135789d0d5408215e88b59f5a015b6c16a9c453e
                  • Instruction Fuzzy Hash: AAE17B32210B8489EB11DB2AD8943DD7766FB49BE8F604A16EB6D037E9DF78C491C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_GetctypeLocinfo::_Locinfo_ctorRegister
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 2324539378-1866435925
                  • Opcode ID: 80f20ae880cd7af1f674dfb5d4272d68ab40ff994d64f0873548fe28a6f0b799
                  • Instruction ID: e111c35751b719188429c53a6d1e1e3e75a67ddf4543741b545046ef157a2033
                  • Opcode Fuzzy Hash: 80f20ae880cd7af1f674dfb5d4272d68ab40ff994d64f0873548fe28a6f0b799
                  • Instruction Fuzzy Hash: 04C13872214B4486EB12DF1AE89039977A0F788FD4F54812AEB8D47BB5DF38C956C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 459529453-1866435925
                  • Opcode ID: 184e3463d0ce68ac614c95af53a1ee39b595bdcaf27f52da81bf45af14359873
                  • Instruction ID: 54f7ea9e9456682b64ccfbfe22fe961ef79f89a3d10c261f5dd0102d8e8e279a
                  • Opcode Fuzzy Hash: 184e3463d0ce68ac614c95af53a1ee39b595bdcaf27f52da81bf45af14359873
                  • Instruction Fuzzy Hash: 00A12872205B8492EB22CF16E8903AA77A1F788BD4F548526EF8D077B5DF39C546C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                  • API String ID: 3702003507-1866435925
                  • Opcode ID: 037d58fa15f78d050895b9cf95e4fb02945ca99b45a46e19e7fa2bc18823c683
                  • Instruction ID: 6c72215b502308b4d19634f5713abeefe1ea61ab301b75ccf22e2709bc96f48c
                  • Opcode Fuzzy Hash: 037d58fa15f78d050895b9cf95e4fb02945ca99b45a46e19e7fa2bc18823c683
                  • Instruction Fuzzy Hash: 5D911C72205B8481EB22DF5AE8913DAB7A1FB88BD4F148526EB8D47B79DF38C445C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$GetctypeLocinfo::_Locinfo_ctor
                  • String ID: bad locale name
                  • API String ID: 249287498-1405518554
                  • Opcode ID: e7082fab6352342f877f570bc33ebb75009c9146a37448a9756aafedec09829e
                  • Instruction ID: e3a783b7f3f4e3b661fd681bf2fe5da9bcad8ebf194ad2d0229f9e04157e6bdf
                  • Opcode Fuzzy Hash: e7082fab6352342f877f570bc33ebb75009c9146a37448a9756aafedec09829e
                  • Instruction Fuzzy Hash: D6712A32745B8085EB12DF62E8903DD73A5FB887C8F144529AF8967AAADF38C915C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorLast$CurrentFileMappedNameProcess
                  • String ID: DataFolder$Unable to get the path of the module!$Unable to retrieve the path of the module!$Unable to store the path of the module!
                  • API String ID: 1207367512-2037552110
                  • Opcode ID: fe1bfbe4a8589865e0ba6e72039b0dcf4a50e70ce2de8e1576109a64ebb87e3c
                  • Instruction ID: 1d99d5b9ee9eab08dc8c86b6c5e7e0c5ead8c965952f76fc9aec46b7c3feec4a
                  • Opcode Fuzzy Hash: fe1bfbe4a8589865e0ba6e72039b0dcf4a50e70ce2de8e1576109a64ebb87e3c
                  • Instruction Fuzzy Hash: 0F615B72218AC491EA62DB22F4507EEA361F79C784F904126EBCD43A69EF78D585CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseFindVolume
                  • String ID: 5$DataFolder$Unable to convert NT path '{}' to a volume GUID path!$Unable to enumerate volumes!$Unable to retrieve volume paths for volume '{}'!$\Device\LanmanRedirector\$\Device\Mup\$\SystemRoot\
                  • API String ID: 664902110-4246012846
                  • Opcode ID: ad7c29b02100301719761f52cc2ea08ae8938a70180d7a4fb3ce1e8974dcccf1
                  • Instruction ID: 1849c877932131e3aeac80045ee2ef2a80c108937b66888cc186d23b58077a11
                  • Opcode Fuzzy Hash: ad7c29b02100301719761f52cc2ea08ae8938a70180d7a4fb3ce1e8974dcccf1
                  • Instruction Fuzzy Hash: 48519F72614B8081FB71DB16E8407D973A4F7887D0F408616FFA927AA5DF79C885CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                  • String ID: ios_base::failbit set
                  • API String ID: 3936042273-3924258884
                  • Opcode ID: d0e7e7a2e1974941ae1b96c1c99521119145b685d426650eb89f3a2a2397f915
                  • Instruction ID: 527590365acff6ada6692441932f82eef4975a9590fe435fe90c4af1a2a30145
                  • Opcode Fuzzy Hash: d0e7e7a2e1974941ae1b96c1c99521119145b685d426650eb89f3a2a2397f915
                  • Instruction Fuzzy Hash: 8DD1B472614B8481EA16DB26E4513AD7360F799BE4F548315FBAC037E6EF78C990C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: $ $ [ --$K
                  • API String ID: 3668304517-1316898524
                  • Opcode ID: ba8ad85fab49c1c8392720268d41424c6e3a0a2850a9b770de3f8b71cd50b351
                  • Instruction ID: 33b8748a0ce9b5a7b6ba9b5a28cad75024c6bf3266164c939941f4dadec6fb65
                  • Opcode Fuzzy Hash: ba8ad85fab49c1c8392720268d41424c6e3a0a2850a9b770de3f8b71cd50b351
                  • Instruction Fuzzy Hash: 07C1B472605B8486EF269B2AD85439D6362F789BE4F244A11FF4E07BA9DF78C481C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: Argument not found.$Can not switch from automatic to manual indexing$Can not switch from manual to automatic indexing$Invalid format string.$Missing '}' in format string.$Number is too big$Unknown format specifier.
                  • API String ID: 3668304517-96604897
                  • Opcode ID: 6ae073d4a7f77a6a8e7fd1a17a5666f8309c59158a6396b1077f6afd641cada8
                  • Instruction ID: 8a5a0fab3dddc5db6a430d1a720256370c53a79f4d382a8c8edb9d15e8c8aa08
                  • Opcode Fuzzy Hash: 6ae073d4a7f77a6a8e7fd1a17a5666f8309c59158a6396b1077f6afd641cada8
                  • Instruction Fuzzy Hash: 7E91C272604A848AE7238F26E4447EC7BA1E75D7C8F94851AEF8C037B9EB35D955C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: EnvironmentExpandStrings$CloseErrorLastOpenQueryValue
                  • String ID: String environment expansion failed$String environment expansion failed due to unexpected buffer size
                  • API String ID: 2357329694-527591527
                  • Opcode ID: bed5391467c1121ca96b4b31fc48628f542f9b303b31acf90c8e8063643ebaf0
                  • Instruction ID: 9460c06f9952e987e85a005f162b0bb574501fdc1195e6a76ad8fd59d77a2e83
                  • Opcode Fuzzy Hash: bed5391467c1121ca96b4b31fc48628f542f9b303b31acf90c8e8063643ebaf0
                  • Instruction Fuzzy Hash: 1491BC72710A40A9EB22DF76D4903EC33B1EB98788F404512FB4957AA9EF39CA95C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: Argument not found.$Can not switch from automatic to manual indexing$Can not switch from manual to automatic indexing$Invalid format string.$Missing '}' in format string.$Number is too big$Unknown format specifier.
                  • API String ID: 3668304517-96604897
                  • Opcode ID: b289502791915fcfb5ba3a21ab0722be7a2e243f680952d3b3a9c662d29fc3e9
                  • Instruction ID: 0ec7cd76aa4e2c5961cd70c4a005674cb22b336ee8f1c367bf3f397a015a45d5
                  • Opcode Fuzzy Hash: b289502791915fcfb5ba3a21ab0722be7a2e243f680952d3b3a9c662d29fc3e9
                  • Instruction Fuzzy Hash: DA81DB72600A449AE722DF2AE4447EC37B5F758BC4F908522EF8C07B69EB39C5A5C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorFileLast$ReadSize
                  • String ID: get_file_content$get_file_content: GetFileSizeEx$get_file_content: ReadFile
                  • API String ID: 3509033087-2648918662
                  • Opcode ID: 6fff3f04ea3b197b3296cdd13bade9e01c6dd2927da1543f621be0ffb8e9d733
                  • Instruction ID: d61b73416bd6d7c834fc3e4ea08e9635e00d5d11ecda4caa3ef7cc9c25f81872
                  • Opcode Fuzzy Hash: 6fff3f04ea3b197b3296cdd13bade9e01c6dd2927da1543f621be0ffb8e9d733
                  • Instruction Fuzzy Hash: A6516672700A8499EB12DF72E9403ED33A5E758BC8F418522BF4E17A69EE38D695C340
                  APIs
                  • FreeLibrary.KERNEL32(?,00000000,00000000,000000014009B708,?,?,?,?,0000000140095C7D,?,?,?,?,0000000140060E04), ref: 000000014009AFEF
                  • GetProcAddress.KERNEL32(?,00000000,00000000,000000014009B708,?,?,?,?,0000000140095C7D,?,?,?,?,0000000140060E04), ref: 000000014009AFFB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressFreeLibraryProc
                  • String ID: api-ms-$ext-ms-
                  • API String ID: 3013587201-537541572
                  • Opcode ID: 715d91696d5f05c1d05fb450de7ca50a66ac6eb40b0d5cf0c54e9b46d7f48f02
                  • Instruction ID: 9b0e2bc5e33462b48884463105d41d1d058da79c167aef460b2c70ee2a237020
                  • Opcode Fuzzy Hash: 715d91696d5f05c1d05fb450de7ca50a66ac6eb40b0d5cf0c54e9b46d7f48f02
                  • Instruction Fuzzy Hash: 0A41B2B2311A0096FB17DB57A8643D563A6BB4EBE0F184535BF198B7A5EF3CC4458380
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo
                  • String ID: f$p$p
                  • API String ID: 3215553584-1995029353
                  • Opcode ID: 46919a817da2534f5824c40397ea1c5d459151ac2c327dc55986b63d88954a0d
                  • Instruction ID: 2b112e5cc3b9fed0b3e6fc0e951df276abf5b814fa7f693cb19a1f86b623236f
                  • Opcode Fuzzy Hash: 46919a817da2534f5824c40397ea1c5d459151ac2c327dc55986b63d88954a0d
                  • Instruction Fuzzy Hash: 5912A07360414186FB26BE56E0547EAB6A2F3997E4FDC4015F7C247AE8D63DC7809B04
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID: prefix
                  • API String ID: 3668304517-2477885070
                  • Opcode ID: 0e4aa983185c1852e1d017b38383dafe2a0531d02685cdc7dab4165f0644b2c5
                  • Instruction ID: 7ee74934a6ccb17f949b4455a25dab5283cfa3cc9bc51289ddcf73f01baaccea
                  • Opcode Fuzzy Hash: 0e4aa983185c1852e1d017b38383dafe2a0531d02685cdc7dab4165f0644b2c5
                  • Instruction Fuzzy Hash: A402A932710A848AFB22DBA6D0403ED27B2E748BC8F445615EF5927BEADB78C595C344
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_task$Locinfo::_Locinfo_ctor
                  • String ID: false$true
                  • API String ID: 2740378190-2658103896
                  • Opcode ID: abc2807fcc9a3990018865eccb76438d26fc032f544cb797fc049037c0a27c05
                  • Instruction ID: ecb81626bd03e3a807474287880aa0c3bcef507e45b04215bfc02994481c7157
                  • Opcode Fuzzy Hash: abc2807fcc9a3990018865eccb76438d26fc032f544cb797fc049037c0a27c05
                  • Instruction Fuzzy Hash: 21B17F32615B8086E712DF22E8403DA77A4FB987C8F145625FF881BBAADF79C591C740
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: Resource section is empty$StringFileInfo$There is no resource section in module$Unable to determine product identifier from resources!
                  • API String ID: 0-3023212541
                  • Opcode ID: a29aeeb14d2df50d98afcdf1b0d4279c1eeb0476905c306e89f4bcb3cbedc810
                  • Instruction ID: cf6080c2011ba1a2cf470b03cb6a33f21a7d019162a361bb936239f857183a0e
                  • Opcode Fuzzy Hash: a29aeeb14d2df50d98afcdf1b0d4279c1eeb0476905c306e89f4bcb3cbedc810
                  • Instruction Fuzzy Hash: A5A1AB72A00B9086D710CF19E444B9AB7A1F799BB4FA58325EBBD437E4EB38C595C700
                  APIs
                    • Part of subcall function 0000000140079670: RtlAcquireSRWLockExclusive.NTDLL ref: 0000000140079680
                  • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 00000001400452F4
                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 0000000140045304
                  • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001400404CC), ref: 0000000140045311
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: HandleModule$AcquireAddressExclusiveLockProc
                  • String ID: ModuleId$ProductId$on_avast_dll_unload
                  • API String ID: 920030147-2425011003
                  • Opcode ID: 037e22b5e19308eba2705e2bfc324ad02dd89a86a19de993d254a0a7635cba5a
                  • Instruction ID: 323f4e85ebe704c904bfe2354bead2b7d203800df374dfaaa8868d3716c1b990
                  • Opcode Fuzzy Hash: 037e22b5e19308eba2705e2bfc324ad02dd89a86a19de993d254a0a7635cba5a
                  • Instruction Fuzzy Hash: 8B31B271220A8591EE13EF16E8517DA6321FB987C9F805221F38E576B6EF3CC648C740
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,?,00000000,0000000140086DF3,?,?,?,000000014007B7DE,?,?,00000000,000000014007B799), ref: 0000000140086C71
                  • GetLastError.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086C7F
                  • LoadLibraryExW.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086CA9
                  • FreeLibrary.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086D17
                  • GetProcAddress.KERNEL32(?,?,?,000000014007B7DE,?,?,00000000,000000014007B799,?,?,?,?,000000014007B225), ref: 0000000140086D23
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Library$Load$AddressErrorFreeLastProc
                  • String ID: api-ms-
                  • API String ID: 2559590344-2084034818
                  • Opcode ID: adb8888907e09ba1064ac421d20c92d4963af2ce4d1b24166459b60f3c77c598
                  • Instruction ID: e6687341ef8f3c7ba6c879ccf321d65f832a4f308149dadd61031be3b38f39b4
                  • Opcode Fuzzy Hash: adb8888907e09ba1064ac421d20c92d4963af2ce4d1b24166459b60f3c77c598
                  • Instruction Fuzzy Hash: F631AE32312B4091EE27DF67A8007A933A4FB4CBE5F5A0925BF994B7A0EF78D5408300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                  • String ID: CONOUT$
                  • API String ID: 3230265001-3130406586
                  • Opcode ID: 87ff61bf0eb5e7788eeeeeab0a9fcabd9a512a72c9e2d02dbeac0c991f3165b4
                  • Instruction ID: 372faba3a097c7d2f6a08d2073c60a5f207de366b8f73af6c1a75e1845f4a562
                  • Opcode Fuzzy Hash: 87ff61bf0eb5e7788eeeeeab0a9fcabd9a512a72c9e2d02dbeac0c991f3165b4
                  • Instruction Fuzzy Hash: BF115871314E8086E7528F57F84439AA3B0F79CFE4F144224EBA987BB4DB78D9948740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ByteCharMultiStringWide
                  • String ID:
                  • API String ID: 2829165498-0
                  • Opcode ID: 3557958d0ae3b78f9751d0b8b814af1337478352f741e81fc4db53b26dea7625
                  • Instruction ID: 6842bab0ad94cae96335bbfa1fc2af57c68baecb01e2109dcbb880e736b599f6
                  • Opcode Fuzzy Hash: 3557958d0ae3b78f9751d0b8b814af1337478352f741e81fc4db53b26dea7625
                  • Instruction Fuzzy Hash: 5A819672214B8086EB228F66E8503DA67E2FB89BE8F244615FB5D57BE4DF7CC4458700
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c16cbe06e57022fcb9eb00b63ed72328f14eb8be0c39fae87b8467141f4297a
                  • Instruction ID: 9b566be6c38d7f59c4d767b02cbd1e074424b53eb7bcce1e57e5e8e23f6a8e27
                  • Opcode Fuzzy Hash: 7c16cbe06e57022fcb9eb00b63ed72328f14eb8be0c39fae87b8467141f4297a
                  • Instruction Fuzzy Hash: D7716932614AC09DEB229FB6D8503ED3B72F31939CF544606EF9817AAADB74C684C350
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                  • String ID:
                  • API String ID: 2081738530-0
                  • Opcode ID: 198bbccf348a905434221bb5f7dc1ad49d1d9e274a8e8bf475110d6e8ef405a1
                  • Instruction ID: 94f7ca4aff702e3f9992d92c36c271d965f3f5f725d085f13adeda8b124abf24
                  • Opcode Fuzzy Hash: 198bbccf348a905434221bb5f7dc1ad49d1d9e274a8e8bf475110d6e8ef405a1
                  • Instruction Fuzzy Hash: 74314F72381A4091EB17DB57E8513DA6362E78DBE4F280921EF8D477F5DA38C842C310
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_destroy$ByteCharMultiWide__std_exception_copy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 523040611-0
                  • Opcode ID: fa4dc23b3ad6e9fcd597a11a7ec9e68a2f6ac467085843f88b8659ce6f344d8a
                  • Instruction ID: 3d565eefd2a7b9f8ac1bc5355bbce57d79f68becd27fc65ae4ac525cdfedcfaf
                  • Opcode Fuzzy Hash: fa4dc23b3ad6e9fcd597a11a7ec9e68a2f6ac467085843f88b8659ce6f344d8a
                  • Instruction Fuzzy Hash: 9F417D72614B8481EB01DB26E44539E73A4F7887D4F505221FBAC437B5EB78C596C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                  • String ID:
                  • API String ID: 2081738530-0
                  • Opcode ID: 15ee7beeb097c68bc734869bcc63f727c70bbce813f3497d9f3b03ca5efdc9b0
                  • Instruction ID: 1c674c83286ae2aee47e831bf660798327e6f99cfac64260bd036f09269cd56b
                  • Opcode Fuzzy Hash: 15ee7beeb097c68bc734869bcc63f727c70bbce813f3497d9f3b03ca5efdc9b0
                  • Instruction Fuzzy Hash: C1312972744A4081EA22DB17F8913DAB3A1FB8CBD4F544A22BB9D47BB9DA38C5418740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_$Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                  • String ID:
                  • API String ID: 2294326227-0
                  • Opcode ID: 090e2651584242fbda00d00416eddefc7d35491b7b686caa8ee7eef954108abb
                  • Instruction ID: 5a6ca4d219850a1a36c42ee13ceabd503083a9a0d66260f7b46ad7ea63cf857b
                  • Opcode Fuzzy Hash: 090e2651584242fbda00d00416eddefc7d35491b7b686caa8ee7eef954108abb
                  • Instruction Fuzzy Hash: 8B311A71315A4481EA22DB27E8903DA73A1F78CBD4F584625BB9D47BF9DF38C9418700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                  • String ID:
                  • API String ID: 2081738530-0
                  • Opcode ID: 5b5e727d6f9bb57e30d2e841a7f4ec508acd135abc5a9031aa3e0aa538af0bb5
                  • Instruction ID: 2c81a413fcad2d477535b269f603ba3d39ed49fa78c093efb9e326bff0503961
                  • Opcode Fuzzy Hash: 5b5e727d6f9bb57e30d2e841a7f4ec508acd135abc5a9031aa3e0aa538af0bb5
                  • Instruction Fuzzy Hash: FA313C72305A8081EA12DB27F8913DAB3A1E78CBD4F584621BB9D4BBF9DE3CC5458700
                  APIs
                  • GetLastError.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 0000000140098817
                  • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009884D
                  • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009887A
                  • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009888B
                  • FlsSetValue.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 000000014009889C
                  • SetLastError.KERNEL32(?,?,?,0000000140091A99,?,?,?,?,000000014009A217,?,?,00000000,0000000140098926,?,?,?), ref: 00000001400988B7
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Value$ErrorLast
                  • String ID:
                  • API String ID: 2506987500-0
                  • Opcode ID: 7d3276344bc0c9b84c189718fe3c6237352cc154d7de042a69bf42044b124105
                  • Instruction ID: 58aba3e27b1ac579a9d9edacfe43c9ab3524d4413e3a170859a1a2ba7f8ea326
                  • Opcode Fuzzy Hash: 7d3276344bc0c9b84c189718fe3c6237352cc154d7de042a69bf42044b124105
                  • Instruction Fuzzy Hash: 35114F7070064082FA6BA7779A913EE62529B8C7F4F580B28BF7647BF6DE38C4014B11
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave_invalid_parameter_noinfo_noreturn
                  • String ID: Exception stack: $Module base:
                  • API String ID: 2008198395-3948699789
                  • Opcode ID: da24b52b3f46397d813f91a4cd6d684d5e8991d166ef78b384b64ff89428dca4
                  • Instruction ID: ce66e9ddc033545f6407d044a9ce76e1e69ea8023946881deb25b6c407eb24ca
                  • Opcode Fuzzy Hash: da24b52b3f46397d813f91a4cd6d684d5e8991d166ef78b384b64ff89428dca4
                  • Instruction Fuzzy Hash: B3D17E72A00B8085E726DF66D8403E977A0F79DBC8F109215EB4D1B7AAEF39C685C740
                  APIs
                  • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,000000014009C4B4), ref: 000000014009C637
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,000000014009C4B4), ref: 000000014009C6C1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ConsoleErrorLastMode
                  • String ID: @|Z
                  • API String ID: 953036326-2280643266
                  • Opcode ID: 9a7970f5ad25ba0cc72ceb65fdea28adc17d09fc76d9a74a9c055339a61bbc4e
                  • Instruction ID: 67242f7ddf94f2eece3f833f1a970e01786ae8192ca36f6c3b2749f4ec89bbe2
                  • Opcode Fuzzy Hash: 9a7970f5ad25ba0cc72ceb65fdea28adc17d09fc76d9a74a9c055339a61bbc4e
                  • Instruction Fuzzy Hash: AC91D1B2B24A5489FB62CFA79480BED6BA0F34CBD8F545106EF4A57AB5CB34C485C710
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: File__std_exception_copy__std_exception_destroy$CloseCreateErrorExceptionHandleHeaderLastRaiseXtime_get_ticks
                  • String ID: couldn't open file
                  • API String ID: 1114502772-3645828643
                  • Opcode ID: 7c8b22423497cd5fcf71eb43bec814ad0144a45b29ae167b955e874da053ca90
                  • Instruction ID: 319782d7b28b5739e7981c1199afd861e8d5b3003aa0c3de4c322a0093fa346b
                  • Opcode Fuzzy Hash: 7c8b22423497cd5fcf71eb43bec814ad0144a45b29ae167b955e874da053ca90
                  • Instruction Fuzzy Hash: 5171E272704B5882EA15DB16B8153E9A3A5F7897E4F128232BFAE477E4EB3CD441C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide
                  • String ID: to_narrow<wchar_t> invalid arguments$to_narrow<wchar_t>::WideCharToMultiByte
                  • API String ID: 626452242-1534530176
                  • Opcode ID: 72503945ac01bfc4329ed9d87c037f900e34af3ca36075de242b687c440cbc09
                  • Instruction ID: d6c6e307881a8f992393d6b62ca8f95ca68037eb04720d2ebeda1b4a9b1c9100
                  • Opcode Fuzzy Hash: 72503945ac01bfc4329ed9d87c037f900e34af3ca36075de242b687c440cbc09
                  • Instruction Fuzzy Hash: BD61AF72604A8481EB129F1AE4803D977A0F799BD4F64412AFB9907AF9DF38CD92C740
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: false$integral cannot be stored in char$true
                  • API String ID: 0-219347480
                  • Opcode ID: 414494b3c16a6699bf9a620f3f59aaaaf1085228148d12dab47a966e1c410d2a
                  • Instruction ID: 8bdec9e6d27b5e176ae8c7e45078ecab331386496d937ac09da921fbd89a2f82
                  • Opcode Fuzzy Hash: 414494b3c16a6699bf9a620f3f59aaaaf1085228148d12dab47a966e1c410d2a
                  • Instruction Fuzzy Hash: 1D715872704B8489EB12CF6AD4513DC3361E749BD8F14421AEF5D17BA9DB38C95AC341
                  APIs
                  • RtlInitializeCriticalSection.NTDLL ref: 000000014005E943
                    • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B0
                    • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B6
                    • Part of subcall function 0000000140079580: RtlAcquireSRWLockExclusive.NTDLL ref: 00000001400795D0
                    • Part of subcall function 0000000140079580: RtlReleaseSRWLockExclusive.NTDLL ref: 00000001400795E0
                  • RtlEnterCriticalSection.NTDLL ref: 000000014005E9B1
                  • RtlLeaveCriticalSection.NTDLL ref: 000000014005EA60
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$Concurrency::cancel_current_taskExclusiveLock$AcquireEnterInitializeLeaveRelease
                  • String ID: DataFolder$Singleton already destroyed
                  • API String ID: 299831208-793623586
                  • Opcode ID: 70bd86f110884df4e1785b7eafbc3f5d60e84e0131820b3f25bc122850874676
                  • Instruction ID: f9c2ae39cd048764f1b1a1c505b2fb8f70154a92a940e39ce9cae4f8c5b15387
                  • Opcode Fuzzy Hash: 70bd86f110884df4e1785b7eafbc3f5d60e84e0131820b3f25bc122850874676
                  • Instruction Fuzzy Hash: F3712C32616B8486EA56DF22E890399B3B4F78CBD0F548129EB8D43775EF39D491C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: QueryValue$ExceptionFileHeaderRaise
                  • String ID: Cannot query registry data due to value changed too often$Cannot query registry value data$Cannot query registry value size
                  • API String ID: 1209918281-756855248
                  • Opcode ID: cdfc8d8dec3e0aceed18b92c2a090a35b64572d05e06943e6087fc05a855b88f
                  • Instruction ID: e890d0c149b90de7ec06307b22622564639cb7c1eb9132f914ba7199c8ac07c1
                  • Opcode Fuzzy Hash: cdfc8d8dec3e0aceed18b92c2a090a35b64572d05e06943e6087fc05a855b88f
                  • Instruction Fuzzy Hash: B0714A72618B8096EB11CF26E4503DEBBB0F7987C8F505116FB8957A79DB38E584CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: QueryValue$ExceptionFileHeaderRaise
                  • String ID: Cannot query registry data due to value changed too often$Cannot query registry value data$Cannot query registry value size
                  • API String ID: 1209918281-756855248
                  • Opcode ID: 6751fffad8c0006ff87c85d87a78f51a0e4f473fb89e5397368257717576fc6b
                  • Instruction ID: d514a2feefedc57c96a96d79bb10e2e3ea0c90f8cd4c3be355e16a948fc1715b
                  • Opcode Fuzzy Hash: 6751fffad8c0006ff87c85d87a78f51a0e4f473fb89e5397368257717576fc6b
                  • Instruction Fuzzy Hash: F8513572614B848AEB11CF6AE8803DEB7A4F789BC4F504526FB8843B68DF38D555CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
                  • String ID: bad locale name
                  • API String ID: 2967684691-1405518554
                  • Opcode ID: aa3cac9b3afc0d7d72fb7aa3733a8dd6ac9cd9b0bd3536bb37a82acffe86e78f
                  • Instruction ID: 0ddadadbcd5eafeab6b5e1e4eb9906aac0567c7b603df310d8fa229e127ad581
                  • Opcode Fuzzy Hash: aa3cac9b3afc0d7d72fb7aa3733a8dd6ac9cd9b0bd3536bb37a82acffe86e78f
                  • Instruction Fuzzy Hash: 0A514832B45B808AEB12DFB2E4803ED7375FB98788F144515EF8927A66EB34D555C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseErrorExceptionFileHeaderLastOpenQueryRaiseValue__std_exception_copy
                  • String ID: Cannot query registry value
                  • API String ID: 2471027143-1100310711
                  • Opcode ID: b4f45b8d46c78af4719a31ad7011067c5d62a3d89bb104fbee140b35cca76be6
                  • Instruction ID: 04ebbc1ad51d44f6911fa77968d2cf9d6d5af23c0ee17b3da5f7f2288a28212d
                  • Opcode Fuzzy Hash: b4f45b8d46c78af4719a31ad7011067c5d62a3d89bb104fbee140b35cca76be6
                  • Instruction Fuzzy Hash: F4415B72218B8086EB11DF26E59039A73B5F78CBC0F605525EB9943B69EF39C964CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Create$CloseErrorLast
                  • String ID: Cannot create registry key
                  • API String ID: 3551974399-2366797263
                  • Opcode ID: 3ec95448bdc617c482522325469cceee4e515c8a8735681f6ca8fa9e47f5c220
                  • Instruction ID: 3eb822ce1125e0bffa799eb2f2375e9dd5885ae909aee2e2e6b8cb74dd9c23c2
                  • Opcode Fuzzy Hash: 3ec95448bdc617c482522325469cceee4e515c8a8735681f6ca8fa9e47f5c220
                  • Instruction Fuzzy Hash: F5411872618B8086E761CF65E8907CE77B4F788798F10452AEF8957A68DF38C595CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Server$Register$Protseq
                  • String ID: ncalrpc
                  • API String ID: 1860028169-2983622238
                  • Opcode ID: 4566a10439cefd2c14e989e83b89a395e60d9820173bb6aa9ef00cc5247a4b76
                  • Instruction ID: 10cee73c4aa8f6cdb9266569f3072bc1e783d4a374773acd5f6aefa3e8576cce
                  • Opcode Fuzzy Hash: 4566a10439cefd2c14e989e83b89a395e60d9820173bb6aa9ef00cc5247a4b76
                  • Instruction Fuzzy Hash: 74115EB2214A4182F722CF22F894BC677A1F79C788F844126E78993974DB7CC508CB44
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3668304517-0
                  • Opcode ID: fee4fbc3e24080502c11db0b4f51419df4899d4d6d64c79ff5143d57b816f531
                  • Instruction ID: 47ab0e778c3cae299a7c4feb092146cd11f42151b130c6dcfc262edc7dbf75bc
                  • Opcode Fuzzy Hash: fee4fbc3e24080502c11db0b4f51419df4899d4d6d64c79ff5143d57b816f531
                  • Instruction Fuzzy Hash: 76E16772B10B8486EB16CF6AE4443DD63B2F748BD8F149616EF5817BA9DB38C594C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _set_statfp
                  • String ID:
                  • API String ID: 1156100317-0
                  • Opcode ID: 123615ce69416e293d68908fa560a63ae141a92441ef9de540260bc5543d7e22
                  • Instruction ID: 0fd36dd1a82220153425df396268225fb20c3ec40fe76be7d1705e5a7e7cb260
                  • Opcode Fuzzy Hash: 123615ce69416e293d68908fa560a63ae141a92441ef9de540260bc5543d7e22
                  • Instruction Fuzzy Hash: 58818332604A8449F6779F3BA4543EAB7A0EF5F3D4F094205BF9A275B5DB3CC5828A40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3939952210-0
                  • Opcode ID: b3ba6bb0e34398673ff49c1a4f1d5b5dfce54e4fc739281dc3ad6e0765d69aac
                  • Instruction ID: 0be40fc27ae5d9ae9e0b2865981b49cc38d1d78e8dc0d529cec524be7ca832d3
                  • Opcode Fuzzy Hash: b3ba6bb0e34398673ff49c1a4f1d5b5dfce54e4fc739281dc3ad6e0765d69aac
                  • Instruction Fuzzy Hash: 6E413732B11B8499EB01CF66E4813DD33B4F798788F508626EB4C57AA9EF34D6A5C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3939952210-0
                  • Opcode ID: 1f2a8305fef613a7b7c1366366916cb242077bafb53b71d12d9c566d9e90576e
                  • Instruction ID: 91d5117f9bfe9cdd505eb2f9f603e5257e56c558e9ab816fce1fdd8bc0944e41
                  • Opcode Fuzzy Hash: 1f2a8305fef613a7b7c1366366916cb242077bafb53b71d12d9c566d9e90576e
                  • Instruction Fuzzy Hash: 8B412632611B84A9EB01DF66E5903DC33B4F798788F408622FB4C57AA9EF74D6A5C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3939952210-0
                  • Opcode ID: ca7198a35c09b8c2a1d2652aacee97b22971d12ad1cb2bd0ba02b99a3693a14e
                  • Instruction ID: 19c0f644c5996321750162594ffae60b48271a7043ee4a7134125f2171f1065a
                  • Opcode Fuzzy Hash: ca7198a35c09b8c2a1d2652aacee97b22971d12ad1cb2bd0ba02b99a3693a14e
                  • Instruction Fuzzy Hash: AD413632611B8499EB01CF66E5903DC33B5F758788F408626EB9C17AAAEF34D2A5C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3939952210-0
                  • Opcode ID: 733ddc207bc49f335a72192dd71da86b5e8d69a8a103fe2191a10c6033290cc1
                  • Instruction ID: 196861a57875547a2a3d103c6ad5802c7914acbd5c03a4b87542c4cf7168f1df
                  • Opcode Fuzzy Hash: 733ddc207bc49f335a72192dd71da86b5e8d69a8a103fe2191a10c6033290cc1
                  • Instruction Fuzzy Hash: 85413472611B84A9EB01DF66E4803DC33B5F758798F408226FB9C17BA9EB74D6A5C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy$_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 3939952210-0
                  • Opcode ID: be3464c3a08c349efedf0c46838e7046ce6e4dc2cd6b47540c023e9fa3259f76
                  • Instruction ID: abe57ed7e5c95b63a7758696159104acb2f8c7d7a7bc1f745aec086952ebb880
                  • Opcode Fuzzy Hash: be3464c3a08c349efedf0c46838e7046ce6e4dc2cd6b47540c023e9fa3259f76
                  • Instruction Fuzzy Hash: D1412432611B84A9EB01CF66E4803DC33A4F79879CF408226EB4C57AA9EF34D6A5C344
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 2067211477-0
                  • Opcode ID: e5870b07309b9fb3d5724a213b615b567d52ca05316e70d13df25f9b5f570b04
                  • Instruction ID: 965a1335f200944b60dada93899e7ebfd69b977873099df52df0a6ea16f698bd
                  • Opcode Fuzzy Hash: e5870b07309b9fb3d5724a213b615b567d52ca05316e70d13df25f9b5f570b04
                  • Instruction Fuzzy Hash: 32211F76205B4082EE5AAF67A4513EA73A0BBACFD4F144526FF4947BA5DF38C640C700
                  APIs
                  • FlsGetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 00000001400988EF
                  • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 000000014009890E
                  • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098936
                  • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098947
                  • FlsSetValue.KERNEL32(?,?,?,000000014008808F,?,?,00000000,000000014008832A,?,?,?,?,?,00000001400882B6), ref: 0000000140098958
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Value
                  • String ID:
                  • API String ID: 3702945584-0
                  • Opcode ID: 1242a127319296256211208d7fb47c39d8199e86aaa36262febbd3c5ce4f9c16
                  • Instruction ID: bfec05fd07b564d1a0d2a0394d3f9ac12f52d9618567ebabe614c443833c668e
                  • Opcode Fuzzy Hash: 1242a127319296256211208d7fb47c39d8199e86aaa36262febbd3c5ce4f9c16
                  • Instruction Fuzzy Hash: 0911427030464482FAAA9737A6913F962419B8C7F4F5C4724BF7A477F6DE38C4018B02
                  APIs
                  • RtlInitializeCriticalSection.NTDLL ref: 0000000140053C73
                    • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B0
                    • Part of subcall function 0000000140079580: Concurrency::cancel_current_task.LIBCPMT ref: 00000001400795B6
                    • Part of subcall function 0000000140079580: RtlAcquireSRWLockExclusive.NTDLL ref: 00000001400795D0
                    • Part of subcall function 0000000140079580: RtlReleaseSRWLockExclusive.NTDLL ref: 00000001400795E0
                  • RtlEnterCriticalSection.NTDLL ref: 0000000140053CE1
                  • RtlLeaveCriticalSection.NTDLL ref: 0000000140053DAF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$Concurrency::cancel_current_taskExclusiveLock$AcquireEnterInitializeLeaveRelease
                  • String ID: Singleton already destroyed
                  • API String ID: 299831208-257684709
                  • Opcode ID: 7c6f20288bbf5095be689e7122dd872f908856bf7fa0d0142f9cf8bb55b22af9
                  • Instruction ID: 4b35a25cb3c4676208d3a52ba88c4e2f7e65f3b440d398bc6bcd8edda79aa7a5
                  • Opcode Fuzzy Hash: 7c6f20288bbf5095be689e7122dd872f908856bf7fa0d0142f9cf8bb55b22af9
                  • Instruction Fuzzy Hash: 9D716A32611B8086EB56CF22E8903A9B3B4F79CB84F558225EB8D43775EF39D4A1C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                  • String ID: n once
                  • API String ID: 1944019136-284773441
                  • Opcode ID: ce6991487a4218bd576e611f7037e5cbbe3899e4f8cc35503520b7f070ed61ce
                  • Instruction ID: 5dc7f5d92bccd6774901fa63c351214304673952db77c16a97a7a1ee0dbacc22
                  • Opcode Fuzzy Hash: ce6991487a4218bd576e611f7037e5cbbe3899e4f8cc35503520b7f070ed61ce
                  • Instruction Fuzzy Hash: 12516972611B8489EB12CF7AE8543DD3366EB49BD8F509611AB5C07BEADF78C181C300
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                  • String ID: ($/
                  • API String ID: 1944019136-2468745909
                  • Opcode ID: 2b0b3099e6005553687e055680946745d6231b4c04129d9763468462212361d5
                  • Instruction ID: 0464f1527052c086c2319fab285b9ceaf66ebf46eb78baafa60bfd9882813a2a
                  • Opcode Fuzzy Hash: 2b0b3099e6005553687e055680946745d6231b4c04129d9763468462212361d5
                  • Instruction Fuzzy Hash: B551BE72215B8081FB02CB6AE49439EB3A1E789BE4F105615FBAD477EADF7CC0848700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
                  • String ID: bad locale name
                  • API String ID: 2775327233-1405518554
                  • Opcode ID: 1414991dbdecf56344e52e0e0c32b67c05f8fda9118dd4dbe854212d07a6a867
                  • Instruction ID: 4b21ec1d3f5d05d5fbb28de49515162a2d6aca5fef3022fe2805013068dcbc0d
                  • Opcode Fuzzy Hash: 1414991dbdecf56344e52e0e0c32b67c05f8fda9118dd4dbe854212d07a6a867
                  • Instruction Fuzzy Hash: BB411532716A80D9EB56DF62E4913EE33A4EB48788F044425EF4927EAADF34C525D344
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Lockit$Locinfo::_Locinfo_ctorLockit::_Lockit::~_
                  • String ID: bad locale name
                  • API String ID: 2775327233-1405518554
                  • Opcode ID: 67334affb38956a56cdcccb68bfac42c5f3a00cad1a36b976b3c7baf7da2d873
                  • Instruction ID: 1b4047c68961f6d1163d1ec08fe634b61fb2381447eb18497c5d1b166cf7dcd0
                  • Opcode Fuzzy Hash: 67334affb38956a56cdcccb68bfac42c5f3a00cad1a36b976b3c7baf7da2d873
                  • Instruction Fuzzy Hash: 05416832316B80C9EB16DFB2E4917ED33A4EB48788F044425EF496BAAADF35C525D344
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorFileLastWrite
                  • String ID: @|Z$U
                  • API String ID: 442123175-2687595095
                  • Opcode ID: 48194efef41d634dfaafc76d3ac8d096a32dcf7b3a92be0930006c4cd2cb2571
                  • Instruction ID: 0471a06396b1ad8b7ae2f15c87dca4ada56b6efaa703bd25428672b7ac151f78
                  • Opcode Fuzzy Hash: 48194efef41d634dfaafc76d3ac8d096a32dcf7b3a92be0930006c4cd2cb2571
                  • Instruction Fuzzy Hash: F041A272724A8486EB21DF66E4447EA67A0F79C7C4F948021EF8D87BA8DB3CC541C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy_invalid_parameter_noinfo_noreturn
                  • String ID: C$O
                  • API String ID: 1109970293-2585155372
                  • Opcode ID: 53e7129cb027607950035b9adad8961daa4b36f300ac358a440e50e719d15978
                  • Instruction ID: be6445adadab469562bc0324a6a1ac9beb165ce9228a46a260c9a1a5fa40831e
                  • Opcode Fuzzy Hash: 53e7129cb027607950035b9adad8961daa4b36f300ac358a440e50e719d15978
                  • Instruction Fuzzy Hash: 34313C72514B8482E7128B2AE4513E97760FB9DBD8F505216FB9C437B6EB7CC195C310
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: EnvironmentErrorLastVariable
                  • String ID: -$Unable to retrieve environment variable '{}'!
                  • API String ID: 3114522214-584169599
                  • Opcode ID: 527f662b23c1b4a882dbf7370019445303981129e745c3a8f1c2050ea109a79a
                  • Instruction ID: f5d8d70390093e31130ea3b6e30c320d89e7b569c4f444a5908d59a2e5c8d7e2
                  • Opcode Fuzzy Hash: 527f662b23c1b4a882dbf7370019445303981129e745c3a8f1c2050ea109a79a
                  • Instruction Fuzzy Hash: F0212832618B8481E751DB22E85539AB3A5FB8CBC4F504125BBCD43669EF3CD5958B40
                  APIs
                    • Part of subcall function 0000000140055880: RtlInitializeCriticalSection.NTDLL ref: 00000001400558C1
                    • Part of subcall function 0000000140055880: RtlDeleteCriticalSection.NTDLL ref: 00000001400558DA
                    • Part of subcall function 0000000140055880: RtlEnterCriticalSection.NTDLL ref: 0000000140055937
                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559A4
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559C5
                  • RtlLeaveCriticalSection.NTDLL ref: 00000001400559EF
                  Strings
                  • asw::lifetime::impl::lifetime_creation_monitor_holder::set_created, xrefs: 0000000140055A10
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$CloseDeleteEnterEventHandleInitializeLeave
                  • String ID: asw::lifetime::impl::lifetime_creation_monitor_holder::set_created
                  • API String ID: 3040484998-3605786268
                  • Opcode ID: a97a8769dbe6fd78ecf7b1a42f8fdec5e0d80cc19b8db7cc52d4824e9a28bc80
                  • Instruction ID: 4938b172fda1cedb61a9709e50ad8186f7bef5d74812dc94d7dba1a726f99d2a
                  • Opcode Fuzzy Hash: a97a8769dbe6fd78ecf7b1a42f8fdec5e0d80cc19b8db7cc52d4824e9a28bc80
                  • Instruction Fuzzy Hash: 43213A32204B4482EB12EF26E8A43A963B4FB8CBD4F644521EB5D476B5DF78D891C740
                  APIs
                  • CreateEventW.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565A0
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565C3
                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000000140056447), ref: 00000001400565E3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseCreateErrorEventHandleLast
                  • String ID: Cannot create event
                  • API String ID: 937152468-3475436419
                  • Opcode ID: 85e723dc28051c9128e89b5ef90c266e87eb60135b79c33272b5393e587c48b7
                  • Instruction ID: 8c3f2093b324fccf10d60abad5a9520c9baf034ca4899f78ebf9708e01a9c787
                  • Opcode Fuzzy Hash: 85e723dc28051c9128e89b5ef90c266e87eb60135b79c33272b5393e587c48b7
                  • Instruction Fuzzy Hash: 0D118B31302E8682EF27DBA2A8103D963A1BB4CB84F480425AB8D43B74EF7CD515C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseDeleteErrorLastOpenValue
                  • String ID: Cannot delete registry value
                  • API String ID: 1963916417-4063604081
                  • Opcode ID: 67389c08b5669c2787062dd8f1e903ed67bb6e7db85a2c69f7914face2663579
                  • Instruction ID: 506817aa63d746383d21c3308bf371876a7f944bd3a9b96990b4554b18483697
                  • Opcode Fuzzy Hash: 67389c08b5669c2787062dd8f1e903ed67bb6e7db85a2c69f7914face2663579
                  • Instruction Fuzzy Hash: 04118272628B8082EB11DB62F45539A73B4FBCD7C4F405915BA8D43675DF3CC5448B00
                  APIs
                    • Part of subcall function 000000014005A7A0: RegOpenKeyExW.ADVAPI32 ref: 000000014005A871
                  • RegDeleteTreeW.ADVAPI32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B01
                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B2F
                  • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,000000014005996C), ref: 0000000140059B3B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseDeleteErrorLastOpenTree
                  • String ID: Cannot delete registry key tree
                  • API String ID: 321458958-3455289483
                  • Opcode ID: a3ded7c5a9c98ec971dc730303bf7900f9e99ad81b66e9a2e0dad1d390e19f4e
                  • Instruction ID: 9cea434b4cbf3e4c222e52f50331696bd945e54bcaac784f61492dfacb5b65a7
                  • Opcode Fuzzy Hash: a3ded7c5a9c98ec971dc730303bf7900f9e99ad81b66e9a2e0dad1d390e19f4e
                  • Instruction Fuzzy Hash: 6C018072628F8082EA21EB72F85539AA3A0FBCD784F401A15B68D93675EF3CC1448B00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: RtlDllShutdownInProgress$ntdll.dll
                  • API String ID: 1646373207-582119455
                  • Opcode ID: 486b237c5a67cd82c74454a3fea0250b3484a4e9cd859289d73c8fac4d6443f3
                  • Instruction ID: 0f3b9b58c82f9aa9ab337f3f0cfcadf00547ac744fe9edc45628ac7a7d5f9fd8
                  • Opcode Fuzzy Hash: 486b237c5a67cd82c74454a3fea0250b3484a4e9cd859289d73c8fac4d6443f3
                  • Instruction Fuzzy Hash: C2D0C974622E00E1E607AF47EC553D43271B74C791FD00515D60A03330AF3CD55AC740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FileWrite$ConsoleErrorLastOutput
                  • String ID:
                  • API String ID: 2718003287-0
                  • Opcode ID: 40bd82a7c78bf1289091e82a3ee2415cba04c08fad2a586ea6ade76a6e5a6c9c
                  • Instruction ID: 19c48ec83b0aa6899f29b94af066237a63b485f59a4bf98e1bf1d6ef42a76257
                  • Opcode Fuzzy Hash: 40bd82a7c78bf1289091e82a3ee2415cba04c08fad2a586ea6ade76a6e5a6c9c
                  • Instruction Fuzzy Hash: B7D1EE72B14A848AE712CFBAD5403DD3BB5F348BE8F544216EF9997BA9DA34C416C700
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014003B1A9), ref: 0000000140028ED2
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014003B1A9), ref: 0000000140028F12
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide
                  • String ID: to_wide<char> invalid arguments$to_wide<char>::MultiByteToWideChar
                  • API String ID: 626452242-363086301
                  • Opcode ID: c7c08583812b46095b61781c5ffed97884927f8ba22f2713555a0cc6983142a8
                  • Instruction ID: 4d8cc23a3861524033b35381a912b0fc51dcb5d9570516251ee907262d4b9398
                  • Opcode Fuzzy Hash: c7c08583812b46095b61781c5ffed97884927f8ba22f2713555a0cc6983142a8
                  • Instruction Fuzzy Hash: FB410F32215B8481EB629F02E5403E973A1FB98BD8F141139BF5E07AB5EF38C992C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseErrorInfoLastOpenQuery
                  • String ID:
                  • API String ID: 4026330008-0
                  • Opcode ID: cda00aa15a7f34e4a25872eaeea430025bd5d75f5a785da38cf24a26c16a6e6b
                  • Instruction ID: a71bdfb01883035fc8546c3d1f1f35ec8381dc35e6c8e93d0c80b9c088452a08
                  • Opcode Fuzzy Hash: cda00aa15a7f34e4a25872eaeea430025bd5d75f5a785da38cf24a26c16a6e6b
                  • Instruction Fuzzy Hash: F6311D32218B8486EB61CF56F49979AB3A8F7887C0F644126EBD943B64DF39C551CB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$Leave$CloseCreateDeleteEnterEventHandleInitialize
                  • String ID:
                  • API String ID: 3435541109-0
                  • Opcode ID: 27da87d7525a020086e45bc55bec4e685603b6a503a6185e878488744b99e3b4
                  • Instruction ID: 85fc1c0a83deffbb265eef27bece4194f1a6fa20c55c05c7cdf3801a246b2988
                  • Opcode Fuzzy Hash: 27da87d7525a020086e45bc55bec4e685603b6a503a6185e878488744b99e3b4
                  • Instruction Fuzzy Hash: E4316A72214B8086F763DF22F85079A77A4F78C7D8F188611BB8957AA5DF38D491C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ConditionMask$InfoVerifyVersion
                  • String ID:
                  • API String ID: 2793162063-0
                  • Opcode ID: 452efdd4f692d1e884ec315b98b4abd69929eecd61e40fe0fb36c871c85bc769
                  • Instruction ID: 013a3806318f21c79f943d46fcd361c2d7bcf03c60229824e0722f46477d8758
                  • Opcode Fuzzy Hash: 452efdd4f692d1e884ec315b98b4abd69929eecd61e40fe0fb36c871c85bc769
                  • Instruction Fuzzy Hash: E3114F3261568496E731CF22F4457DAB3A0FB8CB84F118625EB9947B64EB3CD645CF40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy
                  • String ID:
                  • API String ID: 2960854011-0
                  • Opcode ID: 6733e03be22301ba3ef0e99c153bae17e299ab6a1f83f2e860b0a71dd9607e63
                  • Instruction ID: f0bb4adc6b4dd4a7cf9654619226c9556f9994f544bcbf27281b2ab3b3870acc
                  • Opcode Fuzzy Hash: 6733e03be22301ba3ef0e99c153bae17e299ab6a1f83f2e860b0a71dd9607e63
                  • Instruction Fuzzy Hash: FA118C32624B4481EB01DF25E48539D77A4F798BC4F604125FB9D4376AEF38C996C750
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy
                  • String ID:
                  • API String ID: 2960854011-0
                  • Opcode ID: 542e6935168dbd11bc08cd37ad643b41faa539432d4ebbdd17dca4974c99cdd3
                  • Instruction ID: 267324faae7d233520a0d8ed61557ded62087f4cbaf681df3e553709503b3392
                  • Opcode Fuzzy Hash: 542e6935168dbd11bc08cd37ad643b41faa539432d4ebbdd17dca4974c99cdd3
                  • Instruction Fuzzy Hash: 99118C32624B4481EB01DF25E48139D77A4F79CBC4F608125FB9D0376AEB38C996C710
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy
                  • String ID:
                  • API String ID: 2960854011-0
                  • Opcode ID: 62d9a73a0acf46c2332e574337326d1331295c8d0383671e655a7c7e699e0e44
                  • Instruction ID: b5265a7ec846762b022f962f9ebdac92f0270735d81d900c28c8e7686cf911af
                  • Opcode Fuzzy Hash: 62d9a73a0acf46c2332e574337326d1331295c8d0383671e655a7c7e699e0e44
                  • Instruction Fuzzy Hash: 23214C32224B8481EB01DF21E88539D73A5F788BC4F614225FB9D43765EF38C596C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: __std_exception_copy__std_exception_destroy
                  • String ID:
                  • API String ID: 2960854011-0
                  • Opcode ID: 7999edc1383b33dbfdbcd54aa8cc89eb2e311b35a0c690bbd6ad3fcad860ae34
                  • Instruction ID: 4deb287e485d9cc7c8d53c793f4b7463465d4c3e62d044c8a5e6476d11d8e03a
                  • Opcode Fuzzy Hash: 7999edc1383b33dbfdbcd54aa8cc89eb2e311b35a0c690bbd6ad3fcad860ae34
                  • Instruction Fuzzy Hash: 05211832624B4481EB01DF25E88539D73A9F788BD4FA54225FB9D4776AEF38C592C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Concurrency::cancel_current_taskExclusiveLock$AcquireRelease
                  • String ID:
                  • API String ID: 1304602613-0
                  • Opcode ID: 84bb316eac59f392674c0bccf319f6d6d28f957edd07f7beb69ef115125f1a9f
                  • Instruction ID: 0dce682ebe817e32d61f8728b318b500aeceaf637d429e04cada650a5c2243ad
                  • Opcode Fuzzy Hash: 84bb316eac59f392674c0bccf319f6d6d28f957edd07f7beb69ef115125f1a9f
                  • Instruction Fuzzy Hash: 44F06D70611C0591FE17AB63A8157E522B09B5C7B0F580A10BB79471F2EA3CC496C310
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: nan
                  • API String ID: 0-1810114945
                  • Opcode ID: a11dce36ecbdafa46039370b2097645fba5a46745698a1cbb76e0880d5fd8821
                  • Instruction ID: 0e9de96d5d1ff602d59062be2b7c4507a33184d965af0a6b98dc4c34342b0870
                  • Opcode Fuzzy Hash: a11dce36ecbdafa46039370b2097645fba5a46745698a1cbb76e0880d5fd8821
                  • Instruction Fuzzy Hash: ED028BB2604BC489EB62CF2AE4803ED3BA1F7597D8F509216FB4947BA9DB74C581C310
                  APIs
                  • __std_fs_convert_narrow_to_wide.LIBCPMT ref: 0000000140025C1B
                    • Part of subcall function 0000000140062898: MultiByteToWideChar.KERNEL32 ref: 00000001400628B4
                    • Part of subcall function 0000000140062898: GetLastError.KERNEL32 ref: 00000001400628C2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ByteCharErrorLastMultiWide__std_fs_convert_narrow_to_wide
                  • String ID: \u{$\x{
                  • API String ID: 1033888727-3325273574
                  • Opcode ID: ae328bf1be006d6752bff118feeef84db8402c3f6fcce22a48d6b254611e15d3
                  • Instruction ID: 54a2823de4257917c54320cb21ca7cf787ad5b1ae14b123a1386ac876b94e2fe
                  • Opcode Fuzzy Hash: ae328bf1be006d6752bff118feeef84db8402c3f6fcce22a48d6b254611e15d3
                  • Instruction Fuzzy Hash: 5E024A72604B8886DB169F26D5903AD7B61F348FC9F948516EF5E033A8DF38C856C354
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in wchar_t
                  • API String ID: 0-1689078516
                  • Opcode ID: b2893074f87381b3bfe03490b58b747f50e7b23f689dc4be389cbe9dfe34f12b
                  • Instruction ID: 7f534a460b2e3e69ceffbc228a422ce7ce83d315cc88fab3d6e8895a6351ad92
                  • Opcode Fuzzy Hash: b2893074f87381b3bfe03490b58b747f50e7b23f689dc4be389cbe9dfe34f12b
                  • Instruction Fuzzy Hash: C7E192B2B14B8485EB22CB6AF4407ED77A1F7487D8F508116EB9E17BA9DB38C585C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in char
                  • API String ID: 0-960316848
                  • Opcode ID: de3f9bbb75f06938dda710c6efef91e6c5b368340e744e9b07a28b2e26b52ac5
                  • Instruction ID: 53947a9d27e19c6f0efc18f476bfc996490f820c94bca11df3eac56f3b26ff61
                  • Opcode Fuzzy Hash: de3f9bbb75f06938dda710c6efef91e6c5b368340e744e9b07a28b2e26b52ac5
                  • Instruction Fuzzy Hash: 4CE1C272614B8495EB22CBAAE4503ED77A1F7487D4F50851AFB9D13BB8DB38C984C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in wchar_t
                  • API String ID: 0-1689078516
                  • Opcode ID: 8ca15a9393aa8e6eb612ff0fba9b85bf37b20341f5a6997befa598268c2b8718
                  • Instruction ID: f3069717cfdafdd280e1c1ab3f26c5eca656a1b41689258997a484e0637ade87
                  • Opcode Fuzzy Hash: 8ca15a9393aa8e6eb612ff0fba9b85bf37b20341f5a6997befa598268c2b8718
                  • Instruction Fuzzy Hash: 02E1E432714B8489EB16CB6AE4403ED77B1F7887C8F548116FB990BBAADB39C545C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in char
                  • API String ID: 0-960316848
                  • Opcode ID: d0d2e916398f6898de0923c58e3c77d0ec866c883e4f6f62d43be85d5bfc6e1d
                  • Instruction ID: d21b3c0728488a04d0f0e3c182603a63497a7304f0bd80a36175043157c340ad
                  • Opcode Fuzzy Hash: d0d2e916398f6898de0923c58e3c77d0ec866c883e4f6f62d43be85d5bfc6e1d
                  • Instruction Fuzzy Hash: 45E1C272614BD489EB22CB6AE4407ED77A1F7887D4F50411AEB9E13BB9DB38C985C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in wchar_t
                  • API String ID: 0-1689078516
                  • Opcode ID: 6e5655417842cec83c6c31e054ae60070a1cb284b4648287c0c18fd5079e7d29
                  • Instruction ID: 177f1ddbb5c8bb6812cf0caabf67a1115521c4c1a6353a107d4e0cf6bb5ac0da
                  • Opcode Fuzzy Hash: 6e5655417842cec83c6c31e054ae60070a1cb284b4648287c0c18fd5079e7d29
                  • Instruction Fuzzy Hash: 1EE1C2B2B04B8489EB22CB6AE4407ED77A1F7897D4F508116EB9D17BA9DB38C585C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in char
                  • API String ID: 0-960316848
                  • Opcode ID: dd939a103b95df8a5a583a298043b0a1e500fba652d1453b2587984992a50253
                  • Instruction ID: afb9f644a45fe65091148028d645abc2b9e5c2307c5cdcbedacd16938f3a67f8
                  • Opcode Fuzzy Hash: dd939a103b95df8a5a583a298043b0a1e500fba652d1453b2587984992a50253
                  • Instruction Fuzzy Hash: 5FE18332614B8489EB22CBAAE4403ED77B1F7997D4F54411AEB9D13BB9DB38C985C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in wchar_t
                  • API String ID: 0-1689078516
                  • Opcode ID: ff47a51abcea04dad4cf6a7afb91ea76228fbdcaed751e7c2a681021dc8b3048
                  • Instruction ID: eae89ec92fa47fb006078aa76ab9835f20a87d8bfa096dd306e392a552332065
                  • Opcode Fuzzy Hash: ff47a51abcea04dad4cf6a7afb91ea76228fbdcaed751e7c2a681021dc8b3048
                  • Instruction Fuzzy Hash: CBD1A2B2714BC489EB12CB7AE4403ED77A2F7497D4F508116EB9927BA9DB38C585C700
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID:
                  • String ID: integral cannot be stored in char
                  • API String ID: 0-960316848
                  • Opcode ID: 3e08981d0d50072fffb208d1b181ce712436944bd81eb42cb26110f9af70dcdc
                  • Instruction ID: 77f1a2635b4ea6a26a7bd05df825fd257562911db5390db708b577132d1802c1
                  • Opcode Fuzzy Hash: 3e08981d0d50072fffb208d1b181ce712436944bd81eb42cb26110f9af70dcdc
                  • Instruction Fuzzy Hash: FED1A172608B8495EB22CFAAE4403ED77A1F7487D4F50451AFB9D17BA9DB38C985C700
                  APIs
                  • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?), ref: 000000014005D029
                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?), ref: 000000014005D039
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: onexit_register_connector_avast_2
                  • API String ID: 1646373207-1395861777
                  • Opcode ID: 5a87a214f69ad9996f46f4e108c4ea3ca191a62f081bee089b7bb08d12dc77f1
                  • Instruction ID: a1a42fb89e812f52026d846da79f20e6a533aa0836c450a4e0f9b8a47379ce3e
                  • Opcode Fuzzy Hash: 5a87a214f69ad9996f46f4e108c4ea3ca191a62f081bee089b7bb08d12dc77f1
                  • Instruction Fuzzy Hash: 45515932611B4486EB62DF26E88479977A4F798BD0F258126EF8E03B71EF39C494C740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: FileFindHeaderInstanceTargetType
                  • String ID: Bad dynamic_cast!
                  • API String ID: 746355257-2956939130
                  • Opcode ID: 053c9f1fb5c591eed51df0dc6a645f10714740855049077f4847ad7af1dcec99
                  • Instruction ID: 683ecf31377dba3ec332864e2048048cf32618811e63f4a593aac7f5a2ca328e
                  • Opcode Fuzzy Hash: 053c9f1fb5c591eed51df0dc6a645f10714740855049077f4847ad7af1dcec99
                  • Instruction Fuzzy Hash: FD41A633310A8482EA62CB26D850BE963A0FB68FD1F508625EF5E47760DB3CD586CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                  • String ID: Missing '}' in format string.
                  • API String ID: 73155330-4229097544
                  • Opcode ID: 318dd1cd310d3d081f1afe8cb7041309903cced94d2d52f12b714d599188ddf1
                  • Instruction ID: cb4f3f15b259488e5d0522d5e6846b3d1254cef31a75e9c84d18b321aa26888e
                  • Opcode Fuzzy Hash: 318dd1cd310d3d081f1afe8cb7041309903cced94d2d52f12b714d599188ddf1
                  • Instruction Fuzzy Hash: 9E317A72310B8885EA15DB67E5483EA63A1E74CBE0F698635AFAD077E6DA38C5408344
                  APIs
                    • Part of subcall function 0000000140003BB0: CloseHandle.KERNEL32(?,?,?,?,?,00000000,?,0000000140004675), ref: 0000000140003C10
                    • Part of subcall function 0000000140003BB0: RtlLeaveCriticalSection.NTDLL ref: 0000000140003C51
                  • WaitForSingleObject.KERNEL32 ref: 000000014000472D
                  • CloseHandle.KERNEL32 ref: 000000014000474F
                    • Part of subcall function 0000000140055950: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559A4
                    • Part of subcall function 0000000140055950: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140004711), ref: 00000001400559C5
                    • Part of subcall function 0000000140055950: RtlLeaveCriticalSection.NTDLL ref: 00000001400559EF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CloseHandle$CriticalLeaveSection$EventObjectSingleWait
                  • String ID: lifetime_object must be allocated on static memory (static or global variable or member of such a variable).
                  • API String ID: 1589410826-2706815617
                  • Opcode ID: 70fbb50609f8680399669a0b62196d18a9183809f6b550a39b1a2611b842fc93
                  • Instruction ID: 647d8cd8eba3d463f440ef20a717d61b08e7360fbff38d954fcfc02b020de2d1
                  • Opcode Fuzzy Hash: 70fbb50609f8680399669a0b62196d18a9183809f6b550a39b1a2611b842fc93
                  • Instruction Fuzzy Hash: B3513672205B40DAEB12DF22E8403DD33A9F758B88F554515EB8D17BAAEF38C566C384
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterExceptionFileHeaderLeaveRaise
                  • String ID: SeDebugPrivilege
                  • API String ID: 2444850325-2896544425
                  • Opcode ID: 47d8983b96d37c3e8854e2e4cbbe1dba1b62a19109350f9d8f540ca4deb4a241
                  • Instruction ID: f1f92afc38bd9f4ddb9e79221918fe44b65bcaace029efc352db289fed50697a
                  • Opcode Fuzzy Hash: 47d8983b96d37c3e8854e2e4cbbe1dba1b62a19109350f9d8f540ca4deb4a241
                  • Instruction Fuzzy Hash: 20416C32714A8482EB12DF26E990399B360F798BD0F508126EB9D47BB5DF39C955CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorFileLastWrite
                  • String ID: @|Z
                  • API String ID: 442123175-2280643266
                  • Opcode ID: 4d3883991d044e5f8481b72bf69049fc59e4f8c00c4b58c3e002fbe9b4be9fb8
                  • Instruction ID: 3f1c01616c2ee589f927939d3637c8df3745ace4301eb73e08597168e5664043
                  • Opcode Fuzzy Hash: 4d3883991d044e5f8481b72bf69049fc59e4f8c00c4b58c3e002fbe9b4be9fb8
                  • Instruction Fuzzy Hash: E231A0B2720A8097EB119F2AE8847C9A3A4F74D7C4F948026FB4D87B75EB38C451C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ErrorFileLastWrite
                  • String ID: @|Z
                  • API String ID: 442123175-2280643266
                  • Opcode ID: b2619aea4b0a86de30143718d0d7df1bf87129b80a6487e2213ea35b366648dc
                  • Instruction ID: afd051437b6ecd1fb29d68d9fbb558d24c54c6263bf42787d770bc6915232dd9
                  • Opcode Fuzzy Hash: b2619aea4b0a86de30143718d0d7df1bf87129b80a6487e2213ea35b366648dc
                  • Instruction Fuzzy Hash: A831F6B2714B849AEB129F2AE4807C977A0F35D7C4F948022FB8E83B65DB38C452C704
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: _set_errno_from_matherr
                  • String ID: exp
                  • API String ID: 1187470696-113136155
                  • Opcode ID: 23fb8bf8561696ed20789f4b5315ada3f67038f5de7566c309f028128f6b7feb
                  • Instruction ID: 4b4ea9116dfd52d7bfed5474c20783261fbe1eeadf6c2c7b2c28c3331a2a0795
                  • Opcode Fuzzy Hash: 23fb8bf8561696ed20789f4b5315ada3f67038f5de7566c309f028128f6b7feb
                  • Instruction Fuzzy Hash: 23211336A11A148EE751DF79D4407EC33B0FB4D788F401525FA0A97B5ADB38C4418B84
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
                  • String ID: bad locale name
                  • API String ID: 1838369231-1405518554
                  • Opcode ID: 802ff0980d04b4db02e5ba51858d71f3f779e2e030b5ec0d2da0c67aacc4f2da
                  • Instruction ID: 012a4c23d11e70e4875300475464f06cbea90c8a51559425b988c7c1f862b1d2
                  • Opcode Fuzzy Hash: 802ff0980d04b4db02e5ba51858d71f3f779e2e030b5ec0d2da0c67aacc4f2da
                  • Instruction Fuzzy Hash: FF118273512B8089DB45DF76E88039937A5FB5CB84F285529EF8D4375AEB34C5A0C340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: ExceptionFileHeaderRaise
                  • String ID: csm
                  • API String ID: 2573137834-1018135373
                  • Opcode ID: 44996603751e475c21f511c15604da97b45f5dbdc84fbf61fd74fa057623675e
                  • Instruction ID: 97096e95f0a54c85afef7ed1224f34eec0d21f81e9d769d8f74bf3c6f37c6066
                  • Opcode Fuzzy Hash: 44996603751e475c21f511c15604da97b45f5dbdc84fbf61fd74fa057623675e
                  • Instruction Fuzzy Hash: C011F872614B8482EB628F16F44039AB7E5F788BC4F688225EF8D47B68DF3CC5518B00
                  APIs
                  Strings
                  • bad lexical cast: source type value could not be interpreted as target, xrefs: 000000014003C1B5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                  • String ID: bad lexical cast: source type value could not be interpreted as target
                  • API String ID: 73155330-1048129864
                  • Opcode ID: f3bb27ac5047e19dedf0d6da02468c2e3f585c9b51c22ee196a804300db88823
                  • Instruction ID: e86fb346fa771a227f78ccbf78225370e6b6e86b001ce4119a58be2a8374efb9
                  • Opcode Fuzzy Hash: f3bb27ac5047e19dedf0d6da02468c2e3f585c9b51c22ee196a804300db88823
                  • Instruction Fuzzy Hash: 81F06D72A1274190ED1BE32294A179A22E09F8D7F0F500B25A779437F5EA7CC1A19740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: Call3Client
                  • String ID: ProfSvc_Group$RpcSs
                  • API String ID: 3485104391-3334544503
                  • Opcode ID: 3ed6a751fb5f92ac7acbe13990157098f9866c2bdd419afd221b180d999669f2
                  • Instruction ID: 1d081a55aff4297c1fe0a1371b611127ee1f05e2046a89e31c42fb846dc7a33a
                  • Opcode Fuzzy Hash: 3ed6a751fb5f92ac7acbe13990157098f9866c2bdd419afd221b180d999669f2
                  • Instruction Fuzzy Hash: 3FF0343A618F45C2DA22EF02F48478A33A4F389B98FA04525EB8D53734EF38C555CB40
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: asw_process_storage_allocate_connector
                  • API String ID: 1646373207-1936732423
                  • Opcode ID: 355904bb20010df249d9f112ddb9b3fafe9b2d7e850c0db1054c1d88b9a4d7da
                  • Instruction ID: a866c2790b832b27c4b0a52729c54a8bf83d1d104be047b08cff1080df31d475
                  • Opcode Fuzzy Hash: 355904bb20010df249d9f112ddb9b3fafe9b2d7e850c0db1054c1d88b9a4d7da
                  • Instruction Fuzzy Hash: 68D00274662E4091EA1BAB63EC9539932B0B74CB91FA0142ADA4A03730EE3D959A8740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2455994437.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                  • Associated: 00000000.00000002.2455980831.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456049607.00000001400B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456083887.0000000140104000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456097979.0000000140105000.00000008.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456112019.000000014010A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2456127621.0000000140118000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_140000000_6Pk1nTmcHN.jbxd
                  Similarity
                  • API ID: AddressHandleModuleProc
                  • String ID: asw_process_storage_deallocate_connector
                  • API String ID: 1646373207-2412585098
                  • Opcode ID: 7fbf2e3eae8837fc89484dcb5c3e227af1717040b68a3726fc97e25be653a77c
                  • Instruction ID: b342fbb4cc203b2b891b2666d10f6c58ec410c46130ef509588b26ae7f2f9580
                  • Opcode Fuzzy Hash: 7fbf2e3eae8837fc89484dcb5c3e227af1717040b68a3726fc97e25be653a77c
                  • Instruction Fuzzy Hash: EED01274612F0091EA0BAB63EC4139832B0B74CB90FA0002ADB0A03730EF3C919A8300