Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
Analysis ID:1538275
MD5:020190d9efd22d6802dd276ee65bdc06
SHA1:95de68aa282afdc863b440c61a5efcd472430ed5
SHA256:eee093a0a6fa52d75ee39a29c4bf9dbf835ff8b69ff7a18e06b50a1f3b0f5b88
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to detect sandboxes (foreground window change detection)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe (PID: 8028 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe" MD5: 020190D9EFD22D6802DD276EE65BDC06)
    • conhost.exe (PID: 8036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WerFault.exe (PID: 7452 cmdline: C:\Windows\system32\WerFault.exe -u -p 8028 -s 524 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.0% probability
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_084eee70-f
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49703 version: TLS 1.2
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Rickz Community\PLUS HVCI ATIVO\x64\Release\Winrar.pdb source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B5BC40 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF749B5BC40
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: CPlusPlusExample/1.0Host: keyauth.win
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpen
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703594867.000002B20288A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.keyauth.cc/front/assets/img/favicon.png
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInter
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000003.1307150154.000002B202851000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703518939.000002B202851000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20280C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000003.1307150154.000002B202851000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703518939.000002B202851000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win:443/
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: https://rsms.me/This
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.10:49703 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF8A50 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF749AF8A50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF8A50 OpenClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,EmptyClipboard,SetClipboardData,GlobalFree,CloseClipboard,0_2_00007FF749AF8A50
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF88F0 free,OpenClipboard,GetClipboardData,CloseClipboard,GlobalLock,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,CloseClipboard,0_2_00007FF749AF88F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD3710 PeekMessageW,GetForegroundWindow,GetClientRect,ClientToScreen,GetCursorPos,GetAsyncKeyState,SetWindowPos,GetAsyncKeyState,0_2_00007FF749AD3710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B10660 GetClientRect,QueryPerformanceCounter,GetForegroundWindow,ClientToScreen,SetCursorPos,GetCursorPos,ScreenToClient,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_00007FF749B10660
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD6690: _beginthreadex,rand,rand,rand,SetConsoleTitleA,_invalid_parameter_noinfo_noreturn,GetConsoleWindow,GetWindowLongPtrW,SetWindowLongPtrW,SetLayeredWindowAttributes,GetStdHandle,SetConsoleWindowInfo,SetConsoleScreenBufferSize,GetStdHandle,SetConsoleTextAttribute,FindWindowW,SetConsoleTextAttribute,SleepEx,exit,Sleep,GetStdHandle,SetConsoleTextAttribute,system,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,Sleep,CreateFileA,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,Sleep,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,Process32NextW,CloseHandle,DeviceIoControl,DeviceIoControl,GetConsoleWindow,ShowWindow,GetForegroundWindow,FindWindowA,Sleep,GetForegroundWindow,FindWindowA,CreateThread,_Mtx_lock,?_Throw_Cpp_error@std@@YAXH@Z,CloseHandle,?_Throw_Cpp_error@std@@YAXH@Z,_Thrd_id,_Thrd_join,_Mtx_unlock,_invalid_parameter_noinfo_noreturn,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,terminate,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,Sleep,exit,?_Throw_Cpp_error@std@@YAXH@Z,0_2_00007FF749AD6690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749ADED60 OpenSCManagerW,OpenServiceW,GetLastError,CloseServiceHandle,OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,ControlService,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,OpenSCManagerW,CreateServiceW,CloseServiceHandle,CloseServiceHandle,Sleep,0_2_00007FF749ADED60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD53100_2_00007FF749AD5310
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD4C700_2_00007FF749AD4C70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD66900_2_00007FF749AD6690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0EB000_2_00007FF749B0EB00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B18AD00_2_00007FF749B18AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B202800_2_00007FF749B20280
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AC9A900_2_00007FF749AC9A90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B312200_2_00007FF749B31220
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0D2300_2_00007FF749B0D230
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AC2A600_2_00007FF749AC2A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF61C00_2_00007FF749AF61C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B3CA100_2_00007FF749B3CA10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AEB2100_2_00007FF749AEB210
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0B9A00_2_00007FF749B0B9A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF31400_2_00007FF749AF3140
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B129800_2_00007FF749B12980
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B031200_2_00007FF749B03120
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AEF1200_2_00007FF749AEF120
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B004D00_2_00007FF749B004D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AC24C00_2_00007FF749AC24C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFDCA00_2_00007FF749AFDCA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B14CB00_2_00007FF749B14CB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0ECD00_2_00007FF749B0ECD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B16C700_2_00007FF749B16C70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AC54300_2_00007FF749AC5430
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AE54200_2_00007FF749AE5420
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AE44700_2_00007FF749AE4470
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AE43D00_2_00007FF749AE43D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B213F00_2_00007FF749B213F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFCC000_2_00007FF749AFCC00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B013200_2_00007FF749B01320
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B13B900_2_00007FF749B13B90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AC13900_2_00007FF749AC1390
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0F7000_2_00007FF749B0F700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B2A6A00_2_00007FF749B2A6A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B5EEA00_2_00007FF749B5EEA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0AEB00_2_00007FF749B0AEB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AE96F00_2_00007FF749AE96F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B106600_2_00007FF749B10660
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AF06200_2_00007FF749AF0620
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B015B00_2_00007FF749B015B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B2EDA00_2_00007FF749B2EDA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B5C5C00_2_00007FF749B5C5C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFB5200_2_00007FF749AFB520
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B515400_2_00007FF749B51540
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B131100_2_00007FF749B13110
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B230B00_2_00007FF749B230B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B098B00_2_00007FF749B098B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFF0F00_2_00007FF749AFF0F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B340C00_2_00007FF749B340C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749ACA0500_2_00007FF749ACA050
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B180800_2_00007FF749B18080
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B010900_2_00007FF749B01090
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749ACB0600_2_00007FF749ACB060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0FFEE0_2_00007FF749B0FFEE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B100100_2_00007FF749B10010
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B407B00_2_00007FF749B407B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B2B7D00_2_00007FF749B2B7D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFF7300_2_00007FF749AFF730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B257900_2_00007FF749B25790
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B507200_2_00007FF749B50720
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B077700_2_00007FF749B07770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AFFF700_2_00007FF749AFFF70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: String function: 00007FF749AE4B10 appears 45 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8028 -s 524
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary string: 8\Device\microsoftAudioDriver\DosDevices\microsoftAudioDriverKmdfLibraryDriverEntry failed 0x%x for driver %wZ
Source: classification engineClassification label: mal60.evad.winEXE@3/6@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: OpenSCManagerW,OpenServiceW,GetLastError,CloseServiceHandle,OpenSCManagerW,OpenServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,ControlService,Sleep,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,OpenSCManagerW,CreateServiceW,CloseServiceHandle,CloseServiceHandle,Sleep,0_2_00007FF749ADED60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749AD5310 CreateToolhelp32Snapshot,_invalid_parameter_noinfo_noreturn,SleepEx,0_2_00007FF749AD5310
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749ADECC0 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,0_2_00007FF749ADECC0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8036:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8028
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\903a8752-4653-44cb-b696-08e7c74ec353Jump to behavior
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeReversingLabs: Detection: 57%
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectoryh~
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 8028 -s 524
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: d3dcompiler_47.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeSection loaded: dpapi.dllJump to behavior
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic file information: File size 1972224 > 1048576
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x131600
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Revendedores Painel\Rickz Community\PLUS HVCI ATIVO\x64\Release\Winrar.pdb source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0FD00 QueryPerformanceFrequency,QueryPerformanceCounter,malloc,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF749B0FD00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749ADECC0 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,0_2_00007FF749ADECC0
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: PROCESSHACKER.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: PROCMON.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAG.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: OLLYDBG.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PEID.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: X64DBG.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: REGMON.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: UNKNOWN EXCEPTIONBAD ARRAY NEW LENGTHBAD CASTSTRING TOO LONG%F: FALSETRUE*CMAP/SET TOO LONG] [JSON.EXCEPTION., COLUMN AT LINE \\.\MICROSOFTAUDIODRIVERHEADNECKBODYCORNER2D3DLEFT MOUSERIGHT MOUSECANCELMIDDLE MOUSEMOUSE 5MOUSE 4BACKSPACETABCLEARENTERSHIFTCONTROLALTPAUSECAPSESCAPESPACEPAGE UPPAGE DOWNENDHOMEARROW LEFTARROW UPARROW RIGHTARROW DOWNPRINTINSERTDELETE0123456789ABDEFGHIJKLMNOPQRSTUVWXYZNUMPAD 0NUMPAD 1NUMPAD 2NUMPAD 3NUMPAD 4NUMPAD 5NUMPAD 6NUMPAD 7NUMPAD 8NUMPAD 9MULTIPLYADDSUBTRACTDECIMALDIVIDEF1F2F3F4F5F6F7F8F9F10F11F12RICKZIMGUIAIMBOTVISUALSMISCCOLORSAIMBOTENABLE VISIBLE CHECK AIMBOTAIMBOT SETTINGS%.3FSMOOTH AIMBOTVISUALSVISUALS OTHERSBOX TYPEMISCMISC SETTINGSCOLOR PICKERLOBIJETTASTRARIFT_TARGETINGFORM_PC_CKAY/OBREACHBRIMSTONECHAMBERCYPHERKAY/OKILLJOYNEONOMENPHOENIXRAZEREYNASAGESKYESOVAVIPERYORUFADEBOTGEKKOHARBORDEADLOCKVYSEVALORANT MEDALOVERLAYMEDALOVERLAYCLASS [ %.FM ] HEALTH RENDERED][ CR][V4L0R4NT PLUS]CPLUSPLUSEXAMPLE/1.0GETKEYAUTH.WINF692B2828AA525D4513302117535C6C0D0CB304F574A1CD32EF3E1D07129217ADIEC.EXEDWNEJFE.EXEWIN64.EXESYSTEMINFORMER.EXEPROCESSHACKER.EXEFILEALYZER2.EXERESOURCEHACKER.EXEDEPENDS.EXEPEXPLORER.EXEDIEL.EXEDIE.EXEPE-BEAR.EXELORDPE.EXEWIRESHARK.EXETCPVIEW.EXEPROCEXP64.EXEPROCEXP.EXEREGMON.EXEFILEMON.EXEPROCMON.EXESCYLLA_X86.EXESCYLLA_X64.EXEOLLYDUMPEX_SA64.EXEOLLYDUMPEX_SA32.EXEHXD.EXEIMMUNITYDEBUGGER.EXEWINDBG.EXEX96DBG.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEIDA64.EXEDOTPEEK64.EXEIDA32.EXEIDA.EXERECLASS.NET.EXERECLASS.EXEHEYRAYS.EXELIGHTHOUSE.EXECHEATENGINE-X86_64.EXECLASSINFORMER.EXEIDA-X86EMU.EXECFFEXPLORER.EXEWINHEX.EXEHIEW.EXEFIDDLER.EXEHTTPDEBUGGER.EXEHTTPDEBUGGERPRO.EXESCYLLA.EXECHEAT ENGINE.EXEDNSPY.EXEDNSPY.CONSOLE.EXECLS
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: WINDBG.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: FIDDLER.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: IDAQ.EXEH
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: PEID.EXEH
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: IDAG.EXEH
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDAQ.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: WIRESHARK.EXE
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeBinary or memory string: FILEMON.EXE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: _beginthreadex,rand,rand,rand,SetConsoleTitleA,_invalid_parameter_noinfo_noreturn,GetConsoleWindow,GetWindowLongPtrW,SetWindowLongPtrW,SetLayeredWindowAttributes,GetStdHandle,SetConsoleWindowInfo,SetConsoleScreenBufferSize,GetStdHandle,SetConsoleTextAttribute,FindWindowW,SetConsoleTextAttribute,SleepEx,exit,Sleep,GetStdHandle,SetConsoleTextAttribute,system,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,Sleep,CreateFileA,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,GetStdHandle,SetConsoleTextAttribute,Sleep,system,FindWindowA,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,Sleep,system,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,Process32NextW,CloseHandle,DeviceIoControl,DeviceIoControl,GetConsoleWindow,ShowWindow,GetForegroundWindow,FindWindowA,Sleep,GetForegroundWindow,FindWindowA,CreateThread,_Mtx_lock,?_Throw_Cpp_error@std@@YAXH@Z,CloseHandle,?_Throw_Cpp_error@std@@YAXH@Z,_Thrd_id,_Thrd_join,_Mtx_unlock,_invalid_parameter_noinfo_noreturn,?_Throw_Cpp_error@std@@YAXH@Z,?_Throw_Cpp_error@std@@YAXH@Z,terminate,?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,Sleep,exit,?_Throw_Cpp_error@std@@YAXH@Z,0_2_00007FF749AD6690
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeAPI coverage: 5.1 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeLast function: Thread delayed
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000003.1308048256.000002B20288A000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703594867.000002B20288A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@i
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749BEFD38 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF749BEFD38
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749BEFD38 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF749BEFD38
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B0FD00 QueryPerformanceFrequency,QueryPerformanceCounter,malloc,LoadLibraryA,GetProcAddress,GetProcAddress,0_2_00007FF749B0FD00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B3B3B0 GetProcessHeap,0_2_00007FF749B3B3B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749BEF6B0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF749BEF6B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749BEEC78 cpuid 0_2_00007FF749BEEC78
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749BEFBB0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF749BEFBB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OLLYDBG.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procexp.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: LordPE.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: Tcpview.exe
Source: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703398210.000002B20282F000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000000.1290826165.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: regmon.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeCode function: 0_2_00007FF749B5BC40 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,memcmp,closesocket,closesocket,closesocket,closesocket,0_2_00007FF749B5BC40
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
12
Windows Service
12
Windows Service
1
Virtualization/Sandbox Evasion
21
Input Capture
1
System Time Discovery
Remote Services21
Input Capture
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
DLL Side-Loading
1
Process Injection
1
Process Injection
LSASS Memory161
Security Software Discovery
Remote Desktop Protocol11
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
Logon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares3
Clipboard Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS2
Process Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe58%ReversingLabsWin64.Trojan.Lazy
SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://keyauth.win/false
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://github.com/rsms/inter)InterRegular3.019;RSMS;Inter-RegularInterSecuriteInfo.com.Trojan.Generic.36879400.484.7364.exefalse
        unknown
        http://upx.sf.netAmcache.hve.5.drfalse
        • URL Reputation: safe
        unknown
        https://cdn.keyauth.cc/front/assets/img/favicon.pngSecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703594867.000002B20288A000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://keyauth.win:443/SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000003.1307150154.000002B202851000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703518939.000002B202851000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Trojan.Generic.36879400.484.7364.exefalse
            • URL Reputation: safe
            unknown
            https://curl.haxx.se/docs/http-cookies.html#SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exefalse
              unknown
              https://keyauth.win/api/1.2/SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe, 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpfalse
                unknown
                https://rsms.me/ThisSecuriteInfo.com.Trojan.Generic.36879400.484.7364.exefalse
                  unknown
                  http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLOpenSecuriteInfo.com.Trojan.Generic.36879400.484.7364.exefalse
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.26.1.5
                    keyauth.winUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1538275
                    Start date and time:2024-10-20 23:30:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 5s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Run name:Run with higher sleep bypass
                    Number of analysed new started processes analysed:11
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                    Detection:MAL
                    Classification:mal60.evad.winEXE@3/6@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 96%
                    • Number of executed functions: 15
                    • Number of non-executed functions: 172
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 52.168.117.173
                    • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                    No simulations
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.26.1.5SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                          lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                            oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                              G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.DropperX-gen.8093.16745.exeGet hashmaliciousUnknownBrowse
                                    4.7.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win64.MalwareX-gen.29811.31558.exeGet hashmaliciousUnknownBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        keyauth.winSecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.21448.26007.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSSecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        SecuriteInfo.com.Win64.MalwareX-gen.21448.26007.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.0.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.72.57
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.10159.8143.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.FileRepMalware.16016.24947.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.26.1.5
                                        No context
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):1.040757212596145
                                        Encrypted:false
                                        SSDEEP:96:s+Feynd92skh4GhiXSKQXIDcQtc6ocE2cw3Gwz+HbHg/8BRTf3o8Fa94OyYUaFQ/:70U2D0jssCwwjoLbdzuiFwZ24lO85
                                        MD5:CC3C87E991A3FC885F354D08D9A35101
                                        SHA1:0BE2C89F7F7BB658145008E21747EA0A9EFE1A4E
                                        SHA-256:74B6861E7D51FBF555A5E46158DCBDA3912422DC588EE907B54B5D1109EA4826
                                        SHA-512:73F6E08A6AB986D5D505AAC4D4373D408EB73E460B4A77B841966DC1D84DF9D1EF4BB91360A4168E9DAC415BECB88F03E8F00045F7762525C7170E87F18461A6
                                        Malicious:false
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.3.3.4.6.3.1.2.5.6.9.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.3.3.4.6.3.7.3.5.0.6.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.9.9.d.4.7.4.c.-.6.a.f.e.-.4.3.6.b.-.9.7.6.1.-.5.4.5.e.b.6.c.d.a.f.8.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.7.2.0.3.c.d.-.5.0.6.f.-.4.d.a.b.-.a.1.8.f.-.4.e.c.e.0.4.3.3.9.7.7.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c...3.6.8.7.9.4.0.0...4.8.4...7.3.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.5.c.-.0.0.0.1.-.0.0.1.3.-.b.6.6.5.-.c.1.5.b.3.7.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.3.6.1.5.5.e.4.7.8.0.e.0.4.b.9.7.b.3.0.0.2.4.b.b.0.4.a.5.3.c.8.0.0.0.0.f.f.f.f.!.0.0.0.0.9.5.d.e.6.8.a.a.2.8.2.a.f.d.c.8.6.3.b.4.4.0.c.6.1.a.5.e.f.c.d.4.7.2.4.3.0.e.d.5.!.S.e.c.u.r.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:Mini DuMP crash report, 15 streams, Sun Oct 20 21:31:03 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):190474
                                        Entropy (8bit):1.396155204357573
                                        Encrypted:false
                                        SSDEEP:384:fYUz1H/PBMm1BpyKL8cxzOlWQz8r66WFr/:f3x/PBMmvpyKL8B8r8
                                        MD5:A07E49A74BFE741618A98FA547EC0B03
                                        SHA1:B216AFCA1A7920332D850430E94F7A5CF15E826B
                                        SHA-256:405934D9FDB5128ED8579E6FA64653AF51EB57D4743B5A5D838D961D6D9BB27D
                                        SHA-512:19F9D4B1B31A51D36FF4C776353FD550750B17AEC16743B27A93B41C5F88A99630CE3FC1423ECE0E74643D2D5A9C186546790AF4F9D1161348722ED108892A6C
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ........v.g............t.......................$...,!......T....n..........`.......8...........T............:..:...........P!..........<#..............................................................................eJ.......#......Lw......................T.......\....v.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8978
                                        Entropy (8bit):3.6992500119131906
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJqqwL6YWLqGlgmfZJFFwppD3q89bvuz5+fuFm:R6lXJf86YaqGlgmfZb4vq5+fN
                                        MD5:7E74288269E27EB78F854994B8346030
                                        SHA1:806DDD0323E814C06AD0AA20776A93168EB77F90
                                        SHA-256:715639152DCEFB25A67C218FB6E0B214D5E8D158B352B6942525C6C941FE00FB
                                        SHA-512:F4D00CCDA912AB21FB70F5F43A59CDF880E747DA4DA002BF75472ED5426F02931B98AD9630E3746A5F0B80AEDA0F52BB2C31A699A7E40616ABC33937FB44DCD4
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.0.2.8.<./.P.i.
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4961
                                        Entropy (8bit):4.526447645870927
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zseJg771I9hmWpW8VY4iYm8M4JfJsF6Msyq8vlJ0PLLEE+LAd:uIjfUI7yn7VBLJZMsWI3EE+LAd
                                        MD5:47EFFBB66CB6D9A7C321D8E551463831
                                        SHA1:6949F14B4349884BFAC38F373ADB4721BC85DF81
                                        SHA-256:E0B3152ECDC3201C305200FE6F7F16BEE0EE7DFC85EF8B012A2B8821CCBE2F76
                                        SHA-512:DF92E887092DE1A36E5683A107A9B0F3B4C894BF3529F0871A3E357D13294B5451A82100CEEAE71548421D10662A4A9AE7849B6F0D22EAF74D921A6DF67DA9CE
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="552273" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\System32\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.295934138749564
                                        Encrypted:false
                                        SSDEEP:6144:p41fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs++YmBMZJh1Vj8:+1/YCW2AoQ0NicYwMHrVI
                                        MD5:84D9A5D5D15A024C83A268F12E3DC20A
                                        SHA1:3CEBBB2AAF8D00B4DFE07594C78671670A8305BF
                                        SHA-256:4B45F7329AAE11D298207DA115CA61CEBB6B34D4E06B1955827E906AC1C199E8
                                        SHA-512:0A68AF30078490D986DF57E61C8E6F7B2FF347C10963E3F113086B47D25C7C6DA80690F9AE64013C13D68178625F5070909D4C9D723071F3C581468F09FC1688
                                        Malicious:false
                                        Reputation:low
                                        Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmb$&]7#................................................................................................................................................................................................................................................................................................................................................2i........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):208
                                        Entropy (8bit):2.4305258110308814
                                        Encrypted:false
                                        SSDEEP:3:rRRqmIEaGj3F/9Dqa+I4AuGLXmuLx:H041lVuGLWm
                                        MD5:FC51E3860D2A83AD586811F10DFB46C0
                                        SHA1:14CCE86E0918FA8ED1191D7D7425E44F0EF4138D
                                        SHA-256:0B1E88DE9B81FA2187463C8465A4C5863402A66AD134CE7CC46E5970FD759BEA
                                        SHA-512:EFBC52214A547A11EBD8A751EE50CBC1315959A1145538439AF98BB0D4E718ABFB84AB02397386890FC36AC9262C5B3A1A608A85A072F943EDD01C61D61B4026
                                        Malicious:false
                                        Reputation:low
                                        Preview:....##########################################################..[ Selecione uma opcao: ]..##########################################################....[-] Open Your Game...
                                        File type:PE32+ executable (console) x86-64, for MS Windows
                                        Entropy (8bit):6.675898394290311
                                        TrID:
                                        • Win64 Executable Console (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                                        File size:1'972'224 bytes
                                        MD5:020190d9efd22d6802dd276ee65bdc06
                                        SHA1:95de68aa282afdc863b440c61a5efcd472430ed5
                                        SHA256:eee093a0a6fa52d75ee39a29c4bf9dbf835ff8b69ff7a18e06b50a1f3b0f5b88
                                        SHA512:e57f3190a38ae6fd2aa2c10ac9142cfb39cfee51552fa2542ee85145c74b4b75e39fbd0b27b4f83abcd658de634fba8a2b41e6e874970355c777144e0e83115e
                                        SSDEEP:49152:vCaRTQ7ZaNdbb6oFPg5F5r7gmohnnFsLm:KaRTQgTgb5fm
                                        TLSH:4995BF43A3A542ECC16791388257D707E77274061B109BCB67E84AA96F63BE12F7F390
                                        File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......8...|...|...|...u.D.j...z&*.u...z&..v...z&..x...z&..Z...z&..z.......f...............~.......~...7...Y...|...^....&..v....&(.}..
                                        Icon Hash:90cececece8e8eb0
                                        Entrypoint:0x14012f47c
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows cui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x670DCAAB [Tue Oct 15 01:51:39 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:36df9176191cadc47b96522ce524f4bc
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        call 00007F6B84BB68A0h
                                        dec eax
                                        add esp, 28h
                                        jmp 00007F6B84BB5FE7h
                                        int3
                                        int3
                                        dec eax
                                        sub esp, 28h
                                        dec ebp
                                        mov eax, dword ptr [ecx+38h]
                                        dec eax
                                        mov ecx, edx
                                        dec ecx
                                        mov edx, ecx
                                        call 00007F6B84BB6182h
                                        mov eax, 00000001h
                                        dec eax
                                        add esp, 28h
                                        ret
                                        int3
                                        int3
                                        int3
                                        inc eax
                                        push ebx
                                        inc ebp
                                        mov ebx, dword ptr [eax]
                                        dec eax
                                        mov ebx, edx
                                        inc ecx
                                        and ebx, FFFFFFF8h
                                        dec esp
                                        mov ecx, ecx
                                        inc ecx
                                        test byte ptr [eax], 00000004h
                                        dec esp
                                        mov edx, ecx
                                        je 00007F6B84BB6185h
                                        inc ecx
                                        mov eax, dword ptr [eax+08h]
                                        dec ebp
                                        arpl word ptr [eax+04h], dx
                                        neg eax
                                        dec esp
                                        add edx, ecx
                                        dec eax
                                        arpl ax, cx
                                        dec esp
                                        and edx, ecx
                                        dec ecx
                                        arpl bx, ax
                                        dec edx
                                        mov edx, dword ptr [eax+edx]
                                        dec eax
                                        mov eax, dword ptr [ebx+10h]
                                        mov ecx, dword ptr [eax+08h]
                                        dec eax
                                        mov eax, dword ptr [ebx+08h]
                                        test byte ptr [ecx+eax+03h], 0000000Fh
                                        je 00007F6B84BB617Dh
                                        movzx eax, byte ptr [ecx+eax+03h]
                                        and eax, FFFFFFF0h
                                        dec esp
                                        add ecx, eax
                                        dec esp
                                        xor ecx, edx
                                        dec ecx
                                        mov ecx, ecx
                                        pop ebx
                                        jmp 00007F6B84BB620Ah
                                        int3
                                        dec eax
                                        mov eax, esp
                                        dec eax
                                        mov dword ptr [eax+08h], ebx
                                        dec eax
                                        mov dword ptr [eax+10h], ebp
                                        dec eax
                                        mov dword ptr [eax+18h], esi
                                        dec eax
                                        mov dword ptr [eax+20h], edi
                                        inc ecx
                                        push esi
                                        dec eax
                                        sub esp, 20h
                                        dec ecx
                                        mov ebx, dword ptr [ecx+38h]
                                        dec eax
                                        mov esi, edx
                                        dec ebp
                                        mov esi, eax
                                        dec eax
                                        mov ebp, ecx
                                        dec ecx
                                        mov edx, ecx
                                        dec eax
                                        mov ecx, esi
                                        dec ecx
                                        mov edi, ecx
                                        dec esp
                                        lea eax, dword ptr [ebx+04h]
                                        call 00007F6B84BB60E1h
                                        Programming Language:
                                        • [IMP] VS2008 SP1 build 30729
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x17b0e80x258.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e40000x1e8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d60000xd29c.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e50000x13c0.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x1663800x70.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x1664000x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1662400x140.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x1330000xe48.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x1314f00x1316006dc2eedac3dafd2dd2b047277ea494b4False0.5417943166700778data6.497397183756386IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x1330000x4b9100x4ba003d4496e5280b114d37fd9f2d3d295c9dFalse0.4512428977272727data6.240530533087005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x17f0000x56c280x55a00f583970018bcffebc3544f435d27c87cFalse0.4868099908759124data6.343408364501885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x1d60000xd29c0xd4001211a2861dc79cf0217410f7583d3455False0.4769494398584906data6.17972589976873IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x1e40000x1e80x2006c94243ac11a20caa150e2383dfc7606False0.541015625data4.772037401703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x1e50000x13c00x1400bc9ec2dfcd6eb2761e4d0798ae08b114False0.4150390625data5.4086836016311475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_MANIFEST0x1e40600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                        DLLImport
                                        d3d11.dllD3D11CreateDeviceAndSwapChain
                                        D3DCOMPILER_47.dllD3DCompile
                                        KERNEL32.dllReadFile, PeekNamedPipe, WaitForMultipleObjects, GetFileSizeEx, CreateFileMappingA, GetEnvironmentVariableA, WaitForSingleObjectEx, MoveFileExA, GetTickCount, GetModuleFileNameA, GetModuleHandleW, QueryFullProcessImageNameW, SetLastError, FormatMessageA, LocalFree, EnterCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, VerifyVersionInfoA, ReleaseSRWLockExclusive, CreateFileMappingW, WakeAllConditionVariable, SleepConditionVariableSRW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, IsDebuggerPresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, OutputDebugStringW, FreeLibrary, VerSetConditionMask, GetProcAddress, QueryPerformanceFrequency, LoadLibraryA, GetModuleHandleA, GlobalUnlock, GlobalLock, GlobalFree, GlobalAlloc, GetLastError, GetFileAttributesW, lstrcmpiW, GetConsoleWindow, WideCharToMultiByte, CreateThread, CloseHandle, Process32FirstW, CreateFileA, CreateFileW, HeapDestroy, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GetProcessHeap, GetFileType, InitializeCriticalSectionEx, DeleteCriticalSection, GetCurrentProcess, MapViewOfFile, Process32NextW, GetSystemDirectoryA, Sleep, MultiByteToWideChar, CreateToolhelp32Snapshot, SetConsoleWindowInfo, TerminateProcess, DeviceIoControl, GetStdHandle, SetConsoleScreenBufferSize, SetConsoleTitleA, SetConsoleTextAttribute, VirtualProtect, AcquireSRWLockExclusive, SleepEx, UnmapViewOfFile
                                        USER32.dllSetCursor, SetCursorPos, OpenClipboard, ScreenToClient, GetCursorPos, CloseClipboard, UpdateWindow, FindWindowA, GetClientRect, FindWindowW, TranslateMessage, SetLayeredWindowAttributes, GetForegroundWindow, PeekMessageW, ClientToScreen, DispatchMessageW, LoadCursorW, GetAsyncKeyState, ShowWindow, EmptyClipboard, GetClipboardData, SetClipboardData, GetKeyState, GetWindow, DestroyWindow, SetWindowPos, SetWindowLongPtrW, GetSystemMetrics, GetWindowLongPtrW, MessageBoxA
                                        ADVAPI32.dllControlService, StartServiceW, DeleteService, OpenSCManagerW, CloseServiceHandle, QueryServiceStatus, CreateServiceW, OpenProcessToken, AddAccessAllowedAce, GetLengthSid, GetTokenInformation, InitializeAcl, IsValidSid, SetSecurityInfo, CopySid, CryptEncrypt, CryptImportKey, CryptDestroyKey, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGenRandom, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA, ConvertSidToStringSidA, OpenServiceW
                                        MSVCP140.dll?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, _Mtx_unlock, _Thrd_join, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, _Xtime_get_ticks, _Query_perf_counter, _Thrd_id, _Thrd_sleep, _Cnd_do_broadcast_at_thread_exit, _Mtx_init_in_situ, _Mtx_lock, _Mtx_destroy_in_situ, ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xlength_error@std@@YAXPEBD@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xbad_function_call@std@@YAXXZ, ?_Xout_of_range@std@@YAXPEBD@Z, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, _Query_perf_frequency, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Throw_Cpp_error@std@@YAXH@Z, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
                                        dwmapi.dllDwmExtendFrameIntoClientArea
                                        WINHTTP.dllWinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpOpen, WinHttpReceiveResponse, WinHttpConnect, WinHttpQueryOption
                                        CRYPT32.dllCertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CertFreeCertificateChainEngine, CryptStringToBinaryA, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore, CertGetCertificateChain, CertGetCertificateContextProperty, CertFreeCertificateChain, CertFreeCertificateContext
                                        IMM32.dllImmReleaseContext, ImmSetCompositionWindow, ImmGetContext, ImmSetCandidateWindow
                                        Normaliz.dllIdnToAscii
                                        WLDAP32.dll
                                        WS2_32.dllntohs, ntohl, closesocket, gethostname, sendto, recvfrom, freeaddrinfo, recv, send, WSAGetLastError, getaddrinfo, select, __WSAFDIsSet, ioctlsocket, listen, htonl, bind, WSACleanup, WSAStartup, WSAIoctl, WSASetLastError, connect, socket, setsockopt, accept, htons, getsockopt, getsockname, getpeername
                                        RPCRT4.dllUuidCreate, UuidToStringA, RpcStringFreeA
                                        PSAPI.DLLGetModuleInformation
                                        USERENV.dllUnloadUserProfile
                                        VCRUNTIME140_1.dll__CxxFrameHandler4
                                        VCRUNTIME140.dll__current_exception_context, __current_exception, longjmp, strrchr, strchr, memset, memmove, __intrinsic_setjmp, memcmp, memchr, _CxxThrowException, strstr, __std_terminate, __std_exception_copy, __std_exception_destroy, memcpy, __C_specific_handler
                                        api-ms-win-crt-runtime-l1-1-0.dllexit, _invalid_parameter_noinfo, strerror, __sys_nerr, _resetstkoflw, _errno, terminate, system, _beginthreadex, _getpid, _register_thread_local_exe_atexit_callback, _c_exit, __p___argv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_narrow_environment, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _invalid_parameter_noinfo_noreturn
                                        api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s, fgetc, __p__commode, _lseeki64, __stdio_common_vfprintf, _read, fputc, fwrite, feof, fputs, fopen, _close, _open, __stdio_common_vsprintf, _write, fclose, _popen, _pclose, fgets, fgetpos, setvbuf, __stdio_common_vsscanf, _wfopen, ungetc, fflush, fseek, ftell, _get_stream_buffer_pointers, _set_fmode, _fseeki64, fread, fsetpos, __acrt_iob_func
                                        api-ms-win-crt-heap-l1-1-0.dllcalloc, _callnewh, realloc, free, malloc, _set_new_mode
                                        api-ms-win-crt-math-l1-1-0.dllasinf, atanf, ceilf, acosf, _dclass, cosf, fmodf, tanf, cos, powf, sin, sinf, sqrtf, __setusermatherr
                                        api-ms-win-crt-string-l1-1-0.dllstrncmp, _strdup, tolower, strpbrk, isupper, strcmp, strcspn, strspn, strncpy
                                        api-ms-win-crt-convert-l1-1-0.dllatoi, atof, strtoll, strtod, strtoul, strtol, strtoull
                                        api-ms-win-crt-utility-l1-1-0.dllqsort, rand
                                        api-ms-win-crt-filesystem-l1-1-0.dll_unlink, _stat64, _fstat64, _lock_file, _access, _unlock_file
                                        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv
                                        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64
                                        SHELL32.dllShellExecuteA
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:31:02.029261112 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:02.029299974 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:02.029370070 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:02.031291962 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:02.031312943 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:02.798646927 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:02.798722029 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:02.810987949 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:02.811001062 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:02.811367989 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:02.860141039 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.168152094 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.215400934 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340550900 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340601921 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340637922 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340671062 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340717077 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340738058 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.340753078 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340783119 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.340790033 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.340811968 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.340816975 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.341413021 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.341468096 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.341475010 CEST44349703104.26.1.5192.168.2.10
                                        Oct 20, 2024 23:31:03.341515064 CEST49703443192.168.2.10104.26.1.5
                                        Oct 20, 2024 23:31:03.354849100 CEST49703443192.168.2.10104.26.1.5
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 20, 2024 23:31:02.004791021 CEST5544153192.168.2.101.1.1.1
                                        Oct 20, 2024 23:31:02.012037039 CEST53554411.1.1.1192.168.2.10
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:31:02.004791021 CEST192.168.2.101.1.1.10x68Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 20, 2024 23:31:02.012037039 CEST1.1.1.1192.168.2.100x68No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:31:02.012037039 CEST1.1.1.1192.168.2.100x68No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                                        Oct 20, 2024 23:31:02.012037039 CEST1.1.1.1192.168.2.100x68No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                        • keyauth.win
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.1049703104.26.1.54438028C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-20 21:31:03 UTC95OUTGET / HTTP/1.1
                                        Connection: Keep-Alive
                                        User-Agent: CPlusPlusExample/1.0
                                        Host: keyauth.win
                                        2024-10-20 21:31:03 UTC1135INHTTP/1.1 200 OK
                                        Date: Sun, 20 Oct 2024 21:31:03 GMT
                                        Content-Type: text/html
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Last-Modified: Sun, 20 Oct 2024 20:11:01 GMT
                                        Cache-Control: max-age=14400
                                        CF-Cache-Status: HIT
                                        Age: 27
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MeHfKYqok9uaSB5T4Y%2B%2FAm6VCqNbyd%2FI4wIkE9fzHRHofQX%2FgRntHijxA8DCT%2Fd91TehctSv0NhkC%2Bp0%2FaUiYbP2PDeLGbPJJIYvZev6MbbC4D%2BisPUbeFJO8zGS"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Acknowledge: Credit to VaultCord.com
                                        X-Powered-By: VaultCord.com
                                        content-security-policy: upgrade-insecure-requests
                                        permissions-policy: accelerometer=(), camera=(), fullscreen=*, geolocation=(self), gyroscope=(), microphone=(), payment=*
                                        referrer-policy: strict-origin-when-cross-origin
                                        strict-transport-security: max-age=31536000; includeSubDomains
                                        x-content-security-policy: img-src *; media-src * data:;
                                        x-content-type-options: nosniff
                                        x-frame-options: DENY
                                        x-xss-protection: 1; mode=block
                                        Server: cloudflare
                                        CF-RAY: 8d5c1cd14d097ede-LAX
                                        2024-10-20 21:31:03 UTC234INData Raw: 37 62 32 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 63 6c 61 73 73 3d 22 62 67 2d 5b 23 30 39 30 39 30 64 5d 20 74 65 78 74 2d 77 68 69 74 65 20 6f 76 65 72 66 6c 6f 77 2d 78 2d 68 69 64 64 65 6e 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 4b 65
                                        Data Ascii: 7b2f<!DOCTYPE html><html lang="en" class="bg-[#09090d] text-white overflow-x-hidden"><head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="title" content="Ke
                                        2024-10-20 21:31:03 UTC1369INData Raw: 79 41 75 74 68 20 2d 20 4f 70 65 6e 20 53 6f 75 72 63 65 20 41 75 74 68 22 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 0a 20 20 20 20 20 20 20 20 63 6f 6e 74 65 6e 74 3d 22 53 65 63 75 72 65 20 79 6f 75 72 20 73 6f 66 74 77 61 72 65 20 61 67 61 69 6e 73 74 20 70 69 72 61 63 79 2c 20 61 6e 20 69 73 73 75 65 20 63 61 75 73 69 6e 67 20 24 34 32 32 20 6d 69 6c 6c 69 6f 6e 20 69 6e 20 6c 6f 73 73 65 73 20 61 6e 6e 75 61 6c 6c 79 20 2d 20 46 61 69 72 20 70 72 69 63 69 6e 67 20 26 20 46 65 61 74 75 72 65 73 20 6e 6f 74 20 73 65 65 6e 20 69 6e 20 63 6f 6d 70 65 74 69 74 6f 72 73 22 0a 20 20 20 20 20 20 20 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4b 65 79 41 75 74 68 22 20 6e 61 6d 65 3d
                                        Data Ascii: yAuth - Open Source Auth"> <meta content="Secure your software against piracy, an issue causing $422 million in losses annually - Fair pricing & Features not seen in competitors" name="description" /> <meta content="KeyAuth" name=
                                        2024-10-20 21:31:03 UTC1369INData Raw: 65 74 69 74 6f 72 73 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 69 74 65 6d 70 72 6f 70 3d 22 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2e 6b 65 79 61 75 74 68 2e 63 63 2f 66 72 6f 6e 74 2f 61 73 73 65 74 73 2f 69 6d 67 2f 66 61 76 69 63 6f 6e 2e 70 6e 67 22 3e 0a 0a 20 20 20 20 3c 21 2d 2d 20 54 77 69 74 74 65 72 20 43 61 72 64 20 64 61 74 61 20 2d 2d 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 63 61 72 64 22 20 63 6f 6e 74 65 6e 74 3d 22 70 72 6f 64 75 63 74 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 4b 65 79 41 75 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 77 69 74 74 65 72 3a
                                        Data Ascii: etitors"> <meta itemprop="image" content="https://cdn.keyauth.cc/front/assets/img/favicon.png"> ... Twitter Card data --> <meta name="twitter:card" content="product"> <meta name="twitter:site" content="@KeyAuth"> <meta name="twitter:
                                        2024-10-20 21:31:03 UTC1369INData Raw: 74 74 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 56 49 45 57 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 62 75 74 74 6f 6e 2d 75 72 6c 2d 67 6f 6f 67 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 70 6c 61 79 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 74 6f 72 65 2f 61 70 70 73 2f 64 65 74 61 69 6c 73 3f 69 64 3d 63 6f 6d 2e 77 6e 65 6c 73 6f 6e 30 33 2e 72 6e 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 65 6e 61 62 6c 65 64 2d 70 6c 61 74 66 6f 72 6d 73 22 20 63 6f 6e 74 65 6e 74 3d 22 61 6e 64 72 6f 69 64 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 73 6d 61 72 74 62 61 6e 6e 65 72 3a 63 6c 6f 73 65 2d 6c 61 62 65 6c 22 20 63 6f 6e 74 65
                                        Data Ascii: tton" content="VIEW"> <meta name="smartbanner:button-url-google" content="https://play.google.com/store/apps/details?id=com.wnelson03.rn"> <meta name="smartbanner:enabled-platforms" content="android"> <meta name="smartbanner:close-label" conte
                                        2024-10-20 21:31:03 UTC1369INData Raw: 2d 32 20 68 6f 76 65 72 3a 6f 70 61 63 69 74 79 2d 36 30 20 74 72 61 6e 73 69 74 69 6f 6e 20 64 75 72 61 74 69 6f 6e 2d 32 30 30 20 66 6f 63 75 73 3a 6f 75 74 6c 69 6e 65 2d 6e 6f 6e 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 67 72 61 79 2d 38 30 30 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 43 6c 69 65 6e 74 20 41 72 65 61 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 2e 2f 72 65 67 69 73 74 65 72 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 77 68 69 74 65 20 66 6f 63 75 73 3a 72 69 6e 67 2d 30 20 66 6f 6e 74 2d 6d 65 64 69 75 6d 20 72
                                        Data Ascii: -2 hover:opacity-60 transition duration-200 focus:outline-none focus:ring-gray-800"> Client Area </a> <a href="./register" class="text-white focus:ring-0 font-medium r
                                        2024-10-20 21:31:03 UTC1369INData Raw: 20 20 20 20 20 20 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 61 74 68 20 66 69 6c 6c 2d 72 75 6c 65 3d 22 65 76 65 6e 6f 64 64 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 64 3d 22 4d 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 31 2e 34 31 34 20 30 4c 31 30 20 38 2e 35 38 36 6c 34 2e 32 39 33 2d 34 2e 32 39 33 61 31 20 31 20 30 20 31 31 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 31 2e 34 31 34 20 31 30 6c 34 2e 32 39 33 20 34 2e 32 39 33 61 31 20 31 20 30 20 30 31 2d 31 2e 34 31 34 20 31 2e 34 31 34 4c 31 30 20 31 31 2e 34 31 34 6c
                                        Data Ascii: xmlns="http://www.w3.org/2000/svg"> <path fill-rule="evenodd" d="M4.293 4.293a1 1 0 011.414 0L10 8.586l4.293-4.293a1 1 0 111.414 1.414L11.414 10l4.293 4.293a1 1 0 01-1.414 1.414L10 11.414l
                                        2024-10-20 21:31:03 UTC1369INData Raw: 30 22 3e 46 65 61 74 75 72 65 73 3c 2f 61 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 6c 69 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 62 75 74 74 6f 6e 20 69 64 3d 22 6d 6d 2d 62 75 74 74 6f 6e 22 20 64 61 74 61 2d 64 72 6f 70 64 6f 77 6e 2d 74 6f 67 67 6c 65 3d 22 6d 6d 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 6a 75 73 74 69 66 79 2d 62 65 74 77 65 65 6e 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 79 2d 32 20 70 72 2d 34 20 70 6c 2d 33 20 77 2d 66 75 6c 6c 20 66 6f 6e 74 2d 6d 65 64
                                        Data Ascii: 0">Features</a> </li> <li> <button id="mm-button" data-dropdown-toggle="mm" class="flex justify-between items-center py-2 pr-4 pl-3 w-full font-med
                                        2024-10-20 21:31:03 UTC1369INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 79 6f 75 74 75 62 65 2e 63 6f 6d 2f 6b 65 79 61 75 74 68 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 63 6c 61 73 73 3d 22 66 6c 65 78 20 69 74 65 6d 73 2d 63 65 6e 74 65 72 20 70 2d 33 20 72 6f 75 6e 64 65 64 2d 6c 67 20 68 6f 76 65 72 3a 62 67 2d 5b 23 30 66 30 66 31 37 5d 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                        Data Ascii: <a href="https://youtube.com/keyauth" target="_blank" class="flex items-center p-3 rounded-lg hover:bg-[#0f0f17]">
                                        2024-10-20 21:31:03 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 78 70 6c 6f 72 65 20 4f 75 72 20 59 6f 75 54 75 62 65 20 43 68 61 6e 6e 65 6c 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 2d 73 6d 20 66 6f 6e 74 2d 6c 69 67 68 74 20 74 65 78 74 2d 67 72 61 79 2d 34 30 30 22 3e 57 61 74 63 68 20 46 65 61 74 75 72 65 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                        Data Ascii: Explore Our YouTube Channel </div> <div class="text-sm font-light text-gray-400">Watch Feature


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:31:00
                                        Start date:20/10/2024
                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exe"
                                        Imagebase:0x7ff749ac0000
                                        File size:1'972'224 bytes
                                        MD5 hash:020190D9EFD22D6802DD276EE65BDC06
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:1
                                        Start time:17:31:00
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff620390000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:17:31:02
                                        Start date:20/10/2024
                                        Path:C:\Windows\System32\WerFault.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 8028 -s 524
                                        Imagebase:0x7ff69ad40000
                                        File size:570'736 bytes
                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:1.8%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:38.7%
                                          Total number of Nodes:346
                                          Total number of Limit Nodes:16
                                          execution_graph 27954 7ff749ac1ad0 _Mtx_init_in_situ 28049 7ff749ad9bd0 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn free _Receive_impl 27955 7ff749ad7ed0 setvbuf ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers 28050 7ff749b185df 23 API calls 27957 7ff749ac52c0 12 API calls 28051 7ff749ac11c0 GetSystemMetrics 28052 7ff749ac1dc0 __stdio_common_vsprintf swprintf_s 27958 7ff749ad86c0 ungetc 27959 7ff749aca6c0 27 API calls 27960 7ff749af5ac0 13 API calls 28055 7ff749af61c0 12 API calls 27961 7ff749b0fef4 LoadCursorW SetCursor 28057 7ff749ac1fb0 __std_exception_destroy 27963 7ff749ad9cb0 ?uncaught_exceptions@std@ ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 28059 7ff749ad87b0 fputc ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD fputc fwrite 28060 7ff749ad7fb0 fsetpos ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD fwrite 27967 7ff749b1b4ff memmove memmove memmove memmove 27968 7ff749b0f700 22 API calls 28061 7ff749aeb1a3 19 API calls 27969 7ff749ad50a0 6 API calls _Receive_impl 28064 7ff749aedfa0 malloc memmove free memcmp 28065 7ff749b14810 43 API calls 28067 7ff749ae3410 103 API calls 28068 7ff749ad9c10 6 API calls _Receive_impl 27974 7ff749af9310 6 API calls 27975 7ff749af5f10 19 API calls 27976 7ff749b11ea0 23 API calls 27977 7ff749ac1d00 __stdio_common_vsprintf_s swprintf_s 27978 7ff749ac1f00 __std_exception_copy 27979 7ff749ad9b00 6 API calls _Receive_impl 27980 7ff749ada700 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn 28075 7ff749adae00 DeviceIoControl 27981 7ff749ac8300 64 API calls 28078 7ff749ad4400 8 API calls _Receive_impl 27982 7ff749b098b0 104 API calls 27667 7ff749ade7f0 27668 7ff749ade812 27667->27668 27675 7ff749ad5100 27668->27675 27691 7ff749ad4a00 27668->27691 27669 7ff749ade830 _Cnd_do_broadcast_at_thread_exit 27672 7ff749ade83f 27669->27672 27706 7ff749beeb50 27672->27706 27676 7ff749ad5294 27675->27676 27687 7ff749ad512a 27675->27687 27676->27669 27678 7ff749ad5306 exit 27679 7ff749ad5186 memcmp 27679->27678 27680 7ff749ad51a0 _Mtx_lock 27679->27680 27681 7ff749ad52fa ?_Throw_Cpp_error@std@@YAXH 27680->27681 27686 7ff749ad51b5 27680->27686 27681->27678 27682 7ff749ad52e4 ?_Throw_Cpp_error@std@@YAXH 27682->27681 27683 7ff749ad51f4 _Mtx_unlock 27685 7ff749ac1e20 2 API calls 27683->27685 27685->27687 27686->27682 27686->27683 27737 7ff749ac1e20 _Query_perf_frequency _Query_perf_counter 27686->27737 27687->27676 27687->27678 27687->27679 27689 7ff749ad52dd _invalid_parameter_noinfo_noreturn 27687->27689 27690 7ff749beeb50 _Receive_impl free 27687->27690 27709 7ff749ad4c70 WinHttpOpen 27687->27709 27739 7ff749add090 27687->27739 27689->27682 27690->27687 27692 7ff749ad4b0b 27691->27692 27700 7ff749ad4a2c 27691->27700 27692->27669 27693 7ff749ad4a5e _Mtx_lock 27694 7ff749ad4b69 ?_Throw_Cpp_error@std@@YAXH 27693->27694 27693->27700 27704 7ff749ad4bc0 27694->27704 27695 7ff749ad4b53 ?_Throw_Cpp_error@std@@YAXH 27695->27694 27696 7ff749ad4ab2 _Mtx_unlock 27699 7ff749ac1e20 2 API calls 27696->27699 27697 7ff749ad4c21 27697->27669 27698 7ff749ac1e20 2 API calls 27698->27700 27699->27700 27700->27692 27700->27693 27700->27695 27700->27696 27700->27698 27703 7ff749add090 4 API calls 27700->27703 27702 7ff749ac1e20 2 API calls 27702->27704 27703->27700 27704->27697 27704->27702 27705 7ff749add090 4 API calls 27704->27705 27747 7ff749ad4970 _Mtx_lock 27704->27747 27705->27704 27707 7ff749bef170 free 27706->27707 27710 7ff749ad5071 27709->27710 27711 7ff749ad4ce8 WinHttpConnect 27709->27711 27710->27687 27712 7ff749ad4d0d WinHttpOpenRequest 27711->27712 27713 7ff749ad5068 WinHttpCloseHandle 27711->27713 27714 7ff749ad505f WinHttpCloseHandle 27712->27714 27715 7ff749ad4d41 WinHttpSendRequest 27712->27715 27713->27710 27714->27713 27716 7ff749ad5056 WinHttpCloseHandle 27715->27716 27717 7ff749ad4d69 WinHttpReceiveResponse 27715->27717 27716->27714 27717->27716 27718 7ff749ad4d7c WinHttpQueryOption 27717->27718 27718->27716 27719 7ff749ad4daf 27718->27719 27719->27716 27720 7ff749ad4dbf CertGetCertificateContextProperty 27719->27720 27721 7ff749ad4de5 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z 27720->27721 27722 7ff749ad5049 CertFreeCertificateContext 27720->27722 27723 7ff749ad4e87 27721->27723 27726 7ff749ad4ed4 27721->27726 27722->27716 27724 7ff749ad4e90 ?setw@std@@YA?AU?$_Smanip@_J@1@_J 27723->27724 27725 7ff749ad4eb9 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H 27724->27725 27725->27724 27725->27726 27728 7ff749ad4f68 27726->27728 27745 7ff749ada7a0 9 API calls 3 library calls 27726->27745 27731 7ff749ad4ff9 _invalid_parameter_noinfo_noreturn 27728->27731 27732 7ff749beeb50 _Receive_impl free 27728->27732 27733 7ff749ad4fae 27728->27733 27729 7ff749ad5005 27746 7ff749ad9250 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn free _Receive_impl 27729->27746 27734 7ff749ad5000 27731->27734 27732->27733 27733->27729 27733->27731 27733->27734 27735 7ff749beeb50 _Receive_impl free 27734->27735 27735->27729 27736 7ff749ad5035 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 27736->27722 27738 7ff749ac1e48 27737->27738 27738->27686 27742 7ff749add0c6 27739->27742 27740 7ff749ac1e20 2 API calls 27740->27742 27741 7ff749add13e 27741->27687 27742->27740 27742->27741 27743 7ff749add0df _Xtime_get_ticks 27742->27743 27744 7ff749add107 _Thrd_sleep 27742->27744 27743->27742 27744->27742 27745->27728 27746->27736 27748 7ff749ad498e ?_Throw_Cpp_error@std@@YAXH 27747->27748 27749 7ff749ad499a 27747->27749 27748->27749 27750 7ff749ad49a6 ?_Throw_Cpp_error@std@@YAXH 27749->27750 27751 7ff749ad49bc 27749->27751 27750->27751 27752 7ff749ad49eb _Mtx_unlock 27751->27752 27753 7ff749ac1e20 2 API calls 27751->27753 27754 7ff749ad49dd 27753->27754 27754->27752 27983 7ff749adfef0 free free free 27985 7ff749af88f0 12 API calls 27987 7ff749b0eac0 malloc 27988 7ff749b10cc0 __stdio_common_vsscanf malloc memmove free 27990 7ff749b19cca memcmp 28083 7ff749ac59e0 31 API calls 27991 7ff749ae74e0 104 API calls 27992 7ff749adc4e0 terminate 28084 7ff749ad95e0 12 API calls 28086 7ff749adb5e2 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 28087 7ff749ae87e0 45 API calls 27994 7ff749b0ecd0 memmove memmove memset 27995 7ff749ac2450 7 API calls 27755 7ff749ade750 27756 7ff749ade772 27755->27756 27761 7ff749ad4a00 12 API calls 27756->27761 27757 7ff749ade793 _Cnd_do_broadcast_at_thread_exit 27760 7ff749ade7a2 27757->27760 27758 7ff749beeb50 _Receive_impl free 27759 7ff749ade7db 27758->27759 27760->27758 27761->27757 28090 7ff749ac9350 27 API calls 28091 7ff749ad7b50 _invalid_parameter_noinfo_noreturn free _Receive_impl 27998 7ff749af8a50 10 API calls 27999 7ff749af8450 __stdio_common_vsscanf 28000 7ff749af9450 8 API calls 28093 7ff749b1c160 6 API calls 28002 7ff749ac2840 GetKeyState Sleep 28095 7ff749ac6b40 42 API calls 28003 7ff749ad9040 6 API calls 3 library calls 28004 7ff749b1aa6e 7 API calls 28005 7ff749b0de70 23 API calls 28007 7ff749ac5430 25 API calls 28008 7ff749ad8230 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J memmove fread fread 28010 7ff749ad7e30 12 API calls 28011 7ff749b1aa82 malloc memmove free memmove memmove 28012 7ff749bef47c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 28013 7ff749b33880 109 API calls 2 library calls 28014 7ff749b2e880 8 API calls 28097 7ff749ac1b20 7 API calls 28098 7ff749ad8b20 _invalid_parameter_noinfo_noreturn _invalid_parameter_noinfo_noreturn free _Receive_impl 28100 7ff749af8b20 ImmGetContext ImmSetCompositionWindow ImmSetCandidateWindow ImmReleaseContext 28101 7ff749b1a990 9 API calls 28103 7ff749ac1390 17 API calls 28019 7ff749adaa90 11 API calls 28020 7ff749adfe90 free free 28021 7ff749ade890 4 API calls 2 library calls 28104 7ff749ad8990 _lock_file 28105 7ff749ad8390 16 API calls _Receive_impl 28106 7ff749ad9b90 8 API calls _Receive_impl 28107 7ff749adcd90 8 API calls 2 library calls 27762 7ff749ad6690 27882 7ff749beec78 27762->27882 27764 7ff749ad66be _beginthreadex 27765 7ff749ad746f ?_Throw_Cpp_error@std@@YAXH 27764->27765 27766 7ff749ad66fd rand 27764->27766 27767 7ff749ad6726 27766->27767 27767->27767 27891 7ff749adbd20 27767->27891 27770 7ff749ad67e1 SetConsoleTitleA 27772 7ff749ad6802 27770->27772 27773 7ff749ad6837 10 API calls 27770->27773 27771 7ff749ad676b 27774 7ff749ad6770 rand 27771->27774 27785 7ff749ad67dc 27771->27785 27909 7ff749adc130 27771->27909 27775 7ff749ad6832 27772->27775 27778 7ff749ad682b _invalid_parameter_noinfo_noreturn 27772->27778 27776 7ff749ad69a5 Sleep GetStdHandle SetConsoleTextAttribute 27773->27776 27777 7ff749ad68f8 27773->27777 27774->27771 27779 7ff749beeb50 _Receive_impl free 27775->27779 27930 7ff749ad62c0 595 API calls 2 library calls 27776->27930 27929 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27777->27929 27778->27775 27779->27773 27783 7ff749ad69ce system 27931 7ff749aded60 67 API calls 27783->27931 27784 7ff749ad6900 27787 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27784->27787 27785->27770 27789 7ff749ad690c 27787->27789 27788 7ff749ad69e0 GetStdHandle SetConsoleTextAttribute 27932 7ff749ac1ca0 __acrt_iob_func 27788->27932 27791 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27789->27791 27793 7ff749ad6918 27791->27793 27792 7ff749ad6a05 GetStdHandle SetConsoleTextAttribute 27794 7ff749ac1ca0 2 API calls 27792->27794 27795 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27793->27795 27796 7ff749ad6a2a GetStdHandle SetConsoleTextAttribute 27794->27796 27797 7ff749ad6920 27795->27797 27798 7ff749ac1ca0 2 API calls 27796->27798 27799 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27797->27799 27801 7ff749ad6a4f GetStdHandle SetConsoleTextAttribute 27798->27801 27800 7ff749ad692c 27799->27800 27803 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27800->27803 27802 7ff749ac1ca0 2 API calls 27801->27802 27804 7ff749ad6a74 Sleep CreateFileA 27802->27804 27805 7ff749ad6934 27803->27805 27806 7ff749ad726f ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 27804->27806 27807 7ff749ad6abc 27804->27807 27808 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27805->27808 27817 7ff749ad728f 27806->27817 27807->27806 27810 7ff749ac1ca0 2 API calls 27807->27810 27809 7ff749ad6940 27808->27809 27811 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27809->27811 27812 7ff749ad6ad2 GetStdHandle SetConsoleTextAttribute 27810->27812 27813 7ff749ad6948 27811->27813 27815 7ff749ac1ca0 2 API calls 27812->27815 27816 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27813->27816 27819 7ff749ad6af7 GetStdHandle SetConsoleTextAttribute 27815->27819 27820 7ff749ad6954 27816->27820 27941 7ff749ad9880 27817->27941 27822 7ff749ac1ca0 2 API calls 27819->27822 27823 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27820->27823 27825 7ff749ad6b1c GetStdHandle SetConsoleTextAttribute 27822->27825 27826 7ff749ad695c 27823->27826 27824 7ff749ad7438 27946 7ff749ad9670 _invalid_parameter_noinfo_noreturn free _Receive_impl 27824->27946 27828 7ff749ac1ca0 2 API calls 27825->27828 27829 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27826->27829 27831 7ff749ad6b41 Sleep system 27828->27831 27832 7ff749ad6968 27829->27832 27830 7ff749ad7443 Sleep exit 27833 7ff749ad7457 27830->27833 27834 7ff749ad6da3 system ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 27831->27834 27845 7ff749ad6b6d 27831->27845 27835 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27832->27835 27837 7ff749ad6dfc 27834->27837 27836 7ff749ad6970 27835->27836 27838 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27836->27838 27837->27837 27936 7ff749adab10 7 API calls 27837->27936 27839 7ff749ad697c 27838->27839 27841 7ff749ad43d0 GetStdHandle SetConsoleTextAttribute 27839->27841 27840 7ff749ad6ba0 FindWindowA ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 27840->27845 27844 7ff749ad6984 27841->27844 27843 7ff749ad6f8f CreateToolhelp32Snapshot Process32FirstW 27846 7ff749ad6fb5 lstrcmpiW 27843->27846 27847 7ff749ad6fdf CloseHandle 27843->27847 27848 7ff749ac1ca0 __acrt_iob_func __stdio_common_vfprintf 27844->27848 27845->27840 27845->27845 27935 7ff749adab10 7 API calls 27845->27935 27849 7ff749ad7154 CloseHandle 27846->27849 27850 7ff749ad6fd1 Process32NextW 27846->27850 27851 7ff749ad6fee 27847->27851 27852 7ff749ad6990 SleepEx exit 27848->27852 27849->27851 27850->27846 27850->27847 27854 7ff749ad6ff6 DeviceIoControl 27851->27854 27855 7ff749ad70ab GetConsoleWindow ShowWindow 27851->27855 27852->27776 27937 7ff749adae90 DeviceIoControl 27854->27937 27938 7ff749acaf60 8 API calls 27855->27938 27856 7ff749ad6d8a Sleep 27856->27834 27856->27845 27859 7ff749ad7053 DeviceIoControl 27859->27855 27860 7ff749ad70c1 27939 7ff749acac90 31 API calls 27860->27939 27862 7ff749ad70c6 GetForegroundWindow FindWindowA 27863 7ff749ad70e3 Sleep GetForegroundWindow FindWindowA 27862->27863 27864 7ff749ad710b CreateThread 27862->27864 27863->27863 27863->27864 27940 7ff749ad3710 174 API calls 27864->27940 27883 7ff749beec92 malloc 27882->27883 27884 7ff749beec83 27883->27884 27885 7ff749beec9c 27883->27885 27884->27883 27886 7ff749beeca2 27884->27886 27885->27764 27887 7ff749beecad 27886->27887 27947 7ff749bef96c _CxxThrowException std::bad_alloc::bad_alloc 27886->27947 27948 7ff749ac2000 __std_exception_copy Concurrency::cancel_current_task 27887->27948 27890 7ff749beecb3 27890->27764 27892 7ff749adbe23 27891->27892 27893 7ff749adbd51 27891->27893 27949 7ff749ac2140 ?_Xlength_error@std@@YAXPEBD terminate 27892->27949 27894 7ff749adbd5f memmove 27893->27894 27895 7ff749adbd72 27893->27895 27897 7ff749ad6739 rand 27894->27897 27898 7ff749adbd83 27895->27898 27899 7ff749adbe28 27895->27899 27900 7ff749adbdda 27895->27900 27897->27770 27897->27771 27902 7ff749beec78 std::_Facet_Register 3 API calls 27898->27902 27950 7ff749ac2000 __std_exception_copy Concurrency::cancel_current_task 27899->27950 27901 7ff749adbd9e memmove 27900->27901 27904 7ff749beec78 std::_Facet_Register 3 API calls 27900->27904 27901->27897 27906 7ff749adbd99 27902->27906 27904->27901 27906->27901 27908 7ff749adbdd3 _invalid_parameter_noinfo_noreturn 27906->27908 27907 7ff749adbe2e 27908->27900 27910 7ff749adc163 27909->27910 27911 7ff749adc28f 27909->27911 27912 7ff749adc1be 27910->27912 27915 7ff749adc1e6 27910->27915 27916 7ff749adc1b1 27910->27916 27951 7ff749ac2140 ?_Xlength_error@std@@YAXPEBD terminate 27911->27951 27917 7ff749beec78 std::_Facet_Register 3 API calls 27912->27917 27914 7ff749adc294 27952 7ff749ac2000 __std_exception_copy Concurrency::cancel_current_task 27914->27952 27920 7ff749adc1d3 27915->27920 27921 7ff749beec78 std::_Facet_Register 3 API calls 27915->27921 27916->27912 27916->27914 27917->27920 27919 7ff749adc252 _invalid_parameter_noinfo_noreturn 27924 7ff749adc259 memmove 27919->27924 27920->27919 27923 7ff749adc20e memmove 27920->27923 27920->27924 27921->27920 27922 7ff749adc29a 27925 7ff749adc230 27923->27925 27926 7ff749adc245 27923->27926 27927 7ff749adc250 27924->27927 27925->27919 27925->27926 27928 7ff749beeb50 _Receive_impl free 27926->27928 27927->27771 27928->27927 27930->27783 27931->27788 27953 7ff749ac1c90 27932->27953 27934 7ff749ac1cd2 __stdio_common_vfprintf 27934->27792 27935->27856 27936->27843 27937->27859 27938->27860 27939->27862 27942 7ff749ad98a0 27941->27942 27942->27942 27943 7ff749adbd20 8 API calls 27942->27943 27944 7ff749ad742c 27943->27944 27945 7ff749adad50 7 API calls 27944->27945 27945->27824 27946->27830 27947->27887 27948->27890 27949->27899 27950->27907 27951->27914 27952->27922 27953->27934 28022 7ff749ac9a90 31 API calls _Receive_impl 28025 7ff749b11020 __stdio_common_vsprintf __stdio_common_vsprintf malloc memmove free 28108 7ff749afa78b 9 API calls 28026 7ff749acaa80 42 API calls _Receive_impl 28027 7ff749ad7e80 fflush 28111 7ff749af8380 strstr memmove malloc memmove free 28028 7ff749ae8480 89 API calls 28030 7ff749adc870 free _Receive_impl 28113 7ff749ad8970 _unlock_file 28032 7ff749adac6f ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exceptions@std@ ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 28033 7ff749ad8070 _fseeki64 fgetpos ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD fwrite 28115 7ff749ad4370 GetStdHandle SetConsoleTextAttribute 28034 7ff749af8670 7 API calls 28035 7ff749af2670 92 API calls 28036 7ff749aee870 malloc memmove free 28037 7ff749ac1c68 GetLastError IsDebuggerPresent OutputDebugStringW shared_ptr 28041 7ff749ac2a60 155 API calls 28116 7ff749ac1f60 __std_exception_destroy free _Receive_impl 27653 7ff749adde60 27654 7ff749adde8d 27653->27654 27657 7ff749addfb0 27654->27657 27656 7ff749addeee 27658 7ff749addff7 27657->27658 27661 7ff749ade173 27658->27661 27666 7ff749adcd70 ?_Xlength_error@std@@YAXPEBD 27658->27666 27660 7ff749ade1f4 27665 7ff749ad5310 76 API calls 27660->27665 27661->27656 27662 7ff749ade20b _Cnd_do_broadcast_at_thread_exit 27663 7ff749beeb50 _Receive_impl free 27662->27663 27664 7ff749ade21e 27663->27664 27664->27656 27665->27662 28043 7ff749ad9a60 8 API calls _Receive_impl 28118 7ff749ad8160 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J memmove fwrite 28119 7ff749ad9760 8 API calls 2 library calls 28047 7ff749acb060 35 API calls _Receive_impl

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 7ff749ad6690-7ff749ad66f7 call 7ff749beec78 _beginthreadex 3 7ff749ad746f-7ff749ad747f ?_Throw_Cpp_error@std@@YAXH@Z 0->3 4 7ff749ad66fd-7ff749ad671f rand 0->4 5 7ff749ad6726-7ff749ad672e 4->5 5->5 6 7ff749ad6730-7ff749ad6769 call 7ff749adbd20 rand 5->6 9 7ff749ad67e1-7ff749ad6800 SetConsoleTitleA 6->9 10 7ff749ad676b-7ff749ad676d 6->10 11 7ff749ad6802-7ff749ad6814 9->11 12 7ff749ad6837-7ff749ad68f2 GetConsoleWindow GetWindowLongPtrW SetWindowLongPtrW SetLayeredWindowAttributes GetStdHandle SetConsoleWindowInfo SetConsoleScreenBufferSize GetStdHandle SetConsoleTextAttribute FindWindowW 9->12 13 7ff749ad6770-7ff749ad67a7 rand 10->13 14 7ff749ad6816-7ff749ad6829 11->14 15 7ff749ad6832 call 7ff749beeb50 11->15 16 7ff749ad69a5-7ff749ad6ab6 Sleep GetStdHandle SetConsoleTextAttribute call 7ff749ad62c0 system call 7ff749aded60 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 Sleep CreateFileA 12->16 17 7ff749ad68f8-7ff749ad69a4 call 7ff749ad43d0 call 7ff749ac1ca0 * 2 call 7ff749ad43d0 call 7ff749ac1ca0 call 7ff749ad43d0 call 7ff749ac1ca0 call 7ff749ad43d0 call 7ff749ac1ca0 call 7ff749ad43d0 call 7ff749ac1ca0 call 7ff749ad43d0 call 7ff749ac1ca0 call 7ff749ad43d0 call 7ff749ac1ca0 SleepEx exit 12->17 18 7ff749ad67cc-7ff749ad67d1 call 7ff749adc130 13->18 19 7ff749ad67a9-7ff749ad67ca 13->19 14->15 20 7ff749ad682b-7ff749ad6831 _invalid_parameter_noinfo_noreturn 14->20 15->12 49 7ff749ad726f-7ff749ad7296 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff749ad7480 16->49 50 7ff749ad6abc-7ff749ad6ac0 16->50 17->16 24 7ff749ad67d6-7ff749ad67da 18->24 19->24 20->15 24->13 28 7ff749ad67dc 24->28 28->9 60 7ff749ad741f-7ff749ad7456 call 7ff749ad9880 call 7ff749adad50 call 7ff749ad9670 Sleep exit 49->60 61 7ff749ad729c-7ff749ad72a3 49->61 50->49 52 7ff749ad6ac6-7ff749ad6b67 call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 GetStdHandle SetConsoleTextAttribute call 7ff749ac1ca0 Sleep system 50->52 86 7ff749ad6da3-7ff749ad6df6 system ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 52->86 87 7ff749ad6b6d 52->87 85 7ff749ad7457-7ff749ad746e 60->85 65 7ff749ad72a9-7ff749ad72d6 61->65 66 7ff749ad73ea-7ff749ad73ed 61->66 71 7ff749ad72e0-7ff749ad73df 65->71 67 7ff749ad73f0-7ff749ad741d 66->67 67->60 67->67 71->71 75 7ff749ad73e5-7ff749ad73e8 71->75 75->60 75->66 89 7ff749ad6dfc-7ff749ad6e2a 86->89 90 7ff749ad6f3d-7ff749ad6f47 86->90 91 7ff749ad6b70-7ff749ad6b8b 87->91 93 7ff749ad6e30-7ff749ad6f31 89->93 94 7ff749ad6f50-7ff749ad6f81 90->94 95 7ff749ad6b90-7ff749ad6b9e 91->95 93->93 98 7ff749ad6f37-7ff749ad6f3b 93->98 94->94 99 7ff749ad6f83-7ff749ad6fb3 call 7ff749adab10 CreateToolhelp32Snapshot Process32FirstW 94->99 95->95 100 7ff749ad6ba0-7ff749ad6bfe FindWindowA ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 95->100 98->90 98->99 109 7ff749ad6fb5-7ff749ad6fcb lstrcmpiW 99->109 110 7ff749ad6fdf-7ff749ad6fe8 CloseHandle 99->110 101 7ff749ad6c04-7ff749ad6c2e 100->101 102 7ff749ad6d3d-7ff749ad6d47 100->102 106 7ff749ad6c33-7ff749ad6d32 101->106 108 7ff749ad6d50-7ff749ad6d7c 102->108 106->106 111 7ff749ad6d38-7ff749ad6d3b 106->111 108->108 113 7ff749ad6d7e-7ff749ad6d9d call 7ff749adab10 Sleep 108->113 114 7ff749ad7154-7ff749ad7163 CloseHandle 109->114 115 7ff749ad6fd1-7ff749ad6fdd Process32NextW 109->115 116 7ff749ad6fee-7ff749ad6ff0 110->116 111->102 111->113 113->86 113->91 114->116 115->109 115->110 119 7ff749ad6ff6-7ff749ad70a4 DeviceIoControl call 7ff749adae90 DeviceIoControl 116->119 120 7ff749ad70ab-7ff749ad70e1 GetConsoleWindow ShowWindow call 7ff749acaf60 call 7ff749acac90 GetForegroundWindow FindWindowA 116->120 119->120 128 7ff749ad70e3-7ff749ad7109 Sleep GetForegroundWindow FindWindowA 120->128 129 7ff749ad710b-7ff749ad7146 CreateThread call 7ff749ad3710 _Mtx_lock 120->129 128->128 128->129 132 7ff749ad7168-7ff749ad7173 129->132 133 7ff749ad7148-7ff749ad7153 ?_Throw_Cpp_error@std@@YAXH@Z 129->133 134 7ff749ad7175-7ff749ad7188 ?_Throw_Cpp_error@std@@YAXH@Z 132->134 135 7ff749ad7189-7ff749ad719a 132->135 133->114 134->135 136 7ff749ad71b0-7ff749ad71c1 135->136 137 7ff749ad719c 135->137 139 7ff749ad71c3-7ff749ad71ca 136->139 140 7ff749ad71fd-7ff749ad720f _Mtx_unlock 136->140 138 7ff749ad71a0-7ff749ad71ae 137->138 138->136 138->138 141 7ff749ad71f4-7ff749ad71fb 139->141 142 7ff749ad71cc-7ff749ad71d5 _Thrd_id 139->142 143 7ff749ad7211-7ff749ad7222 140->143 144 7ff749ad725e-7ff749ad7262 140->144 141->139 141->140 148 7ff749ad724c-7ff749ad7257 ?_Throw_Cpp_error@std@@YAXH@Z 142->148 149 7ff749ad71d7-7ff749ad71ec _Thrd_join 142->149 145 7ff749ad7224-7ff749ad7237 143->145 146 7ff749ad7258-7ff749ad725d call 7ff749beeb50 143->146 144->85 147 7ff749ad7268-7ff749ad726e terminate 144->147 145->146 150 7ff749ad7239-7ff749ad723f _invalid_parameter_noinfo_noreturn 145->150 146->144 147->49 148->146 152 7ff749ad7240-7ff749ad724b ?_Throw_Cpp_error@std@@YAXH@Z 149->152 153 7ff749ad71ee-7ff749ad71f1 149->153 150->152 152->148 153->141
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Window$Console$Handle$AttributeText$Sleep$V01@$Cpp_error@std@@FindThrow_$Create$??6?$basic_ostream@ClientD@std@@@std@@DeviceU?$char_traits@V01@@randsystem$AttributesCloseControlForegroundLayeredLongProcess32ScreenShow_invalid_parameter_noinfo_noreturnexit$AreaBufferChainExtendFileFirstFrameInfoIntoMtx_lockMtx_unlockNextRectSizeSnapshotSwapThrd_idThrd_joinThreadTitleToolhelp32Update__acrt_iob_func__stdio_common_vfprintf_beginthreadexlstrcmpimallocmemmoveterminate
                                          • String ID: Driver Vthread Initialized.$ Open Your Game... $ Starting Vthread.$##########################################################$##########################################################$*+-#dLG$.exe$3#-0kLG$?$AYUU$I]SJ$VALORANT $VALORANT $VALORANT-Win64-Shipping.exe$[ Selecione uma opcao: ]$\\.\microsoftAudioDriver$cls$vgk.sys
                                          • API String ID: 3318101912-1713587360
                                          • Opcode ID: 58325b5b92e50d84beab22bf055915522b333efd736027d8c4b25ea560b42fd3
                                          • Instruction ID: 400e1f8cd233b8d629f6799b4b79d7c7db5659440e8a57e521e4e72d8b58f7a7
                                          • Opcode Fuzzy Hash: 58325b5b92e50d84beab22bf055915522b333efd736027d8c4b25ea560b42fd3
                                          • Instruction Fuzzy Hash: 7782B121E1DB42C6F706FF34E8115A8F375EF95784F808336E91D66AA5EF2CA185C620

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00007FF749AD79D0: ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z.MSVCP140(00000000,0000000826299E00,7FFFFFFFFFFFFFFF,00007FF749AD5334), ref: 00007FF749AD79F0
                                            • Part of subcall function 00007FF749AD79D0: ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z.MSVCP140 ref: 00007FF749AD7A44
                                            • Part of subcall function 00007FF749AD79D0: ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z.MSVCP140 ref: 00007FF749AD7A60
                                            • Part of subcall function 00007FF749AD79D0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF749AD7A70
                                            • Part of subcall function 00007FF749AD79D0: ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z.MSVCP140 ref: 00007FF749AD7A7F
                                            • Part of subcall function 00007FF749AD79D0: ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z.MSVCP140 ref: 00007FF749AD7A93
                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00007FF749AD5368
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@CreateD@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_SnapshotToolhelp32V01@V123@V123@@Vfacet@23@_Yarn@
                                          • String ID: .exe$4.exe$4.exe$64.exe$86.exe$Cheat Engine.exe$FileAlyzer2.exe$HxD.exe$PEiD.exe$PPEE.exe$ResourceHacker.exe$SystemInformer.exe$cffexplorer.exe$cheatengine-x86_64.exe$classinformer.exe$die.exe$diec.exe$diel.exe$dnSpy.Console.exe$dnSpy.exe$dwnejfe.exe$fiddler.exe$heyrays.exe$hiew.exe$httpdebugger.exe$httpdebuggerpro.exe$ida-x86emu.exe$ida.exe$idag.exe$idaq.exe$idaw.exe$k.exe$lighthouse.exe$pexplorer.exe$processhacker.exe$reclass.exe$reclass.net.exe$scylla.exe$win64.exe$winhex.exe$x32dbg.exe
                                          • API String ID: 2343168805-1961145104
                                          • Opcode ID: c2aa34d9dec17a3424ba07f9574dd30700cd7e5ce9894e9afab7174bb9af57aa
                                          • Instruction ID: bae9b0200972dff767d02540ed8c7229f063b60c3381e5043bec1cc1e4a883b0
                                          • Opcode Fuzzy Hash: c2aa34d9dec17a3424ba07f9574dd30700cd7e5ce9894e9afab7174bb9af57aa
                                          • Instruction Fuzzy Hash: 2B622E22919BC6C9E331EF34DC453E97771FB95308F805226D6484AAAAEF7C9384C725

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 287 7ff749ad4c70-7ff749ad4ce2 WinHttpOpen 288 7ff749ad5071-7ff749ad508f 287->288 289 7ff749ad4ce8-7ff749ad4d07 WinHttpConnect 287->289 290 7ff749ad4d0d-7ff749ad4d3b WinHttpOpenRequest 289->290 291 7ff749ad5068-7ff749ad506b WinHttpCloseHandle 289->291 292 7ff749ad505f-7ff749ad5062 WinHttpCloseHandle 290->292 293 7ff749ad4d41-7ff749ad4d63 WinHttpSendRequest 290->293 291->288 292->291 294 7ff749ad5056-7ff749ad5059 WinHttpCloseHandle 293->294 295 7ff749ad4d69-7ff749ad4d76 WinHttpReceiveResponse 293->295 294->292 295->294 296 7ff749ad4d7c-7ff749ad4da9 WinHttpQueryOption 295->296 296->294 297 7ff749ad4daf-7ff749ad4db9 296->297 297->294 298 7ff749ad4dbf-7ff749ad4ddf CertGetCertificateContextProperty 297->298 299 7ff749ad4de5-7ff749ad4e85 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z 298->299 300 7ff749ad5049-7ff749ad5050 CertFreeCertificateContext 298->300 301 7ff749ad4ed4-7ff749ad4f05 299->301 302 7ff749ad4e87 299->302 300->294 304 7ff749ad4f07-7ff749ad4f11 301->304 305 7ff749ad4f28-7ff749ad4f2b 301->305 303 7ff749ad4e90-7ff749ad4ed2 ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z 302->303 303->301 304->305 306 7ff749ad4f13-7ff749ad4f26 304->306 307 7ff749ad4f4f-7ff749ad4f54 305->307 308 7ff749ad4f2d-7ff749ad4f37 305->308 310 7ff749ad4f59-7ff749ad4f5c 306->310 307->310 308->307 311 7ff749ad4f39-7ff749ad4f4d 308->311 312 7ff749ad4f6e-7ff749ad4f76 310->312 313 7ff749ad4f5e-7ff749ad4f68 call 7ff749ada7a0 310->313 311->310 315 7ff749ad4fc4 312->315 316 7ff749ad4f78-7ff749ad4f80 312->316 313->312 320 7ff749ad4fc9-7ff749ad4fcd 315->320 318 7ff749ad4f82-7ff749ad4f8f 316->318 319 7ff749ad4fae-7ff749ad4fc2 316->319 321 7ff749ad4f91-7ff749ad4fa4 318->321 322 7ff749ad4fa9 call 7ff749beeb50 318->322 319->320 323 7ff749ad5006-7ff749ad5043 call 7ff749ad9250 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 320->323 324 7ff749ad4fcf-7ff749ad4fe2 320->324 326 7ff749ad4fa6 321->326 327 7ff749ad4ff9-7ff749ad4fff _invalid_parameter_noinfo_noreturn 321->327 322->319 323->300 329 7ff749ad4fe4-7ff749ad4ff7 324->329 330 7ff749ad5000-7ff749ad5005 call 7ff749beeb50 324->330 326->322 327->330 329->327 329->330 330->323
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Http$U?$char_traits@$D@std@@@std@@$CloseHandle$??6?$basic_ostream@CertCertificateContextOpenRequestV01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?setw@std@@ConnectD@std@@@1@_FreeJ@1@_OptionPropertyQueryReceiveResponseSendSmanip@_U?$_V21@@V?$basic_streambuf@Vios_base@1@_invalid_parameter_noinfo_noreturn
                                          • String ID: CPlusPlusExample/1.0$GET$keyauth.win
                                          • API String ID: 2344859291-1529245692
                                          • Opcode ID: 3b27e803120749ada42dfe25c4cc31019500af22c34e4a92c79bbcb9bc67514f
                                          • Instruction ID: 933a847e3199f131010434d3d86c33201fe2e53f1b58e5c6792b34cac5ced392
                                          • Opcode Fuzzy Hash: 3b27e803120749ada42dfe25c4cc31019500af22c34e4a92c79bbcb9bc67514f
                                          • Instruction Fuzzy Hash: 10C18272B08B86C5EB10EF68E8406ADB7B1FB85B88F804135DA5D53A68DF3CD585C720

                                          Control-flow Graph

                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749BEECA8
                                            • Part of subcall function 00007FF749BEF96C: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF749BEF975
                                            • Part of subcall function 00007FF749BEF96C: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF749BEECAD,?,?,0000000100000000,00007FF749ADBDE4), ref: 00007FF749BEF986
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749BEECAE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
                                          • String ID:
                                          • API String ID: 594857686-0
                                          • Opcode ID: f6e090b98bb3fd59edc12deb9bfda9ec7db8b7c39569aeabf6f03ab84abc8a9f
                                          • Instruction ID: bc45c03a233c0613454836ff06c7df2ec36694198aedc07f9cc6cfd17b1c65e4
                                          • Opcode Fuzzy Hash: f6e090b98bb3fd59edc12deb9bfda9ec7db8b7c39569aeabf6f03ab84abc8a9f
                                          • Instruction Fuzzy Hash: 4651A071D1C206C6FB64FF39B945225AAB4EB08360FD58539E95D86AA0DE3CA444CB20

                                          Control-flow Graph

                                          APIs
                                          • memcmp.VCRUNTIME140 ref: 00007FF749AD5193
                                          • _Mtx_lock.MSVCP140 ref: 00007FF749AD51A7
                                          • _Mtx_unlock.MSVCP140 ref: 00007FF749AD51FB
                                            • Part of subcall function 00007FF749AC1E20: _Query_perf_frequency.MSVCP140 ref: 00007FF749AC1E2D
                                            • Part of subcall function 00007FF749AC1E20: _Query_perf_counter.MSVCP140 ref: 00007FF749AC1E36
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD52DD
                                          • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140 ref: 00007FF749AD52F3
                                          • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140 ref: 00007FF749AD52FF
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD5308
                                            • Part of subcall function 00007FF749AD4C70: WinHttpOpen.WINHTTP ref: 00007FF749AD4CD6
                                            • Part of subcall function 00007FF749AD4C70: WinHttpConnect.WINHTTP ref: 00007FF749AD4CFB
                                            • Part of subcall function 00007FF749AD4C70: WinHttpOpenRequest.WINHTTP ref: 00007FF749AD4D2F
                                            • Part of subcall function 00007FF749AD4C70: WinHttpSendRequest.WINHTTP ref: 00007FF749AD4D5B
                                            • Part of subcall function 00007FF749AD4C70: WinHttpReceiveResponse.WINHTTP ref: 00007FF749AD4D6E
                                            • Part of subcall function 00007FF749AD4C70: WinHttpQueryOption.WINHTTP ref: 00007FF749AD4DA1
                                            • Part of subcall function 00007FF749AD4C70: CertGetCertificateContextProperty.CRYPT32 ref: 00007FF749AD4DD7
                                            • Part of subcall function 00007FF749AD4C70: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD4DF4
                                            • Part of subcall function 00007FF749AD4C70: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF749AD4E11
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Http$U?$char_traits@$Cpp_error@std@@D@std@@@std@@OpenRequestThrow_$??0?$basic_ios@??0?$basic_ostream@CertCertificateConnectContextD@std@@@1@_Mtx_lockMtx_unlockOptionPropertyQueryQuery_perf_counterQuery_perf_frequencyReceiveResponseSendV?$basic_streambuf@_invalid_parameter_noinfo_noreturnexitmemcmp
                                          • String ID: .exe$4.exe$4.exe$64.exe$86.exe$@$Cheat Engine.exe$FileAlyzer2.exe$HxD.exe$PEiD.exe$PPEE.exe$ResourceHacker.exe$SystemInformer.exe$cffexplorer.exe$cheatengine-x86_64.exe$classinformer.exe$die.exe$diec.exe$diel.exe$dnSpy.Console.exe$dnSpy.exe$dwnejfe.exe$f692b2828aa525d4513302117535c6c0d0cb304f574a1cd32ef3e1d07129217a$fiddler.exe$heyrays.exe$hiew.exe$httpdebugger.exe$httpdebuggerpro.exe$ida-x86emu.exe$ida.exe$idag.exe$idaq.exe$idaw.exe$k.exe$lighthouse.exe$pexplorer.exe$processhacker.exe$reclass.exe$reclass.net.exe$scylla.exe$win64.exe$winhex.exe$x32dbg.exe
                                          • API String ID: 1146069243-3170461996
                                          • Opcode ID: 7ca3d7068d79b48757243ce028debf0c35ec7d4de373dc6a634796a216c91e8f
                                          • Instruction ID: 272cba077c07d580a6c648c6543fc8ff7060a7a52fdb783a2f4f6f42cf532334
                                          • Opcode Fuzzy Hash: 7ca3d7068d79b48757243ce028debf0c35ec7d4de373dc6a634796a216c91e8f
                                          • Instruction Fuzzy Hash: A851B421B0C686C1EA60FF25E450679B372EB82BA5F840235DA6D476E9EF3CD449C730

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • _Mtx_lock.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00007FF749ADB120
                                          • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00007FF749ADB12F
                                          • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00007FF749ADB150
                                          • _Mtx_unlock.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?), ref: 00007FF749ADB170
                                          • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ADB21B
                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ADB242
                                          • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140 ref: 00007FF749ADB292
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cpp_error@std@@Throw_$Mtx_lockMtx_unlock_beginthreadexmallocterminate
                                          • String ID:
                                          • API String ID: 3634671060-0
                                          • Opcode ID: 766bf7a60edc71622f0423d545f8a9bd1f8c91c650260c8584a1d3c9c3426470
                                          • Instruction ID: 4e2e6935375c6727dd97c0556c4edda2647cc8b63e327fda7d8e9a155a718aad
                                          • Opcode Fuzzy Hash: 766bf7a60edc71622f0423d545f8a9bd1f8c91c650260c8584a1d3c9c3426470
                                          • Instruction Fuzzy Hash: 68511932A0CB81C6E650EF24E844769B7B5FB85750F958235EA8D43BA4EF3CD494CB20

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cpp_error@std@@Throw_$Mtx_lockMtx_unlock_beginthreadexmallocterminate
                                          • String ID:
                                          • API String ID: 3634671060-0
                                          • Opcode ID: e49e3845a42e1e84fa3c2118c704d503ddbbabcf90727ac7529d88f06ee20640
                                          • Instruction ID: 301b935d3d3d684b9e1f701f178e511b65f5313f81606a51200243e3ef93ce62
                                          • Opcode Fuzzy Hash: e49e3845a42e1e84fa3c2118c704d503ddbbabcf90727ac7529d88f06ee20640
                                          • Instruction Fuzzy Hash: E3511732A1CB85C6E650AF24E84036AB7B5FB85750F948235E69D43BA4DF3CD494CB60

                                          Control-flow Graph

                                          APIs
                                          • ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z.MSVCP140(00000000,0000000826299E00,7FFFFFFFFFFFFFFF,00007FF749AD5334), ref: 00007FF749AD79F0
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z.MSVCP140 ref: 00007FF749AD7A44
                                          • ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z.MSVCP140 ref: 00007FF749AD7A60
                                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF749AD7A70
                                          • ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z.MSVCP140 ref: 00007FF749AD7A7F
                                          • ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z.MSVCP140 ref: 00007FF749AD7A93
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
                                          • String ID:
                                          • API String ID: 3292048638-0
                                          • Opcode ID: b2cf20d169a2e2b380762da12cdda27ec7e7083defb4afeeec23ba4b5ad9d845
                                          • Instruction ID: f9e6c6560fbd95bf6b61fac0e035240a4a788274c26e7d076a1ad63914b62034
                                          • Opcode Fuzzy Hash: b2cf20d169a2e2b380762da12cdda27ec7e7083defb4afeeec23ba4b5ad9d845
                                          • Instruction Fuzzy Hash: 2F311D32A09B45D6DB25EF62E854269B371FB98B84F544139CB8E43B24EF3CE094C350

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 383 7ff749ad4a00-7ff749ad4a26 384 7ff749ad4b0b-7ff749ad4b12 383->384 385 7ff749ad4a2c-7ff749ad4a46 383->385 387 7ff749ad4b14-7ff749ad4b23 384->387 388 7ff749ad4b40-7ff749ad4b52 384->388 386 7ff749ad4a50-7ff749ad4a58 385->386 386->384 389 7ff749ad4a5e-7ff749ad4a6d _Mtx_lock 386->389 387->388 390 7ff749ad4b25-7ff749ad4b35 387->390 391 7ff749ad4a73-7ff749ad4a7d 389->391 392 7ff749ad4b69-7ff749ad4bb7 ?_Throw_Cpp_error@std@@YAXH@Z 389->392 390->388 399 7ff749ad4b37-7ff749ad4b3a 390->399 395 7ff749ad4b53-7ff749ad4b68 ?_Throw_Cpp_error@std@@YAXH@Z 391->395 396 7ff749ad4a83-7ff749ad4a98 391->396 394 7ff749ad4bc0-7ff749ad4bc9 392->394 400 7ff749ad4c21-7ff749ad4c2e 394->400 401 7ff749ad4bcb-7ff749ad4bd3 394->401 395->392 397 7ff749ad4ab2-7ff749ad4ad1 _Mtx_unlock call 7ff749ac1e20 396->397 398 7ff749ad4a9a-7ff749ad4aae call 7ff749ac1e20 396->398 411 7ff749ad4ad3-7ff749ad4ade 397->411 412 7ff749ad4aed 397->412 398->397 399->388 404 7ff749ad4c30-7ff749ad4c3f 400->404 405 7ff749ad4c5c-7ff749ad4c6a 400->405 401->400 406 7ff749ad4bd5-7ff749ad4bef call 7ff749ad4970 call 7ff749ac1e20 401->406 404->405 409 7ff749ad4c41-7ff749ad4c51 404->409 422 7ff749ad4bf1-7ff749ad4bfc 406->422 423 7ff749ad4c0b 406->423 409->405 418 7ff749ad4c53-7ff749ad4c56 409->418 411->412 414 7ff749ad4ae0-7ff749ad4aeb 411->414 416 7ff749ad4af2-7ff749ad4af7 call 7ff749add090 412->416 414->416 421 7ff749ad4afc-7ff749ad4b05 416->421 418->405 421->384 421->386 422->423 425 7ff749ad4bfe-7ff749ad4c09 422->425 424 7ff749ad4c10-7ff749ad4c15 call 7ff749add090 423->424 427 7ff749ad4c1a-7ff749ad4c1f 424->427 425->424 427->394 427->400
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cpp_error@std@@Throw_$Mtx_lockMtx_unlockQuery_perf_counterQuery_perf_frequency
                                          • String ID:
                                          • API String ID: 481711783-0
                                          • Opcode ID: 7b4476e6041a88863554600ce5ec099d44dc0b7b31ad1337564c37308a110317
                                          • Instruction ID: 8d6124de3e47c96ca8e10a3ab4d3f3ab9b51110a1c9e7876ea6f0847de76c809
                                          • Opcode Fuzzy Hash: 7b4476e6041a88863554600ce5ec099d44dc0b7b31ad1337564c37308a110317
                                          • Instruction Fuzzy Hash: F3519132B0CA45C2EA10BF25E490679B7B1AB81BA5F984631DA7E477E4DE2CD441C770

                                          Control-flow Graph

                                          APIs
                                          • memmove.VCRUNTIME140(?,?,?,?,?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC214
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC252
                                          • memmove.VCRUNTIME140(?,?,?,?,?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC25C
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADC295
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2016347663-0
                                          • Opcode ID: 5c459573c8fff69298ec70e193bfbdcd045d49616a1d00e89316d36dd3a6d954
                                          • Instruction ID: 5b7092fbaaec23f46548a5d2710e5764f7566cb31f63f846c199f962e95bedba
                                          • Opcode Fuzzy Hash: 5c459573c8fff69298ec70e193bfbdcd045d49616a1d00e89316d36dd3a6d954
                                          • Instruction Fuzzy Hash: 7831AF22B0C782C4EA10BF55A544669E276AB45BD4FD80735EE6D0BB95DE7CD081C320

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Query_perf_counterQuery_perf_frequencyThrd_sleepXtime_get_ticks
                                          • String ID:
                                          • API String ID: 3083224308-0
                                          • Opcode ID: ebb96c7c9c01a2e57c7859afa675921fc659dea8244a6ae599a3112cff949e2b
                                          • Instruction ID: 4fa9f8e78f14e0e8319203c0c293b3469fbe8d6618ae4f4f97e8407553fa16cd
                                          • Opcode Fuzzy Hash: ebb96c7c9c01a2e57c7859afa675921fc659dea8244a6ae599a3112cff949e2b
                                          • Instruction Fuzzy Hash: C611D622B1CB85C2D615BF29A5044AAE376FF887D0F844232EA8E57A54EF3CE146C750

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: __acrt_iob_func__stdio_common_vfprintf
                                          • String ID:
                                          • API String ID: 2168557111-0
                                          • Opcode ID: d768a81d5ef2b8cb909ec7493a0f1d899398842cf89ee27ca2851b73b75b9222
                                          • Instruction ID: 32cd282b5fb5d52cdb74b83768242fc56920a03a3ba643191b55271ee7daac8c
                                          • Opcode Fuzzy Hash: d768a81d5ef2b8cb909ec7493a0f1d899398842cf89ee27ca2851b73b75b9222
                                          • Instruction Fuzzy Hash: 68E01532A08B8592D600AF50F81449AB3A8FB98BC8F804035EB8C47A28DF7CC5A4CB50

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cnd_do_broadcast_at_thread_exit
                                          • String ID:
                                          • API String ID: 2632783013-0
                                          • Opcode ID: a4d73551a75a1a1785608cfcca989f4518367fb384828b57503ac0e936427d89
                                          • Instruction ID: 82c3a1e614451e2e93e8bfdfc6f0fbbf0ae2dc4cf1e226e6de00bf4b3f6f827c
                                          • Opcode Fuzzy Hash: a4d73551a75a1a1785608cfcca989f4518367fb384828b57503ac0e936427d89
                                          • Instruction Fuzzy Hash: 02619C32B18B84C2DB20AF15E4448AAB3B1F758BD0BA44631EEAD47B44DF3CE551C760

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cnd_do_broadcast_at_thread_exit
                                          • String ID:
                                          • API String ID: 2632783013-0
                                          • Opcode ID: 5d150f0ce3d59287c19cf8e44078179ff12a69cd384ff0563eeb5f377b69e31f
                                          • Instruction ID: 91cf7d1547119f5b09de4d65397e90be309d2ac3160f0e9858fdb5a42f69a741
                                          • Opcode Fuzzy Hash: 5d150f0ce3d59287c19cf8e44078179ff12a69cd384ff0563eeb5f377b69e31f
                                          • Instruction Fuzzy Hash: 01113A3A708B4482DB60AF29E44416DB3B1F788FA4B688635DA9D47768CF38C842C710

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cnd_do_broadcast_at_thread_exit
                                          • String ID:
                                          • API String ID: 2632783013-0
                                          • Opcode ID: ccae7018a7d429d7e53ca3c647c448e024a38ebc71a532f5cb2b325fbfce401d
                                          • Instruction ID: 6d53b56f37d1560c48e4a17d7af3256eb6990621ffde6b54e7824b3451270d3c
                                          • Opcode Fuzzy Hash: ccae7018a7d429d7e53ca3c647c448e024a38ebc71a532f5cb2b325fbfce401d
                                          • Instruction Fuzzy Hash: C2111C36B09F44C2DA50AF2AE48416DB370F789FA8B698535DEAD47764CF28C942C750
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memmove$??6?$basic_ostream@CreateD@std@@@std@@MessageStringU?$char_traits@UuidV01@exitmemcmp$?setw@std@@FreeJ@1@_Smanip@_ThreadU?$_V21@@Vios_base@1@memsetsystem
                                          • String ID: 9/0$$B@QU$BFTG$CEJB$GN_^$K\C$ND[C$Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $WA$W]GP$YN_^$^R\H
                                          • API String ID: 2665268123-4031576690
                                          • Opcode ID: d307b5e85d7ce7bed47ecd707ba1a3ee98f73c78c5256f3e81a4ac3a52822c85
                                          • Instruction ID: 7bd5be76fe5cf7eba5c2453306c767d87cd1ba796757fa4960dfc60c06321fc4
                                          • Opcode Fuzzy Hash: d307b5e85d7ce7bed47ecd707ba1a3ee98f73c78c5256f3e81a4ac3a52822c85
                                          • Instruction Fuzzy Hash: DEA29E22A1CBC5C5E720EF64D8443EDB771FB95788F805225DA8D4AEAADF78D284C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: strchr$strncmp$_time64memmovestrrchr
                                          • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                          • API String ID: 3256620195-3844637060
                                          • Opcode ID: 85e651bebd56f15884e4893a2aa50f583e157d36cbc6d90475263c70dc735ef5
                                          • Instruction ID: 604f8f3eb190110b5a4c640c7df3bf801c47bee707cfe6ae6742fff2ce179a17
                                          • Opcode Fuzzy Hash: 85e651bebd56f15884e4893a2aa50f583e157d36cbc6d90475263c70dc735ef5
                                          • Instruction Fuzzy Hash: 70728C21E8CB8AD6FB60BF2595443B9A7B0EF55794F844131CE8E42B96DF2CE444E320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free$memset$malloc$cosf
                                          • String ID:
                                          • API String ID: 808227049-0
                                          • Opcode ID: 6e3dabd0642f209158e7387bafb3cdc13a0d4a108e8882c445b1df4fbfe23c0f
                                          • Instruction ID: f671d0146dbcdf5fe373fd2f0bad1c1dfcc8723bb021cdb953a1df4d4fda10f4
                                          • Opcode Fuzzy Hash: 6e3dabd0642f209158e7387bafb3cdc13a0d4a108e8882c445b1df4fbfe23c0f
                                          • Instruction Fuzzy Hash: ABC2EF32A18689CAE795AF359444B79B7B4FF48B84F498636DE0D53B94DF38E840C720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free$acosfceilfcosffclosefwritememmove
                                          • String ID: (Auto-disabled ImGuiDebugLogFlags_EventClipper to avoid spamming)$333?$Click %s Button to break in debugger! (remap w/ Ctrl+Shift)$Debug##Default$HoveredId: 0x%08X$Left$Middle$NewFrame(): ClearActiveID() because it isn't marked alive anymore!$Press ESC to abort picking.$Remap w/ Ctrl+Shift: click anywhere to select new mouse button.$Right$gfff
                                          • API String ID: 496961473-1374454768
                                          • Opcode ID: 57f929a5a92d868ca87d8b4575bcd6d46d2f54a54dc32613ebc11d931059666d
                                          • Instruction ID: dded804fcf4055c712a727fef83ca5ffb936a111872d633572310579f994b00a
                                          • Opcode Fuzzy Hash: 57f929a5a92d868ca87d8b4575bcd6d46d2f54a54dc32613ebc11d931059666d
                                          • Instruction Fuzzy Hash: ABC2D032A0CBC6C6EB25FF3594406B9B7B0EF55B84F888636DA4957295DF38A540C730
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$mallocmemset
                                          • String ID: ##Background$%.3f$?cNN$@B$AIMBOT$AIMBOT SETTINGS$Aimbot$Box Type$COLOR PICKER$Colors$D^$EDL$Enable Visible Check Aimbot$IMGUI$LV$MISC$MISC SETTINGS$Misc$RICKZ$Rvxx$Smooth Aimbot$VISUALS$VISUALS OTHERS$Visuals$Xsqq$]$hCAA$m
                                          • API String ID: 2103313550-774502681
                                          • Opcode ID: d0a3228106ad79439c14e5eb1c4570cd08b0df5f84f5ab2a385999102fb52178
                                          • Instruction ID: 3346cd0034340f04496d51770ffbff0c20101285d7e7ea6f7ad2f28b0c9c37b6
                                          • Opcode Fuzzy Hash: d0a3228106ad79439c14e5eb1c4570cd08b0df5f84f5ab2a385999102fb52178
                                          • Instruction Fuzzy Hash: 3113C07291C785CAD711EF3694411A9F770FF9A788F948732EA0817AA5EF39E045CB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Service$CloseHandle$Open$Manager$Sleep$ControlCreateDeleteErrorLastQueryStatus
                                          • String ID: C:\Windows\System32\drivers\scraidy.sys$scraidy
                                          • API String ID: 836779559-2569390712
                                          • Opcode ID: 701a2d20bf4b54d02995cd5c8630c11579726995f419f96186d4ffb6545d475c
                                          • Instruction ID: 0cad6bc10af24eecbc19232844eb6ef12bccf3dff08030a8c0a16634435ff35a
                                          • Opcode Fuzzy Hash: 701a2d20bf4b54d02995cd5c8630c11579726995f419f96186d4ffb6545d475c
                                          • Instruction Fuzzy Hash: 10513822F0CB46D2EA54BF21A4487B9B2B2AF49F84F940135D95E42B54EE3CE444CB30
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ConditionMask$AddressProc$DirectoryLibraryLoadSystem$CleanupFrequencyHandleInfoModulePerformanceQueryStartupVerifyVersionstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                                          • API String ID: 3585141038-2794540096
                                          • Opcode ID: 02060b970d3277317ae5175a706a45eb3e9cd0c1bc6e341e47773b86e2104bce
                                          • Instruction ID: 49e79dd8ab94bcdab5dcaa5a12cf00108c8b4f0d26269f8fc08f72d1cf48e41e
                                          • Opcode Fuzzy Hash: 02060b970d3277317ae5175a706a45eb3e9cd0c1bc6e341e47773b86e2104bce
                                          • Instruction Fuzzy Hash: 78918225A0DB8AD1EB60FF25A4543B9A3B0FF88B94F858135C94D46B58EF2CE545C720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Sleep_invalid_parameter_noinfo_noreturn
                                          • String ID: 2$3$4$6$MUWc~>$O$V2345678$^OUc~>$aZRZAYZ8s$bBVWADR8p@VG5$bFZZRSE8|SAG]W[T9$bZ\FAO7$gS]PTZ7$sGP_L6$vZ\GA6$w@VZOO7$z\ZRP6$~VZZ5
                                          • API String ID: 414566877-496316818
                                          • Opcode ID: b10e85be313462a43617ba9d04383e8c5ea1aa52a8beed2f7d7db4d211ee1602
                                          • Instruction ID: 09d01dabf429e94e676ec41257ef11735b7742b76d3fcf98731d79e3c9b2128f
                                          • Opcode Fuzzy Hash: b10e85be313462a43617ba9d04383e8c5ea1aa52a8beed2f7d7db4d211ee1602
                                          • Instruction Fuzzy Hash: DE53F626D2D7918AF703FB3994015A8F774AFA3384F90D326FD5435A96EF39A182C214
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: array$object$object key$object separator$value
                                          • API String ID: 0-2448007618
                                          • Opcode ID: 73685c540323dba79dd54109951890683931be1c317d32ae15efa26c9fe43510
                                          • Instruction ID: eb5eed86183c4accc487df1cd5d868d0a1c96a3410a8d4d764f2a3eec5e5197a
                                          • Opcode Fuzzy Hash: 73685c540323dba79dd54109951890683931be1c317d32ae15efa26c9fe43510
                                          • Instruction Fuzzy Hash: D5228C22A1CA8AC6EB10FF64D4447EEA771FB81748F901132EA8D16E9ADF78D584C750
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: array$object$object key$object separator$value
                                          • API String ID: 0-2448007618
                                          • Opcode ID: 26d962b8d441c3dedbbbb29ee52bbb4e928ecdb2971199b0b48bf1a40d94c98f
                                          • Instruction ID: 3304b5b4f3357a0d571617a41e4051f4c126f253a4619d19f2b9cc3d58a17e7b
                                          • Opcode Fuzzy Hash: 26d962b8d441c3dedbbbb29ee52bbb4e928ecdb2971199b0b48bf1a40d94c98f
                                          • Instruction Fuzzy Hash: 12227C22A0CA86C5FB10FF64D4447EEB771EB85394FA01136EA4D43AAADF78D185C760
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ForegroundMessagePeekWindow
                                          • String ID: ##Foreground$0$2$3$4$@$I$T PLUS]$xV_Q5
                                          • API String ID: 4245416934-3672994078
                                          • Opcode ID: 67dabaf95d1937a4425e8be93f1eab7d25092e8db33e53d4b6cbf8110c40585c
                                          • Instruction ID: adb8dd15f37854a4c01d2881127c1110492816550131a5837e485035f80ae73f
                                          • Opcode Fuzzy Hash: 67dabaf95d1937a4425e8be93f1eab7d25092e8db33e53d4b6cbf8110c40585c
                                          • Instruction Fuzzy Hash: 16510D72A0C786C6E710FF25E444669FBB1FB95744F945235E94D42A64EF3CE481CB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$fgetsmemmove$ExceptionFileModuleNameThrow__std_exception_copy_pclose_popen
                                          • String ID: >$certutil -hashfile "$out_of_range
                                          • API String ID: 3288468681-3897552408
                                          • Opcode ID: 6510543f03078bb7fb671b503ad7ceb2b8690ce5723715c8e11cb0f59993d836
                                          • Instruction ID: 4e010e18d3d93cd9435033448095d2950283093d21c2821ad224e525fa645501
                                          • Opcode Fuzzy Hash: 6510543f03078bb7fb671b503ad7ceb2b8690ce5723715c8e11cb0f59993d836
                                          • Instruction Fuzzy Hash: D7F18D62A1CB85C5EB10AF64E8443ADB771FB897A4F904225EAAD03ED9DF7CD184C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AddressPerformanceProcQuery$CounterFrequencyLibraryLoadmalloc
                                          • String ID: XInputGetCapabilities$XInputGetState$imgui_impl_win32$xinput1_1.dll$xinput1_2.dll$xinput1_3.dll$xinput1_4.dll$xinput9_1_0.dll
                                          • API String ID: 1729990740-3912092517
                                          • Opcode ID: 5d16b1a454f6086245221bac3adaa1316b62f59b58f6a2780880fc5828ad8a08
                                          • Instruction ID: 031109dff4be6bcd6c3626d1d6f8b096007eebaef0bdb5e89f64b1c06c5e4c2a
                                          • Opcode Fuzzy Hash: 5d16b1a454f6086245221bac3adaa1316b62f59b58f6a2780880fc5828ad8a08
                                          • Instruction Fuzzy Hash: 9C411C36A0DB85C6DB50AF25E9402A9B3B4FB48790F945235CA8D43B64EF38E0A5C720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: socket$acceptbindclosesocketconnectgetsocknamehtonllistenmemcmprecvsendsetsockopt
                                          • String ID:
                                          • API String ID: 3699910901-0
                                          • Opcode ID: 133dc53e49ff486b1abf0263fa69a87d1e3cf9424f526a89315ba18d5cebed77
                                          • Instruction ID: 9e792511f3643de409144e1dc19574e6ab695d72afb1e2ad2169012b6c08e5ad
                                          • Opcode Fuzzy Hash: 133dc53e49ff486b1abf0263fa69a87d1e3cf9424f526a89315ba18d5cebed77
                                          • Instruction Fuzzy Hash: B3516D3160CA4AD6E660BF25E454169B371EB84BB4F948730EA7A43EE8DF3DD845C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: sqrtf$acosf$cosfsinf
                                          • String ID: gfffffff
                                          • API String ID: 915383915-1523873471
                                          • Opcode ID: 497b745c25cdbde6daffa1192b6a1c226794e41ff69bfd7b8fc26ae35395b1f9
                                          • Instruction ID: cddea246504262d2afb49f03e053a9c5aa5b9528ab29fb55061d3c4b287bf542
                                          • Opcode Fuzzy Hash: 497b745c25cdbde6daffa1192b6a1c226794e41ff69bfd7b8fc26ae35395b1f9
                                          • Instruction Fuzzy Hash: B8927133D24ACCDAD352DF3784825A9B760FF6E388B19D712EA04369A1EB34B195D740
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Compile$memset
                                          • String ID: @$COLOR$POSITION$TEXCOORD$cbuffer vertexBuffer : register(b0) { float4x4 ProjectionMatrix; }; struct VS_INPUT { float2 pos : POSITION; float4 col : COLOR0; float2 uv : TEXCOORD0; $main$ps_4_0$struct PS_INPUT { float4 pos : SV_POSITION; float4 col : COLOR0; float2 uv : TEXCOORD0; }; sampler sampler0; Texture2D texture0; float4 main(PS_INPUT input) : $vs_4_0
                                          • API String ID: 2361541216-1668656389
                                          • Opcode ID: 3e3efe9f899fcc3453dbb01c5e6edbe615ca13edcfca83c278973f11ec4865ef
                                          • Instruction ID: a444471b2abe0fbae6c515ddb35658da8024792f7f49840fadc2adb642375fc1
                                          • Opcode Fuzzy Hash: 3e3efe9f899fcc3453dbb01c5e6edbe615ca13edcfca83c278973f11ec4865ef
                                          • Instruction Fuzzy Hash: 1FE1DE72A08B85CAE720DF65E8447DD77B4F788B88F508126DA8C17B18DF79D258CB40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ##Text$##picker$#%02X%02X%02X$#%02X%02X%02X%02X$%02X%02X%02X$%02X%02X%02X%02X$M:0.000$M:000$RICKZ$_COL3F$_COL4F$picker
                                          • API String ID: 0-96551478
                                          • Opcode ID: a1f3544b8bd150173e195c08d2fc48ad3f9fb27004041c6184ddfd324cf6ff51
                                          • Instruction ID: 3a26b91dcfc9c9dddfa76a979347388794ad81294b53c7952a55bf088d487010
                                          • Opcode Fuzzy Hash: a1f3544b8bd150173e195c08d2fc48ad3f9fb27004041c6184ddfd324cf6ff51
                                          • Instruction Fuzzy Hash: 44A2A432A0CAC9CAE711EF3694456EAF7B0FF99344F944335EA4956AA5DF38E140CB10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _errno$strtol
                                          • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                          • API String ID: 3596500743-988243589
                                          • Opcode ID: 6e8b7eba491fc427078a42a43ca31a2a725f6cb307bb8050a89f49917d1450f2
                                          • Instruction ID: e208885e7cc9d8508c9fe4791ce954084412e863266d9f2392228476504ae77f
                                          • Opcode Fuzzy Hash: 6e8b7eba491fc427078a42a43ca31a2a725f6cb307bb8050a89f49917d1450f2
                                          • Instruction Fuzzy Hash: C3F1F672F0C519DAEB24BF6894002BCB3B1AB447ACF954235DE1E97BD8DE78A805C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: State$Client$CursorScreen$CounterForegroundPerformanceQueryRectWindow
                                          • String ID:
                                          • API String ID: 1576454153-0
                                          • Opcode ID: 1ed9d247d194867744db2e866ebf593c4e00b2ce19eaa5414103f66dd0546505
                                          • Instruction ID: c30c30a3c05fea9ec761a6b0014c75f7b7f96ea3fba23015d96e1506f1d481ce
                                          • Opcode Fuzzy Hash: 1ed9d247d194867744db2e866ebf593c4e00b2ce19eaa5414103f66dd0546505
                                          • Instruction Fuzzy Hash: 4991BE62A0CA99C6FB51FF34D4057A9F7B1EB45784F884232DA4807A95DF7CE484CB20
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #%02X%02X%02X$#%02X%02X%02X%02X$(%.3ff, %.3ff, %.3ff, %.3ff)$(%d,%d,%d,%d)$0..255$0.00..1.00$Copy$Copy as..$HSV$Hex$RGB$Uwa:$context
                                          • API String ID: 0-655895548
                                          • Opcode ID: 799481ac7a1afe4610221c103e4a4053a1d9ac3da19bb34017cf7c71a4d5e449
                                          • Instruction ID: 178f13e2085d8b98b44d8fedae40296bf4076afc6606d4a75ef69ce641ab1fe0
                                          • Opcode Fuzzy Hash: 799481ac7a1afe4610221c103e4a4053a1d9ac3da19bb34017cf7c71a4d5e449
                                          • Instruction Fuzzy Hash: 9CE1BA22A0C78AC5E721FF35A4453F9A3B1EF85B44F984236EA0D17AA5DF38E545C321
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free$mallocmemmovesqrtf
                                          • String ID:
                                          • API String ID: 2108133213-0
                                          • Opcode ID: fb696ca6938b1149ad0cabad2eddbb0ceb84c47f548036957a340cb221095317
                                          • Instruction ID: 3cbf45bdd64975b0df355eb32a5bb2f25c6c53259b678ae5e449d6cd0f43b003
                                          • Opcode Fuzzy Hash: fb696ca6938b1149ad0cabad2eddbb0ceb84c47f548036957a340cb221095317
                                          • Instruction Fuzzy Hash: 65627C22E2CBE885D313AB365041679F7B1AF6E784F59C723ED44A6A61EB3CE441C710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ClipboardGlobal$ByteCharMultiWide$AllocCloseDataEmptyFreeLockOpenUnlock
                                          • String ID:
                                          • API String ID: 1965520120-0
                                          • Opcode ID: 650826a05215473357bbc11d37bcd4f04e39f95dd0a8a53335e0b091c18a23e6
                                          • Instruction ID: bed036a0e300bc400eed80049f959c915a64e861ffe19e2222586f5fd833fcd9
                                          • Opcode Fuzzy Hash: 650826a05215473357bbc11d37bcd4f04e39f95dd0a8a53335e0b091c18a23e6
                                          • Instruction Fuzzy Hash: 22111FA5B0DB46C2EB14BF25B818529E6B1FF89BD5F444135DA4E87BA8EE3CE404C710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Clipboard$ByteCharCloseGlobalMultiWide$DataLockOpenUnlockfree
                                          • String ID:
                                          • API String ID: 2227228011-0
                                          • Opcode ID: 8608986681c3322f89047543b6247a58869cda2175223705bc6072ccf1bce7f7
                                          • Instruction ID: c272866475616a6d45c13da5d54aecdeb391a01cf757e1d55792e5d21714511c
                                          • Opcode Fuzzy Hash: 8608986681c3322f89047543b6247a58869cda2175223705bc6072ccf1bce7f7
                                          • Instruction Fuzzy Hash: 38315E3270DB46C2E710BF29A84092AB6B0FB84B94F844135DE9E87B58EF3CE441C725
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                          • String ID: invalid string: ill-formed UTF-8 byte
                                          • API String ID: 15630516-1928180049
                                          • Opcode ID: 8ca89faf5acb32704b325803ea06bf115222bfed7f399c4d5089aa7d77829052
                                          • Instruction ID: 23d9f1a454ede29e7e546c1e96fabac0ecc2cebb7824b644e281db73a2c38198
                                          • Opcode Fuzzy Hash: 8ca89faf5acb32704b325803ea06bf115222bfed7f399c4d5089aa7d77829052
                                          • Instruction Fuzzy Hash: 47F18B22A1CB89C6EB20EFA5E4403ADA772EB45798F804635DA6D17FD9DF38D049C350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: OpenService$CloseHandleManager
                                          • String ID: scraidy
                                          • API String ID: 4136619037-2706037857
                                          • Opcode ID: bd769b32547e3e160308a18c90c099c137b24dd6cf816f375c447d752fa59c58
                                          • Instruction ID: a152a100cb2a1f9ca43995a87b5b30688b51e777ee3b5e71484309a09bdd6f36
                                          • Opcode Fuzzy Hash: bd769b32547e3e160308a18c90c099c137b24dd6cf816f375c447d752fa59c58
                                          • Instruction Fuzzy Hash: 51014C26F1CB55C2EB59BB26B59463DA2A1AB88FC0F845031DD5E43F18EE2CD4868B10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: sqrtf
                                          • String ID:
                                          • API String ID: 321154650-0
                                          • Opcode ID: 28de63066efe535c577e54bdd1c2e5e541060b5269be80aa09ed5bd297dd95ff
                                          • Instruction ID: ce6a073c72413215bbaec4ba8a307d19decfc6429d3b3505c5325f24ad51f4b1
                                          • Opcode Fuzzy Hash: 28de63066efe535c577e54bdd1c2e5e541060b5269be80aa09ed5bd297dd95ff
                                          • Instruction Fuzzy Hash: 0EB19722E28FCC81E253AA3750825F5E260AF7F3C5F2DDB23FD8475AB2AB1461D19550
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove
                                          • String ID: ##Foreground$alpha$c$hue
                                          • API String ID: 2162964266-3504404221
                                          • Opcode ID: 975e7bba401bf0e1e609e5af102d30691403f2ed4a6f58803779042770bc2011
                                          • Instruction ID: 5fd1c585c49a9331351fac6027bc4e262cdccf2b35e10b3a81ed30f506073510
                                          • Opcode Fuzzy Hash: 975e7bba401bf0e1e609e5af102d30691403f2ed4a6f58803779042770bc2011
                                          • Instruction Fuzzy Hash: CCE2B232E1C789CAE701EF3694415E9B370FF99784F549732EA0867AA5DF38A180DB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                          • API String ID: 0-2102732564
                                          • Opcode ID: 71b7654a115ebfb8a6bcbc85f43d2bb6a7597db4e849dbd24d33019b3cf79d75
                                          • Instruction ID: b9fdd7d603a84092e7edc374dceed7d65a88c5ca0c33804b2d640c1073e765e6
                                          • Opcode Fuzzy Hash: 71b7654a115ebfb8a6bcbc85f43d2bb6a7597db4e849dbd24d33019b3cf79d75
                                          • Instruction Fuzzy Hash: 6F21A194E0D94ED3FE19FF95A4107F482B19B68798EC12033E80F47F919F6C6A91C260
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: powfsqrtf$cosf
                                          • String ID:
                                          • API String ID: 3592889626-0
                                          • Opcode ID: eb23b9d8701da2ebfb6b75735accd9394a4d73194060ae5a2be774a00da3162c
                                          • Instruction ID: 7feab8189b75d0668c9b5d5d57c13ec766c123c2c8839338ff199c3393ba2e67
                                          • Opcode Fuzzy Hash: eb23b9d8701da2ebfb6b75735accd9394a4d73194060ae5a2be774a00da3162c
                                          • Instruction Fuzzy Hash: 04625A32A186D8CBD796AF3684416F9B760FF19348F549336EB0A67E91DB38B490C710
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                          • API String ID: 0-1379995092
                                          • Opcode ID: 8f0963a1de2266eaebcacf119321e846941d678542d56ba95eb92fa0d07b634a
                                          • Instruction ID: 849374dde71813b4eb942618025b71f390e90df212597cdbdafe3f546dcf6e06
                                          • Opcode Fuzzy Hash: 8f0963a1de2266eaebcacf119321e846941d678542d56ba95eb92fa0d07b634a
                                          • Instruction Fuzzy Hash: AF42D022A0CA8AC7E771FE189440379E6B1FB85B94F904230DE5E87ED4DE3CE955C620
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset$malloc
                                          • String ID:
                                          • API String ID: 1671641884-0
                                          • Opcode ID: 4027f43a67c1781a7a95dd27905626f94b4724eb6ed94723c072279f7c6bfd57
                                          • Instruction ID: 12bfd5f63d39ebe25879b1b85536cc4f0884f903677215f875ffb764d683c62a
                                          • Opcode Fuzzy Hash: 4027f43a67c1781a7a95dd27905626f94b4724eb6ed94723c072279f7c6bfd57
                                          • Instruction Fuzzy Hash: B502D532A0CBC9C6D762AF3590416A9F374FF58784F588722DB4863765EF38E585CA20
                                          APIs
                                          Strings
                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF749BEFDBB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: DebugDebuggerErrorLastOutputPresentString
                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                          • API String ID: 389471666-631824599
                                          • Opcode ID: 591b76a8de1cc3595d6598c6fe7d601ae9dac89c1764c3f815df8dc64eb5a0a8
                                          • Instruction ID: 7e5cbc7ddd42762d3706f063d6c65c3dfada0f0e71a2353ce9d160670e755799
                                          • Opcode Fuzzy Hash: 591b76a8de1cc3595d6598c6fe7d601ae9dac89c1764c3f815df8dc64eb5a0a8
                                          • Instruction Fuzzy Hash: 3C112832A18B96D6EB44BF22E6553B9B2B5FB44384F808135C64D82A94EF3CE064C760
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 1.7$90be9dbc1ba562a40117eee5bf792fb31f59a2d93725589bd976276122481d66$9WIvTVJa9m$https://keyauth.win/api/1.2/$valorant plus
                                          • API String ID: 0-1485598925
                                          • Opcode ID: 0dcb51e4d547e25232f254bcbf890c11b12e2a619d8109e0995515c4727a8e40
                                          • Instruction ID: 30a7aef96f92dadd9a0178c6eb1c3955639dbf97671e52e06788734174b35ad2
                                          • Opcode Fuzzy Hash: 0dcb51e4d547e25232f254bcbf890c11b12e2a619d8109e0995515c4727a8e40
                                          • Instruction Fuzzy Hash: 27121826E2D7C28AF703FB3594015A8F7789F63785F81D336ED4835962FF2962868214
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmovememset
                                          • String ID: Processed$Remaining
                                          • API String ID: 1288253900-3602939160
                                          • Opcode ID: 88cfb6ae341cc5142c8a25f9fefbd69065295d24cfb030a2ccf75f31be747d31
                                          • Instruction ID: 1a168a4dd24e9adde07f53d8463e9d8ecc94dcae2e2c73ab0d00c2a132252d15
                                          • Opcode Fuzzy Hash: 88cfb6ae341cc5142c8a25f9fefbd69065295d24cfb030a2ccf75f31be747d31
                                          • Instruction Fuzzy Hash: D8F1E273B0C6D186EB61BF2981507BAB7A1FB55744F944636CF494B288EB38A454CB30
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                          • String ID:
                                          • API String ID: 2933794660-0
                                          • Opcode ID: a40b3fd9276ff1182b6b3a5af4440873fe7232947859a00e7d899e8fa156c691
                                          • Instruction ID: 7a1b1ccad6a3f36c688f6781e10564e0eba3d26822e72c5c7a1aec4f2f87839f
                                          • Opcode Fuzzy Hash: a40b3fd9276ff1182b6b3a5af4440873fe7232947859a00e7d899e8fa156c691
                                          • Instruction Fuzzy Hash: 83111F22B58B05CAEF00EF60E8542A873B4FB19798F840E31DA5D86BA4DF78D154C350
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID:
                                          • API String ID: 2537350866-0
                                          • Opcode ID: 803d04717a26ebe30b7db5d1c30de31d3c4122f28f184c0a331061c4fb4d4389
                                          • Instruction ID: 08695fd6dfcb5826ab6d6989b5d5168e15d2b66ba616956ec71f6845a7219614
                                          • Opcode Fuzzy Hash: 803d04717a26ebe30b7db5d1c30de31d3c4122f28f184c0a331061c4fb4d4389
                                          • Instruction Fuzzy Hash: DA33C432A08785DBEB5AEF3681407B9B7B0FF59344F488725DB59235A1DB38B4A4C720
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 33333333$UUUUUUUU$UUUUUUUU$UUUUUUUU
                                          • API String ID: 0-1048848098
                                          • Opcode ID: 51c3a985df0f8b07df79fd18aa264ff8da7cd880747abd74fc8c5836b89b103a
                                          • Instruction ID: 4d3660939684cc30a9dc5f814b2318cfd00a0598779749f70692e66a57e5c2d3
                                          • Opcode Fuzzy Hash: 51c3a985df0f8b07df79fd18aa264ff8da7cd880747abd74fc8c5836b89b103a
                                          • Instruction Fuzzy Hash: 6351473232952A43EB08DE7D9E55FAA65D29358784B8AA131DD0DDBBD4FD3CE501C310
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Xlength_error@std@@
                                          • String ID: %.3f$RICKZ$d
                                          • API String ID: 1004598685-3949712113
                                          • Opcode ID: 7d5bad06be43c1f3e08663745ef164bb6f1583f3abb5e43713bec58ab9db3c85
                                          • Instruction ID: 46a799085b5136554c874e7b16010d5297b958a930e0a7c9d1297215cbd4ee3a
                                          • Opcode Fuzzy Hash: 7d5bad06be43c1f3e08663745ef164bb6f1583f3abb5e43713bec58ab9db3c85
                                          • Instruction Fuzzy Hash: 0882B03290CBC9CAE751EF3794811B9B771FF99784F588731DA4822AA5DF38A184DB10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$memset
                                          • String ID:
                                          • API String ID: 3790616698-0
                                          • Opcode ID: a548dfd827244021285538f036603997aa72e50782fe0741d2da5caee1a7c8e7
                                          • Instruction ID: 979a9c3ad513ea7cf0aa58ee87be5e35486c8f57dca0854b4944d130a66bed66
                                          • Opcode Fuzzy Hash: a548dfd827244021285538f036603997aa72e50782fe0741d2da5caee1a7c8e7
                                          • Instruction Fuzzy Hash: 75523776608A89C6DB60DF26D9846EDB7B1FB88B88F458226DF4D07B28CF38D554C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cursor
                                          • String ID: d
                                          • API String ID: 3268636600-2564639436
                                          • Opcode ID: 2f856c7b1d3b477fc11c673e31a0127c480ed0795fc24edced1b2765527fd0cb
                                          • Instruction ID: 35d438f00a7bd6226ec7b983b94ff01ab90d26cd7dff679df1bf236647e779b4
                                          • Opcode Fuzzy Hash: 2f856c7b1d3b477fc11c673e31a0127c480ed0795fc24edced1b2765527fd0cb
                                          • Instruction Fuzzy Hash: 3662C13291CB89CAD711EF3694411A9B770EF99784F588731EA4C27AA5EF38E184DB10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: mallocmemset
                                          • String ID: ##Foreground$VUUU$VUUU
                                          • API String ID: 2882185209-179498016
                                          • Opcode ID: fedbb415e48bf3e002f9c3f601501cb57b4f1d6d960984fcc3fa44ee3b04c80a
                                          • Instruction ID: 0e69dbedf906bd09047f594fb09d0ae4e53d0d9087432476b58ca3d63b18ffc2
                                          • Opcode Fuzzy Hash: fedbb415e48bf3e002f9c3f601501cb57b4f1d6d960984fcc3fa44ee3b04c80a
                                          • Instruction Fuzzy Hash: 91E19332F18B88C9E301EB3AD4416A9B371EB9A784B545732EE0863BB5DF38D191D750
                                          APIs
                                            • Part of subcall function 00007FF749AE4B10: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,00000000,00007FF749AF8E3E), ref: 00007FF749AE4B50
                                            • Part of subcall function 00007FF749AE4B10: memset.VCRUNTIME140(?,?,00000000,?,00000000,00007FF749AF8E3E), ref: 00007FF749AE4BAC
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACA03B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturnmallocmemset
                                          • String ID: ##Background
                                          • API String ID: 3803164509-465303879
                                          • Opcode ID: 086857f0add42029629355e226e3c7ea370872e31762d670c16c2bd4a4106ef5
                                          • Instruction ID: 3fa670373ef69e6b8c583bce6f209b2982f097dc81cb39fb1600c2bc46f90a94
                                          • Opcode Fuzzy Hash: 086857f0add42029629355e226e3c7ea370872e31762d670c16c2bd4a4106ef5
                                          • Instruction Fuzzy Hash: 6FF1B432E08A85C9E311EF36D4406E9B3B0EF9AB84F949332EA4D17665DF38D590D750
                                          APIs
                                            • Part of subcall function 00007FF749AE4B10: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,00000000,00007FF749AF8E3E), ref: 00007FF749AE4B50
                                            • Part of subcall function 00007FF749AE4B10: memset.VCRUNTIME140(?,?,00000000,?,00000000,00007FF749AF8E3E), ref: 00007FF749AE4BAC
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACA5FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturnmallocmemset
                                          • String ID: ##Background
                                          • API String ID: 3803164509-465303879
                                          • Opcode ID: c470a1afee164b77bd3b15a818b9a62e06bcf9c153dddcca366eff0b6729ec4e
                                          • Instruction ID: 84e5faf84a197e93a6cb9f88387ee08e4b703fd20caf44ff31282f6555043b94
                                          • Opcode Fuzzy Hash: c470a1afee164b77bd3b15a818b9a62e06bcf9c153dddcca366eff0b6729ec4e
                                          • Instruction Fuzzy Hash: 7DF1B232E08A85C9E311EF36D4406A9B3B0FF9AB84F949332EA4D17665EF38D590D750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID:
                                          • API String ID: 3061335427-0
                                          • Opcode ID: 4cacc76f9a2599e155cfbe076da3870d7896b9eb1844f4462f15e8eb3b93b723
                                          • Instruction ID: 22ae109ebb70516d61e4f6cc4772b9a6c1ab8bbeedbd733dd16396e8c74b8a96
                                          • Opcode Fuzzy Hash: 4cacc76f9a2599e155cfbe076da3870d7896b9eb1844f4462f15e8eb3b93b723
                                          • Instruction Fuzzy Hash: D0A25B33928B8886C752DF37948146DB764FFADB84B19DB16DE0823761EB35E4A4DB00
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID: P$RICKZ
                                          • API String ID: 3061335427-1822746440
                                          • Opcode ID: 57620206785c0d66b8e7e45d1ea1957771ad26b81c6182da65cb6846b917f2d7
                                          • Instruction ID: e6fa4f7e4c29c416d1bb231f21679b9b4cb97ecfa629cf61200cf7f362d3ad4d
                                          • Opcode Fuzzy Hash: 57620206785c0d66b8e7e45d1ea1957771ad26b81c6182da65cb6846b917f2d7
                                          • Instruction Fuzzy Hash: 4962A43291C789C6E711EF36D4411A9B770FF9A784F549722EA4C23AA5EF38E484DB10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID:
                                          • API String ID: 3061335427-0
                                          • Opcode ID: 0bb1d6bfdf0eed9e24e0fccb66ad1828c363672547805e7597e9173c27679033
                                          • Instruction ID: 2de4475e10648d9af5ef48ce989f48b57edc898910df9b87373a8883d68683ae
                                          • Opcode Fuzzy Hash: 0bb1d6bfdf0eed9e24e0fccb66ad1828c363672547805e7597e9173c27679033
                                          • Instruction Fuzzy Hash: 89912532A19AC9C6DB51EF399400BB9B360FF9A789F448331DE4D22A56EF38E041C710
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: RICKZ
                                          • API String ID: 2537350866-2281857468
                                          • Opcode ID: ac91fa9a030fb520c1561bab867d40556e25ae7b38ee8e4979902207e4f03e8a
                                          • Instruction ID: 2d0f0a1bdaaeec37f5cea6a7b1f49481e1d22e1bbc7676af44f6f8e6f1f3dbbb
                                          • Opcode Fuzzy Hash: ac91fa9a030fb520c1561bab867d40556e25ae7b38ee8e4979902207e4f03e8a
                                          • Instruction Fuzzy Hash: 9D82B23291CB89CAD701EF36D4411A9B770FF9A784F549726EE4827AA5DF38E184CB10
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #RESIZE
                                          • API String ID: 0-1383961720
                                          • Opcode ID: f9bd80762c436d49297d335460a404cd57e0e4704c0665eab07515a9849b97f0
                                          • Instruction ID: 8f0ef4395a110ce4df6dab393147bcb91dcc4613b78adaf9d5317f0cca7d11e3
                                          • Opcode Fuzzy Hash: f9bd80762c436d49297d335460a404cd57e0e4704c0665eab07515a9849b97f0
                                          • Instruction Fuzzy Hash: 5A62C732E1C789C6D752EB3790415B9F370EF9E384F588722EE48276A1DB38A545DB20
                                          Strings
                                          • - -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX - XX XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X -X..X X..X--- -XXX.X, xrefs: 00007FF749B0AEE4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: - -XXXXXXX- X - X -XXXXXXX - XXXXXXX- XX - XX XX ..- -X.....X- X.X - X.X -X.....X - X.....X- X..X -X..X X..X--- -XXX.X
                                          • API String ID: 0-1177099622
                                          • Opcode ID: 9064ee14e2f2c34b20a193b3cf343a88409b40ed6301ec1847b47d409a8e11bc
                                          • Instruction ID: b39ac4585f5d7bb6c71dc11373aaca1ae61759a8e3c5c1c0e6fee22feb5dbd2b
                                          • Opcode Fuzzy Hash: 9064ee14e2f2c34b20a193b3cf343a88409b40ed6301ec1847b47d409a8e11bc
                                          • Instruction Fuzzy Hash: FEC172F3A18299BBEF0DCF3945A216DBFAAE791E40B49856FC24783751D660C4B08B05
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset
                                          • String ID:
                                          • API String ID: 2221118986-0
                                          • Opcode ID: b21917c61df192cebd13a49903dc96d80a51bddde65e79ab3a7b6bfb152286ce
                                          • Instruction ID: 91b6ddbff96cb87696ab445a77063d26728e3d974845f13888d9c4a2878a9a73
                                          • Opcode Fuzzy Hash: b21917c61df192cebd13a49903dc96d80a51bddde65e79ab3a7b6bfb152286ce
                                          • Instruction Fuzzy Hash: 816129B3A1C2E6C2D3996F2C6441A7DBEE0B78A344F5C9234FA8AC3F45C93DD5048610
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset
                                          • String ID:
                                          • API String ID: 2221118986-0
                                          • Opcode ID: faf4a162c8b5c5f12d3a868e7c27431c7148435f80e62847b61a09eafc72ab83
                                          • Instruction ID: d36f5af90b0f97f746ad3a169fe3f7d3b18b82b836bbe28c9c0d95d3bc8869ae
                                          • Opcode Fuzzy Hash: faf4a162c8b5c5f12d3a868e7c27431c7148435f80e62847b61a09eafc72ab83
                                          • Instruction Fuzzy Hash: F8611173B1C6E5C6C3599F68A405E79FEA4E79A308F4A8275DA8CC3F49CA2ED000C710
                                          APIs
                                          • GetProcessHeap.KERNEL32(?,?,?,00007FF749B3AE43,?,?,?,00007FF749B3B895), ref: 00007FF749B3B49D
                                            • Part of subcall function 00007FF749BEEC00: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF749AC1BE3), ref: 00007FF749BEEC10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AcquireExclusiveHeapLockProcess
                                          • String ID:
                                          • API String ID: 3110430671-0
                                          • Opcode ID: fd46aef1a61db3afed56350ee42e350de592d40dea49c0ada6889ec325c6a21b
                                          • Instruction ID: b80b62fbc8a61217143202822a0f9326614d865b45d112faaec8d0bf4734f3a6
                                          • Opcode Fuzzy Hash: fd46aef1a61db3afed56350ee42e350de592d40dea49c0ada6889ec325c6a21b
                                          • Instruction Fuzzy Hash: 2231E521E1EA67C5EA00FF3AF8851B0A3B9AF46314FD60236C44D426A5FF3CA595C321
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f81bd75498f1ad3017e7eced893f6f55c5df983d00a8e877e09a04f847034631
                                          • Instruction ID: 77fc980d6121ea60130a4dcf560a2c998bb8fd46f4e564acc12d42fe11a48ed9
                                          • Opcode Fuzzy Hash: f81bd75498f1ad3017e7eced893f6f55c5df983d00a8e877e09a04f847034631
                                          • Instruction Fuzzy Hash: 0B221922E0C28AC5EB61BE35804627AF7B6EF45B84F984535CE4D176D5DE3CA981C730
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0f7c22b0377cbcde9bbb54e75e7b782114c38d44412812b1a56556a7a477d59a
                                          • Instruction ID: d648accbe49bb55251e5467767e6a86410a53e3c55a6615541365d8f54fdc5fa
                                          • Opcode Fuzzy Hash: 0f7c22b0377cbcde9bbb54e75e7b782114c38d44412812b1a56556a7a477d59a
                                          • Instruction Fuzzy Hash: 78027EB2A181A04AD36DCB2EA469639BFE1F3C9741B04912EE7A7C3781D93CC955DF10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42a57e89252a3fea99d65ad0498d0ee05f595b1534bc6725914b68f45c3e360d
                                          • Instruction ID: 9d71088054b4e7f24b10b6cf6a3fafe1884184eacf2286beeb7bb313c61fb2af
                                          • Opcode Fuzzy Hash: 42a57e89252a3fea99d65ad0498d0ee05f595b1534bc6725914b68f45c3e360d
                                          • Instruction Fuzzy Hash: 0212E632A186C4CAD365DF359041BA9F7B0FB9D784F148326EB8993B55EB38E491CB10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2bd716deaa734f504517ef79b575497128ea7657ec31d4ee38fa5844d5449f0d
                                          • Instruction ID: e4efb0fd03e378b3de6a876e9ce88b9fa8e44e588f1618c57e046fb28e0838cc
                                          • Opcode Fuzzy Hash: 2bd716deaa734f504517ef79b575497128ea7657ec31d4ee38fa5844d5449f0d
                                          • Instruction Fuzzy Hash: 1D02D902E1CABEC5F712BE7554427F9A2728F6A384F589332EC5936DD6DB2CA481C130
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c47d8507331dfa65888647f8f8d1c8a85e00fc9d880a73db7f4dd13ccae0e0e8
                                          • Instruction ID: 17e53073ed168596defc2ac2dc305f3d6a76d0d61ec3b775978ad72b83eb8e33
                                          • Opcode Fuzzy Hash: c47d8507331dfa65888647f8f8d1c8a85e00fc9d880a73db7f4dd13ccae0e0e8
                                          • Instruction Fuzzy Hash: 4912043290C69AC5E661FF2294415BAF3B6FF557C0F984335EA8C27A95DF38A940C720
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e62dda6a9a16aed7a262d04882a91db426ab28c1e82e27d2e53613307f22838
                                          • Instruction ID: 67b3ac3311deb4f0d7af74014ad9d946ff0505ca426d855fca6b4f928c8a45cb
                                          • Opcode Fuzzy Hash: 9e62dda6a9a16aed7a262d04882a91db426ab28c1e82e27d2e53613307f22838
                                          • Instruction Fuzzy Hash: 22F1D912E1CABAC5F712BE7550427F9A372CF5A784F589332DD49369D6EB2CA481C230
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 100ffd2da99f0a197bff70d98da3eb3dd89d8b78cfe71ca22c2e0177e495ba37
                                          • Instruction ID: 228bf3bda06ea136a45c26b1c56a62dfd23a35a7da2145c332aefbbd3976404f
                                          • Opcode Fuzzy Hash: 100ffd2da99f0a197bff70d98da3eb3dd89d8b78cfe71ca22c2e0177e495ba37
                                          • Instruction Fuzzy Hash: 4512F333A8D7C5C9D753EF3784415ACBFA4DBA6B48F5D8275CA051B2A6DA286240CF30
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba10a178c22a3fd10e61f295d1d6cb5fe34867b231677757643150a6466601cd
                                          • Instruction ID: 3302f557fdce4217e6a6d9a582fab539387881ef1c2370cb09a5b2739a398b84
                                          • Opcode Fuzzy Hash: ba10a178c22a3fd10e61f295d1d6cb5fe34867b231677757643150a6466601cd
                                          • Instruction Fuzzy Hash: 18F1E623E1CBCD85E252BA3344424B5F260AFBF384F5DEB23FE44715B6EB2961919520
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9c02219f86c6714307dfed8bed7f40b581828987747ec0b3b6e4e3bbb2ca052
                                          • Instruction ID: 896dc41d49a6fc720ba35519c20c660cf1d1cb8cc602521179a55f7cabd684a4
                                          • Opcode Fuzzy Hash: b9c02219f86c6714307dfed8bed7f40b581828987747ec0b3b6e4e3bbb2ca052
                                          • Instruction Fuzzy Hash: CBF19022D1C6CEC5E312BE36404A1F9B2609F6E295F5DDB32ED48365A2EFB97181C520
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e8d70d31b58133dfa82f5d45934fc7e0651ec943cc351d7a3ff42ceb3d7ea00
                                          • Instruction ID: dba65011086518a9eb48a2db2ca4f3a8c5b54d0fe9451de02204230ec0d2bbbb
                                          • Opcode Fuzzy Hash: 2e8d70d31b58133dfa82f5d45934fc7e0651ec943cc351d7a3ff42ceb3d7ea00
                                          • Instruction Fuzzy Hash: 71D1C222E18B8DC9E213EE7754421F9B371AF6E3C4F6CDB22ED0836965DB257191CA10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f091b7c59e05ee02a8e26d56fe1eaecf4bd0c21a76cbe43b7336b787d94cbfe0
                                          • Instruction ID: 1a919f61b9753148c60d68c75cdd812b810022d1793decb8ae138ede61ebc35a
                                          • Opcode Fuzzy Hash: f091b7c59e05ee02a8e26d56fe1eaecf4bd0c21a76cbe43b7336b787d94cbfe0
                                          • Instruction Fuzzy Hash: 9CC1D722E0C68EC1E763BA3740428B4F2A09F7E3C6F599733ED58360A5EF2875858130
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d359e19746be7df6eb002e809045438247d85c809dcc3b9787710e399deb5bb
                                          • Instruction ID: fdf3ab3f55bcb2b9682448278caa47afa739e735c594033ce581ecbcf225d2ad
                                          • Opcode Fuzzy Hash: 5d359e19746be7df6eb002e809045438247d85c809dcc3b9787710e399deb5bb
                                          • Instruction Fuzzy Hash: 43D1B532E0C28ACAE7A6BF368104B79B6B4EF49754F5D8736D758121D9EB386484C730
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6477b9676a78693910d8d71097c25c61b281354eefc39fe1812931bb691b00d
                                          • Instruction ID: 1790a1556c72943088f6501aee9ede473f202e33687932d351f9deb890e6376b
                                          • Opcode Fuzzy Hash: f6477b9676a78693910d8d71097c25c61b281354eefc39fe1812931bb691b00d
                                          • Instruction Fuzzy Hash: DFA1C233A18AD8CEE701EF7A80452FCBBB0FB59349F145325EE4532A65DB396581CB10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                                          • Instruction ID: 09812857ef8079892acde08ee1713143d50227becad6e29050fb6023cb0585ec
                                          • Opcode Fuzzy Hash: 512c292fdddac8fadd8bee25fcce6216da02647fedf7223a0dbb6b8c96daeb65
                                          • Instruction Fuzzy Hash: 645105A67284B187DA50AF2AD881ABC76A1E746B43FD48077D65D82F91D13DC00EDF30
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b342a741e44e49a44cbbbcd44995682014fab2ca8f544cdd252b6383f84d9d6b
                                          • Instruction ID: 06130c47b069faf73fc73db0518f2ab5a9f005b93e995bd393839c0a6da03775
                                          • Opcode Fuzzy Hash: b342a741e44e49a44cbbbcd44995682014fab2ca8f544cdd252b6383f84d9d6b
                                          • Instruction Fuzzy Hash: 0351F676614A8582DB54CF2AE454B9E77A1FB8DF84F499132DF4A03B28CF39D058CB00
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e767ab1b2255a418d959fff8ac6c109c8ba193b5c8084154ca4b1a90cbef427c
                                          • Instruction ID: dc6b84f452956e9c00343e304e9b7fcebbfb53e517775412b4ceca1b5dfaf893
                                          • Opcode Fuzzy Hash: e767ab1b2255a418d959fff8ac6c109c8ba193b5c8084154ca4b1a90cbef427c
                                          • Instruction Fuzzy Hash: 4341B411A0D75DC6E961BD67908057AE661AFEA780F9DC732ED0C17ED4DB3CE4818610
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 936e125dfd4eecab10c50d3bcbacb2be3b6ce6febc03ff5f01a9c41f301962a0
                                          • Instruction ID: 8aae2fed92c7c51f54bef43d4d9de7bc10afbf2f325ae88d133a8ae6fb9084d8
                                          • Opcode Fuzzy Hash: 936e125dfd4eecab10c50d3bcbacb2be3b6ce6febc03ff5f01a9c41f301962a0
                                          • Instruction Fuzzy Hash: 9E41D3636390F55FE658D733847153E7BA0D28B742788A11BEFC106986CA3DD150EF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3150049466bc481214a3910208dc4d8ec917cf1981f465981e8ca663843a416
                                          • Instruction ID: 809b533a9b9bffeb3fa2783171e4a41a7463147ae214341b3b312e5ee38a97a1
                                          • Opcode Fuzzy Hash: e3150049466bc481214a3910208dc4d8ec917cf1981f465981e8ca663843a416
                                          • Instruction Fuzzy Hash: 6301D4716442928BDA98DBA284F44BA73A0E388702F461137FB8D47685EA2C9246DB70
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free$fclose$__acrt_iob_funcfwrite
                                          • String ID:
                                          • API String ID: 3704438457-0
                                          • Opcode ID: eb6f67c070d225143d747e2d5dc977600d274a657dc82b71f798160e0e8423bb
                                          • Instruction ID: 8e9ff9c5437ae4c45050efc1cff476fd817c0bd1822de56c5efe442c5c9d9e8d
                                          • Opcode Fuzzy Hash: eb6f67c070d225143d747e2d5dc977600d274a657dc82b71f798160e0e8423bb
                                          • Instruction Fuzzy Hash: A042F321B4EB86D6EE58BF25DA90AB9B7B0FB44B41F880435CE6D43751DF38A460D234
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AttributeConsoleHandleText$__acrt_iob_func__stdio_common_vfprintfsystem
                                          • String ID: Inserir Key: $ Status: %s$##########################################################$##########################################################$[ Selecione uma opcao: ]$cls
                                          • API String ID: 2136955776-2655065097
                                          • Opcode ID: 67ba02d2718599ef771b42959d12f43a7cddcb40bba5e9c2c6c3c09c855d2021
                                          • Instruction ID: b22341f02033309a89b6c065390f362c3a6b66f6a02e20787923b33b92fa0aac
                                          • Opcode Fuzzy Hash: 67ba02d2718599ef771b42959d12f43a7cddcb40bba5e9c2c6c3c09c855d2021
                                          • Instruction Fuzzy Hash: 1841EF10B0CA07D2EB49BF70D85A675B231EF84B95FD04235E53E86AE5EE2CA449C371
                                          APIs
                                          • WideCharToMultiByte.KERNEL32 ref: 00007FF749ADE987
                                          • GetFileAttributesW.KERNEL32 ref: 00007FF749ADE994
                                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749ADE9B6
                                          • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF749ADE9D7
                                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749ADEA0B
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF749ADEA2A
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749ADEA74
                                          • ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z.MSVCP140 ref: 00007FF749ADEA98
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF749ADEAFE
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF749ADEB1A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?setstate@?$basic_ios@?write@?$basic_ostream@AttributesByteCharD@std@@@1@_FileMultiV12@V?$basic_streambuf@Widefclose
                                          • String ID: C:\Windows\System32\drivers\scraidy.sys
                                          • API String ID: 2986869609-3815880412
                                          • Opcode ID: adb335568d880e47db31b01f4741fcd4e62a7c76eca21c3401c8bc72cf90ffa7
                                          • Instruction ID: 646c0eaae3bdac8702246a39dfa26507c5f772ab61cecc5a44d75d8443069ad9
                                          • Opcode Fuzzy Hash: adb335568d880e47db31b01f4741fcd4e62a7c76eca21c3401c8bc72cf90ffa7
                                          • Instruction Fuzzy Hash: D3B14D32B08B45C5EB10EF64E8846ADBB75FB85B98F904036DA4D53E68DF39D449CB20
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free$Token$InformationProcess$CloseCurrentErrorHandleLastOpenProfileUnloadUsercallocmallocmemmove
                                          • String ID: none
                                          • API String ID: 3698963424-2140143823
                                          • Opcode ID: 13b6923adf7283e34daa0e9d7b17e735e75221e8425b7796afa28363a84bf206
                                          • Instruction ID: bf89f40581b01a5ae78c4b89ec54c990bf02063d51cd44206a1628359bac9a03
                                          • Opcode Fuzzy Hash: 13b6923adf7283e34daa0e9d7b17e735e75221e8425b7796afa28363a84bf206
                                          • Instruction Fuzzy Hash: 68D11922A09B89CAEB70EF25D8503B873A0FB45BA4F844635DA6D47F99DF38D654C310
                                          APIs
                                            • Part of subcall function 00007FF749AD8A20: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD8A50
                                            • Part of subcall function 00007FF749AD8A20: ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF749AD8A6F
                                            • Part of subcall function 00007FF749AD8A20: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD8AA1
                                            • Part of subcall function 00007FF749AD8A20: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF749AD8ABC
                                            • Part of subcall function 00007FF749AD8A20: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749AD8B0B
                                          • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF749AD632E
                                            • Part of subcall function 00007FF749ADD160: ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF749ADD1BC
                                            • Part of subcall function 00007FF749ADD160: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADD1EE
                                            • Part of subcall function 00007FF749ADD160: ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749ADD2C8
                                            • Part of subcall function 00007FF749ADA380: fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AC2423), ref: 00007FF749ADA3E2
                                            • Part of subcall function 00007FF749ADA380: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF749AC2423), ref: 00007FF749ADA404
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749AD6375
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749AD64B0
                                          • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF749AD64ED
                                          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF749AD64F7
                                          • Sleep.KERNEL32 ref: 00007FF749AD6535
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD6559
                                          • Sleep.KERNEL32 ref: 00007FF749AD658A
                                          • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD6595
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD6618
                                          • Sleep.KERNEL32 ref: 00007FF749AD6629
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD6664
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: U?$char_traits@$D@std@@@std@@$?setstate@?$basic_ios@$Sleep_invalid_parameter_noinfo_noreturn$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?sgetc@?$basic_streambuf@?widen@?$basic_ios@D@std@@@1@_Ipfx@?$basic_istream@V?$basic_streambuf@exitfclose
                                          • String ID: C:\Windows\key.txt$Erro ao salvar a chave.$valorant plus
                                          • API String ID: 599532705-3608017239
                                          • Opcode ID: 25abfb60ea99c03deb6e08533b474e415d0ace7547792de017c7485a79f1e584
                                          • Instruction ID: de1d6ead4fe66ce92908f1cfb48b766f72c15d26647dbfc5955c5c18576c3607
                                          • Opcode Fuzzy Hash: 25abfb60ea99c03deb6e08533b474e415d0ace7547792de017c7485a79f1e584
                                          • Instruction Fuzzy Hash: EBA1AF22A1CA86C6EB10FF24E4547ADB371FF81794F804231E69D46AA9EF7CD584C720
                                          APIs
                                          • memset.VCRUNTIME140 ref: 00007FF749B3492D
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34A47
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF749B34A75
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF749B34A82
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34ABB
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34B0C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34C88
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF749B34CB4
                                          • __std_exception_destroy.VCRUNTIME140 ref: 00007FF749B34CC1
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34CFB
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34D4E
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B34E3C
                                            • Part of subcall function 00007FF749ADA7A0: memmove.VCRUNTIME140(?,00000000,?,00007FF749AC2953), ref: 00007FF749ADA7D7
                                            • Part of subcall function 00007FF749B303C0: memmove.VCRUNTIME140 ref: 00007FF749B30521
                                            • Part of subcall function 00007FF749B2F370: memmove.VCRUNTIME140 ref: 00007FF749B2F433
                                            • Part of subcall function 00007FF749B30E10: memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,-00000001,00000001,00007FF749B306DE), ref: 00007FF749B30EEF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroymemmove$memset
                                          • String ID: value
                                          • API String ID: 1018545407-494360628
                                          • Opcode ID: b60cb0b10f6450aeb637fc2727d6a730a708cef4f0a57f33e72784340702d37d
                                          • Instruction ID: af3e396104184539c4c33ae99e2adc31bc804bef542c966746fae5af24de5f18
                                          • Opcode Fuzzy Hash: b60cb0b10f6450aeb637fc2727d6a730a708cef4f0a57f33e72784340702d37d
                                          • Instruction Fuzzy Hash: 3FF1B122A1CB8995EB20EF64E4443ADB771EB857A4F904231E6AD02EE9DF7CD185C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fclose$__acrt_iob_func_unlinkfputsqsort
                                          • String ID: ## Fatal libcurl error$# Netscape HTTP Cookie File# https://curl.haxx.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                          • API String ID: 101901870-4087121635
                                          • Opcode ID: 736c90b681773b26b150d7f8e09ff5222ea554ffbb3b8ecda20bdad4e02ac623
                                          • Instruction ID: c5f0c1c3f6b22be027976dc93266714ee3d07a7d94d913050b728ebadbcaaf70
                                          • Opcode Fuzzy Hash: 736c90b681773b26b150d7f8e09ff5222ea554ffbb3b8ecda20bdad4e02ac623
                                          • Instruction Fuzzy Hash: E2519F21A4D64AD6FE65BF22A91427AE2B0BF49BD4FC44431CD4E47B54EE3CE444E630
                                          APIs
                                          • GetModuleHandleA.KERNEL32(?,?,00000000,00007FF749B7955A,?,?,?,?,00007FF749B5078B), ref: 00007FF749B50414
                                          • GetProcAddress.KERNEL32(?,?,?,?,00007FF749B5078B), ref: 00007FF749B50439
                                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00007FF749B5078B), ref: 00007FF749B5044C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProcstrpbrk
                                          • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                                          • API String ID: 27745253-3327535076
                                          • Opcode ID: a90d98e1e5d9a45ba5038053ed1f821a3e8eb60d40c838c572c7ab40facebc8d
                                          • Instruction ID: e461461e8e82ad70b896965740958964eb26dba59b2437d5704299567e040df0
                                          • Opcode Fuzzy Hash: a90d98e1e5d9a45ba5038053ed1f821a3e8eb60d40c838c572c7ab40facebc8d
                                          • Instruction Fuzzy Hash: 1941C456B0DA46D2EB15BF56B940139A7B1AF85BE4F888134CE0D43B94EE3CD886C720
                                          APIs
                                            • Part of subcall function 00007FF749ADA7A0: memmove.VCRUNTIME140(?,00000000,?,00007FF749AC2953), ref: 00007FF749ADA7D7
                                            • Part of subcall function 00007FF749B340C0: memmove.VCRUNTIME140 ref: 00007FF749B3427A
                                          • memmove.VCRUNTIME140 ref: 00007FF749B2F433
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F597
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F5EA
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F63B
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F67A
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F6C9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F708
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2F785
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                          • String ID: parse error$parse_error
                                          • API String ID: 15630516-1820534363
                                          • Opcode ID: e800379589d6a5bb0d7bc1a7740d1ddab69388564d6bb73bd6215581e10ceaee
                                          • Instruction ID: cb9a32bc6cc0879d384c08165b97b33ca6b9fdfc5afb248cfdb7357619c98c31
                                          • Opcode Fuzzy Hash: e800379589d6a5bb0d7bc1a7740d1ddab69388564d6bb73bd6215581e10ceaee
                                          • Instruction Fuzzy Hash: 90C18062A18B89C5FB00EF68E4483ADB771EB457A4F904635EA6D43AE9DF78D184C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Window$Client$AreaAttributesExtendFindFrameIntoLayeredRectScreenShowUpdateexit
                                          • String ID: MedalOverlay$MedalOverlayClass
                                          • API String ID: 543961071-163034715
                                          • Opcode ID: 85780ef08c9fb93e63c8463a80fc92bf79ead740b140d571999b3cef810dc005
                                          • Instruction ID: 0ca36b310e606034c9adbfc89ec8d296491f9e3279262dcd48d7f2f1154d7fdf
                                          • Opcode Fuzzy Hash: 85780ef08c9fb93e63c8463a80fc92bf79ead740b140d571999b3cef810dc005
                                          • Instruction Fuzzy Hash: 2C21B674A0DA86D6EA50FF24E840624BBB0FB85B65F904235D96D827A4EF3CE545CB30
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset$cosf$mallocsinf
                                          • String ID: 33s@
                                          • API String ID: 4264095117-2537142335
                                          • Opcode ID: 75dd64dcf88a0a3a2ee97b968c07b3c2a120784ce87a1a24c3cb855eee2c9e12
                                          • Instruction ID: c829dc4f1d8ce69895b2d6739daa06488496db4496b9fc7ec7c5a093048b7bf4
                                          • Opcode Fuzzy Hash: 75dd64dcf88a0a3a2ee97b968c07b3c2a120784ce87a1a24c3cb855eee2c9e12
                                          • Instruction Fuzzy Hash: AD62AFB2615BC1AAD30CDF25EA4429AB7A8F746B15F995329D7B403290DF74B1B0CB0C
                                          APIs
                                            • Part of subcall function 00007FF749B26A90: memcmp.VCRUNTIME140 ref: 00007FF749B26B6C
                                            • Part of subcall function 00007FF749B26A90: memcmp.VCRUNTIME140 ref: 00007FF749B26BE3
                                            • Part of subcall function 00007FF749B26A90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B26CC9
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B33D13
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturnmemcmp
                                          • String ID: createdate$expiry$hwid$lastlogin$none$subscription$subscriptions$username
                                          • API String ID: 2972922734-284943577
                                          • Opcode ID: 571e99733b25ed6888bfad44b1be0bf8e4d8010694410e32f78ee6bb86c60a2c
                                          • Instruction ID: f7190cca6ede51e4982e13d804f9db226d03f68ab90e60f88ec89cb0e35f8951
                                          • Opcode Fuzzy Hash: 571e99733b25ed6888bfad44b1be0bf8e4d8010694410e32f78ee6bb86c60a2c
                                          • Instruction Fuzzy Hash: C5E18C62B0CB8AD1FB14FF25C4542ADA772EB85B84FC58032DA5E47B85DE38E590C320
                                          APIs
                                          • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0C27
                                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0C41
                                          • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0C52
                                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0C6C
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0C91
                                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0CAD
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0CBB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0CD6
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0CDE
                                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF749AE553B), ref: 00007FF749AE0CF4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fclose$fseekftell$freadfreemalloc
                                          • String ID:
                                          • API String ID: 1549146309-0
                                          • Opcode ID: 3c2e8bc28db1979c640b6c158cafeed92c85ed179e44dc3ea4140ca4a0b4bc1f
                                          • Instruction ID: 78aac46eebe4b8b41fb375fda20f307a253e624634a09f37e47ff57ad9500d73
                                          • Opcode Fuzzy Hash: 3c2e8bc28db1979c640b6c158cafeed92c85ed179e44dc3ea4140ca4a0b4bc1f
                                          • Instruction Fuzzy Hash: 7E314D24B4D756C1EE54FF29A954639B2B0AF84BD4F881531DD2E43F94EE3CA481C230
                                          APIs
                                            • Part of subcall function 00007FF749AD98C0: memmove.VCRUNTIME140(?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD99AF
                                            • Part of subcall function 00007FF749AD98C0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749AD99D3
                                            • Part of subcall function 00007FF749AD98C0: ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD99F9
                                            • Part of subcall function 00007FF749AD98C0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD9989
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD3DD0
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD3DD7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD3DDE
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD3DE5
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD3DEC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$??1?$codecvt@_Concurrency::cancel_current_taskMbstatet@@@std@@memmove
                                          • String ID: 1.7$9WIvTVJa9m$valorant plus
                                          • API String ID: 634393736-2861110663
                                          • Opcode ID: 25b6aa3bbe1d2a68caaacb71aa1c3f03db662ad26e36785715053c016aefcb8a
                                          • Instruction ID: 3a4a92ea23c2869791f47eef1e5fb699b9411b5d21ab9ff2a5058c774bae160f
                                          • Opcode Fuzzy Hash: 25b6aa3bbe1d2a68caaacb71aa1c3f03db662ad26e36785715053c016aefcb8a
                                          • Instruction Fuzzy Hash: DA61BD62B0C785D1EA00FF25E49877DB772EB11B84F804535DA9C06A56EF7CE584C360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memmove
                                          • String ID: at line $, column
                                          • API String ID: 15630516-191570568
                                          • Opcode ID: 808533db2061161e32920f6d56b0b443ca47743a0728885c8b27bc5e1619efc3
                                          • Instruction ID: f363d9a46575cfc7e7d1e9ed0f633f86e0871040868f3b6f8893ceefca82501e
                                          • Opcode Fuzzy Hash: 808533db2061161e32920f6d56b0b443ca47743a0728885c8b27bc5e1619efc3
                                          • Instruction Fuzzy Hash: 00919D62F18B8599FB10EFB8D4003EC6376EB45B98F808626DA5C17E99DE78D14AC350
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fclose$__acrt_iob_funcfopen
                                          • String ID: Set-Cookie:$ignoring failed cookie_init for %s$none
                                          • API String ID: 3183491739-4095489131
                                          • Opcode ID: 7c12dd8aaf4680b72f1cd668f84a31fc43820eb84557ce7ebcd2d994c62486db
                                          • Instruction ID: be15e3979233ded1d72c5eeb60d51a6861a24a9cc6fd0e399783b13f0b7495d3
                                          • Opcode Fuzzy Hash: 7c12dd8aaf4680b72f1cd668f84a31fc43820eb84557ce7ebcd2d994c62486db
                                          • Instruction Fuzzy Hash: 61619D22A4D79AC1EA51BF2595046B9A7B4BF55B84FC84434DE8D07B85DF3DE402E320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$memmovesystem
                                          • String ID: && timeout /t 5"$start cmd /C "color b && title Error && echo
                                          • API String ID: 3478177393-3357973498
                                          • Opcode ID: e905a4deb7a609f1b39dbd528fc6b61c4b2b73792da32a1dfdda6897437ec2d8
                                          • Instruction ID: 180005cb560944d7c7bf924c1c2bcc57091f95b80b21ff45a411787cd4d45e3c
                                          • Opcode Fuzzy Hash: e905a4deb7a609f1b39dbd528fc6b61c4b2b73792da32a1dfdda6897437ec2d8
                                          • Instruction Fuzzy Hash: 8B515B62A1CB89C2EA14EF69E45436DA371FB89BD0F904235DA9D43E99DF7CE084C710
                                          APIs
                                          • memmove.VCRUNTIME140(2E8BA2E8BA2E8BA3,00000000,00000000,00000000,00007FF749ADC9A6), ref: 00007FF749ADDD09
                                          • memmove.VCRUNTIME140(2E8BA2E8BA2E8BA3,00000000,00000000,00000000,00007FF749ADC9A6), ref: 00007FF749ADDD1B
                                          • memmove.VCRUNTIME140(2E8BA2E8BA2E8BA3,00000000,00000000,00000000,00007FF749ADC9A6), ref: 00007FF749ADDD2B
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(2E8BA2E8BA2E8BA3,00000000,00000000,00000000,00007FF749ADC9A6), ref: 00007FF749ADDD5F
                                          • memmove.VCRUNTIME140 ref: 00007FF749ADDD69
                                          • memmove.VCRUNTIME140 ref: 00007FF749ADDD79
                                          • memmove.VCRUNTIME140 ref: 00007FF749ADDD89
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADDDB9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2016347663-0
                                          • Opcode ID: eccd5c7146458a962bfc77ed6324bfae8cff82162e45a8ce4a29cdec81cb549c
                                          • Instruction ID: 252c8adb1333eb0f30eb819876ccae6a3501c87b0ff2436a23fe80e9cbed0448
                                          • Opcode Fuzzy Hash: eccd5c7146458a962bfc77ed6324bfae8cff82162e45a8ce4a29cdec81cb549c
                                          • Instruction Fuzzy Hash: 3741C262B0DB85C1EE10BF26D4046A9A366EB08BD4F944636EE6C0BB96DF7CD444C320
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,00007FF749B3B714,?,?,?,?,?,?,00000000,00007FF749B3BB6D), ref: 00007FF749B3B620
                                          • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF749B3BB6D), ref: 00007FF749B3B670
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfo
                                          • String ID:
                                          • API String ID: 2959964966-0
                                          • Opcode ID: 41f5577ebea3aae466c5ce3d2c9ac63214ba2a647034288647608e3cff550fc6
                                          • Instruction ID: a3c4e728d982a3e3aa3cc9a0592d41711af465fde087fe9fc4d7a238608f8ccf
                                          • Opcode Fuzzy Hash: 41f5577ebea3aae466c5ce3d2c9ac63214ba2a647034288647608e3cff550fc6
                                          • Instruction Fuzzy Hash: DF415E66A1CA59CAEA20FF56D45167DE371AB84BC0F948036DA0D47F9ADF3CE441C620
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8becdba642460aba68ab02adc8db4b5c3f247353e08381bf174a1dbc2ffb8f0b
                                          • Instruction ID: 4ebd0651791e8df8660a7662daff1feae73b5df57b7f4d5f5f514772e3c507b7
                                          • Opcode Fuzzy Hash: 8becdba642460aba68ab02adc8db4b5c3f247353e08381bf174a1dbc2ffb8f0b
                                          • Instruction Fuzzy Hash: E741E321B0E686C5EE59BF25D590AB5B7B0EF41B41FC80436CD0E47AA9FF2CA841D270
                                          APIs
                                          • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF749B04CD0
                                          • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF749B04CE5
                                          • cosf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF749B04DBF
                                          • sinf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF749B04DD8
                                          • cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF749B04E7B
                                          • sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF749B04E93
                                          • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF749B04F61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ceilf$cosfsinf
                                          • String ID:
                                          • API String ID: 125261001-0
                                          • Opcode ID: 48b2fc2a79d6dcbea4d1db949505e6960492fc5da3fa8180bf150c25d6203f3c
                                          • Instruction ID: fbbdec096c4ee51cbade9cc3c99c0dc1c8e0c57cb404c371dc235207061398cc
                                          • Opcode Fuzzy Hash: 48b2fc2a79d6dcbea4d1db949505e6960492fc5da3fa8180bf150c25d6203f3c
                                          • Instruction Fuzzy Hash: 0EB11C32D1C689C5E252BF3694416B9F371BF5D384F588332E94873A66EF28B4D1CA10
                                          APIs
                                          • ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000826299E00), ref: 00007FF749AD9DBF
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000826299E00), ref: 00007FF749AD9F7A
                                            • Part of subcall function 00007FF749ADB990: memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADBAA8
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000826299E00), ref: 00007FF749AD9E7F
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000826299E00), ref: 00007FF749ADA080
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000826299E00), ref: 00007FF749ADA0CC
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADA0D3
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADA0D9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemmove$?in@?$codecvt@_Mbstatet@@Mbstatet@@@std@@
                                          • String ID:
                                          • API String ID: 147523147-0
                                          • Opcode ID: dd2e57ac58e1064912dbdd40cbaaf0322c30eb2197bcae7153ee01ddb1995307
                                          • Instruction ID: 3d53906f739bcdf9632008135bf365608416d459d6a1962587d40137fb4a73e5
                                          • Opcode Fuzzy Hash: dd2e57ac58e1064912dbdd40cbaaf0322c30eb2197bcae7153ee01ddb1995307
                                          • Instruction Fuzzy Hash: 30B17D62B19B45D9EB00FF69D4446ACB3B6EB88B98F804631DE6D13B98DF38D141C360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ErrorLastSleep
                                          • String ID:
                                          • API String ID: 1458359878-0
                                          • Opcode ID: e9078f0136978e98fe6a6834dbd1800f28bb1e58bb808daa927ec0a3d23862f8
                                          • Instruction ID: 6fd452840ff2891453fe80e7fed59a8ce89e1abbce5ba7e0e053d8ed75e9fcea
                                          • Opcode Fuzzy Hash: e9078f0136978e98fe6a6834dbd1800f28bb1e58bb808daa927ec0a3d23862f8
                                          • Instruction Fuzzy Hash: 0FA1F421A1C69AD6EB6A7F149410379A2B5FF84BB8F854334EA1D86EC4DF39DD01C310
                                          APIs
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF749B3C178), ref: 00007FF749B3C2C5
                                          • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,00007FF749B3C178), ref: 00007FF749B3C2DF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: strncmp
                                          • String ID: I32$I64$Internal error removing splay node = %d
                                          • API String ID: 1114863663-13178787
                                          • Opcode ID: 85620ac8137958897013b54585a2e2766f470d75840c3ba436ccffca0e4f1a09
                                          • Instruction ID: 13a2cefade317afe0c3c782712da89ffa8a25d53a62792a0d03f3edc13ac12fb
                                          • Opcode Fuzzy Hash: 85620ac8137958897013b54585a2e2766f470d75840c3ba436ccffca0e4f1a09
                                          • Instruction Fuzzy Hash: 45A19F32A0CA49D6EB21EF55E444779BBB4FB48B88F864135CE8D42A55DF3CD218C760
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B353A1
                                            • Part of subcall function 00007FF749AD9670: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749AD96C8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID: ANUL$EZZ
                                          • API String ID: 3668304517-3347727684
                                          • Opcode ID: b61dc3b8d83ea6c885f0707ef594efd4b7cfed43ef650dd6bc4e6a6b4e1db01d
                                          • Instruction ID: c4e2f87cdd944b58d6d2661eed9cf746c09bc2d799f3a3ea3f689ae18897c03f
                                          • Opcode Fuzzy Hash: b61dc3b8d83ea6c885f0707ef594efd4b7cfed43ef650dd6bc4e6a6b4e1db01d
                                          • Instruction Fuzzy Hash: 1C919C62B08B868AFB14FF65D4043AD7372EB41B98F808534DE5D17E8ADE789594C3A0
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fgetc
                                          • String ID:
                                          • API String ID: 2807381905-0
                                          • Opcode ID: 70da41cb8dc6fb979233382c84a04c761466024fc74e7130d0026c300cccd8ff
                                          • Instruction ID: 56796c2cb6f5bf65cdcaea0932e1a9ce80dd0a0ad91f80ed62f661012f95a0ad
                                          • Opcode Fuzzy Hash: 70da41cb8dc6fb979233382c84a04c761466024fc74e7130d0026c300cccd8ff
                                          • Instruction Fuzzy Hash: 6F815D62B18A41D9EB10AF79D4806AC77B1FB487A8F941632DB6D43B98DF38D494C320
                                          APIs
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF749B4273A,?,?,?,?,?,?,?,00007FF749B42507), ref: 00007FF749B5EAF1
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF749B5EC93
                                          • strchr.VCRUNTIME140(?,?,?,00000000,TRUE,?,00000000,00000000,00000000,?), ref: 00007FF749B5ECB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: strchr$_errno
                                          • String ID: 0123456789ABCDEF$0123456789abcdef$TRUE
                                          • API String ID: 2644425738-1191287149
                                          • Opcode ID: 80a7ba58b925df85135058493c5ea55515205fdf99ffd7a4c78439a096bb6b7d
                                          • Instruction ID: 5ba177cee79fc39424cd313b0f4ac50098b2a0af5ecab5b8542b5fa878547144
                                          • Opcode Fuzzy Hash: 80a7ba58b925df85135058493c5ea55515205fdf99ffd7a4c78439a096bb6b7d
                                          • Instruction Fuzzy Hash: AD51F612A0C78DF1EE65BF15A85817AF6B0AB95B9CFD54031DA4E07B85EE3CE841C320
                                          APIs
                                          • memmove.VCRUNTIME140(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC5BC
                                          • memmove.VCRUNTIME140(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC600
                                          • memmove.VCRUNTIME140(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC618
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC69B
                                          • memmove.VCRUNTIME140(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC6CD
                                          • memmove.VCRUNTIME140(?,0000006E00000006,00000004,00007FF749ADAAAD,?,?,?,?,?,00007FF749AD1BB8), ref: 00007FF749ADC6E8
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADC713
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2016347663-0
                                          • Opcode ID: 6229b2a68439bf8a8732a03b0d685acaef6d4ce1994079a7990c5fec5fa2d3db
                                          • Instruction ID: af1903d0a87a6face3f71e52ff05d06b5e4c60c2be610c8abf70acdedabc77fe
                                          • Opcode Fuzzy Hash: 6229b2a68439bf8a8732a03b0d685acaef6d4ce1994079a7990c5fec5fa2d3db
                                          • Instruction Fuzzy Hash: A351BC32B08B85D2EA10BF21E144269B376FB64B84F945636DF6C07792CF38E5A5D360
                                          APIs
                                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF749ADABA3
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF749ADABF7
                                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF749ADAC1E
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF749ADAC46
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749ADAC8C
                                          • ?uncaught_exceptions@std@@YAHXZ.MSVCP140 ref: 00007FF749ADAC93
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF749ADACA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
                                          • String ID:
                                          • API String ID: 729925803-0
                                          • Opcode ID: e5a96308c8c68a5828d493701c653437e267046fe4c2e9004f3f9df530630d66
                                          • Instruction ID: 502e3972692e76af92bb78b6928cf4b11bcec69efa0bcff3300695214a4044ac
                                          • Opcode Fuzzy Hash: e5a96308c8c68a5828d493701c653437e267046fe4c2e9004f3f9df530630d66
                                          • Instruction Fuzzy Hash: 4251402270CA41C2EB21AF19D594638F7B2EBC5FA5F558635CA6E437A0CF39D846C220
                                          APIs
                                          • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADCF4F
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADCFA6
                                          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADCFD3
                                          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADCFF6
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADD03C
                                          • ?uncaught_exceptions@std@@YAHXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADD043
                                          • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADCD6D), ref: 00007FF749ADD050
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exceptions@std@@Osfx@?$basic_ostream@V12@
                                          • String ID:
                                          • API String ID: 729925803-0
                                          • Opcode ID: 86276fc850bb9002e1b932d13d318707eb474fad3bd478d2d7c372b6d34941d8
                                          • Instruction ID: e18c36dbcf5f8e5144ff25e2f10af852fce6d989ed73e0ef92e1afa3cfb46af9
                                          • Opcode Fuzzy Hash: 86276fc850bb9002e1b932d13d318707eb474fad3bd478d2d7c372b6d34941d8
                                          • Instruction Fuzzy Hash: 09513F2270DB41C1EB20AF19D480678FBB1EB89F95F958635DE6E43BA4CF39D446C260
                                          APIs
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0AE9
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0B09
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0B3F
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0B61
                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0B85
                                          • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0B91
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF749AE55E0), ref: 00007FF749AE0BB4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$_wfopenfreemalloc
                                          • String ID:
                                          • API String ID: 2585890673-0
                                          • Opcode ID: d7d457bdeee97476beb2dc66c721115759ea3d50546fdbe85fc62cbbc87ab246
                                          • Instruction ID: 5b0a30499c825a04dd82ec5b881863027c785e6f9846bfed629a29a8af0ba9fd
                                          • Opcode Fuzzy Hash: d7d457bdeee97476beb2dc66c721115759ea3d50546fdbe85fc62cbbc87ab246
                                          • Instruction Fuzzy Hash: 53315B3570DB4682EB24AF56A55457AF6A1FB88BD4F880239DA8D83F68DF3CD101C710
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskD@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                          • String ID:
                                          • API String ID: 3790006010-0
                                          • Opcode ID: 7957191fbb0a854b0c1089f30d322c8dc66b1ded338712f7915fde62ddebfa6f
                                          • Instruction ID: 69d215b0a5bbcac33831c754873a7cee848c214a05158e475454f035151f0cb0
                                          • Opcode Fuzzy Hash: 7957191fbb0a854b0c1089f30d322c8dc66b1ded338712f7915fde62ddebfa6f
                                          • Instruction Fuzzy Hash: D6216D22B0DA45D1EE04BF25E8401A9B731FB89BA4F980231DB5D477A8EF3CD895C320
                                          APIs
                                          • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB8B6
                                          • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB8D0
                                          • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB902
                                          • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB92D
                                          • std::_Facet_Register.LIBCPMT ref: 00007FF749ADB946
                                          • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB965
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADB97B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                                          • String ID:
                                          • API String ID: 762505753-0
                                          • Opcode ID: 0e1d11d946f146c4704149b1dac9309d81a1598e05fc757a21250c8451b6f2f6
                                          • Instruction ID: 72e9219f43c0f5c195700fecaff95b43ab7521120bca658bef55e89054084b4d
                                          • Opcode Fuzzy Hash: 0e1d11d946f146c4704149b1dac9309d81a1598e05fc757a21250c8451b6f2f6
                                          • Instruction Fuzzy Hash: 98212D21B0DA45D5EA44BF25E480179B771FB59BA4F880231DB6D477A8DF3CD895C320
                                          APIs
                                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD8A50
                                          • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF749AD8A6F
                                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD8AA1
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF749AD8ABC
                                            • Part of subcall function 00007FF749ADA440: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA471
                                            • Part of subcall function 00007FF749ADA440: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA48E
                                            • Part of subcall function 00007FF749ADA440: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA4B7
                                            • Part of subcall function 00007FF749ADA440: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA502
                                            • Part of subcall function 00007FF749ADA440: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA517
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749AD8B0B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@_get_stream_buffer_pointers
                                          • String ID: C:\Windows\key.txt
                                          • API String ID: 2682282330-556312689
                                          • Opcode ID: dae7750858fc5cc4f43f78b284e632c2c3fcec991cc253998762de197a735dd6
                                          • Instruction ID: 9f66491694486b43177ef9c6203695ab8a9c236d30499fae6b1f25a4e4ae6256
                                          • Opcode Fuzzy Hash: dae7750858fc5cc4f43f78b284e632c2c3fcec991cc253998762de197a735dd6
                                          • Instruction Fuzzy Hash: 35217F32609B85C5EB00EF25E994769B7B4FB89B88F848035CA4D87B24EF3DD158CB50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ContextWindow$CandidateCompositionRelease
                                          • String ID: $@
                                          • API String ID: 3969737024-1077428164
                                          • Opcode ID: b48421ba505861f01a7f6b0a58ca27344349827b5f1ddb2368fe25018b434d15
                                          • Instruction ID: e08a4b3dece6e7a01ca8c2ea8d453264766a7382c9ec7698613e1305730e3d2a
                                          • Opcode Fuzzy Hash: b48421ba505861f01a7f6b0a58ca27344349827b5f1ddb2368fe25018b434d15
                                          • Instruction Fuzzy Hash: 72111CB2A0878587D725DF25F14412AF3B1FB89B84F544225EB8947B18EB7CD981CF10
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemalloc$memmove
                                          • String ID:
                                          • API String ID: 3069178222-0
                                          • Opcode ID: 5235d663a8b1504466512e45ff2b238fc4c4d386805156399c015cc0ddea239b
                                          • Instruction ID: 17cdb3bfa360f45727d1716a638564916ebb34eda3c7283b899ab93d818435a9
                                          • Opcode Fuzzy Hash: 5235d663a8b1504466512e45ff2b238fc4c4d386805156399c015cc0ddea239b
                                          • Instruction Fuzzy Hash: 76913922A09B85C6EB54EF24E550678B7B4FB98B44F899239CF8D43765EF38E485C310
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE425D
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE42B9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE42F5
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE431A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE433F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE4364
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE4389
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3588), ref: 00007FF749AE43AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: b1dc68397b6216c988fd3bdf2bd51b68aa63e2493599a5e70d4e1fd3c1ab4ac1
                                          • Instruction ID: 5d9297bdb8db71b488a4bff6f8814e4ad1fb4d376dfc7b0950e1f8a6aa743a8e
                                          • Opcode Fuzzy Hash: b1dc68397b6216c988fd3bdf2bd51b68aa63e2493599a5e70d4e1fd3c1ab4ac1
                                          • Instruction Fuzzy Hash: D841F221B4E682C1EE95BF25D590B79B7B4EF85B81F894435CE0D47A65EF3CA840E230
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memchr
                                          • String ID: %*s%.*s$( )$(x)$0$Alpha Bar
                                          • API String ID: 3297308162-869251483
                                          • Opcode ID: 7cbf9d0bf17427ff5ac0d8f3956d74f1f14bcf28afacec44a02494fe02bf8bd9
                                          • Instruction ID: e5cd65a4b0c881131a77dc4dc1d5412a0d329d1b4f4e1fdfe8a4f806119a5183
                                          • Opcode Fuzzy Hash: 7cbf9d0bf17427ff5ac0d8f3956d74f1f14bcf28afacec44a02494fe02bf8bd9
                                          • Instruction Fuzzy Hash: 2712E72290C7C9C5E711EF3694422B9F771EF59398F489331EE58276A6DF28A581C710
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove
                                          • String ID: <NULL>$[focus] FocusWindow("%s", UnlessBelowModal): prevented by "%s".$[focus] SetNavWindow("%s")
                                          • API String ID: 2162964266-1643275426
                                          • Opcode ID: 55271c96c88f9fae1a75add93519bea57f02be646a988a4e9542439fbfcde2fc
                                          • Instruction ID: f7ba75b263c69a528039d5d05681002af0c401cd9c3cef2c49d80444b028de8c
                                          • Opcode Fuzzy Hash: 55271c96c88f9fae1a75add93519bea57f02be646a988a4e9542439fbfcde2fc
                                          • Instruction Fuzzy Hash: D7D18066B4E6C1C5EE65FF25D188BB8B7B5EB40B88F854535CA0D47794EF38A540C320
                                          APIs
                                          • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF749B027BA), ref: 00007FF749B088EF
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF749B027BA), ref: 00007FF749B08927
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF749B027BA), ref: 00007FF749B08A8C
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF749B027BA), ref: 00007FF749B08AAC
                                          • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,00007FF749B027BA), ref: 00007FF749B08B4D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$memcmp
                                          • String ID:
                                          • API String ID: 845337883-3916222277
                                          • Opcode ID: d01b0d190c40bf86898d147f0478f24bf2d20cf19b88881a9ac3b6ece8201f08
                                          • Instruction ID: f38fe3cd118fa298fd848e5f5a728f2d55be9495f09a4d13af779aa132baa058
                                          • Opcode Fuzzy Hash: d01b0d190c40bf86898d147f0478f24bf2d20cf19b88881a9ac3b6ece8201f08
                                          • Instruction Fuzzy Hash: B3B11F32A08689C6DBA0EF14D445B6EB7B4FB84B84F869135DB8D53B90DF39E941CB00
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: malloc$freememmove
                                          • String ID: Table$Window
                                          • API String ID: 3044343941-616867329
                                          • Opcode ID: 44a86123907e60d35f08c3677c89b780a9a9a75d933fbb9968da36fe92a3118f
                                          • Instruction ID: c24ea1a9409ba59c30df82b8bc6ceb16d93d9df5613e6952606042779c658dc8
                                          • Opcode Fuzzy Hash: 44a86123907e60d35f08c3677c89b780a9a9a75d933fbb9968da36fe92a3118f
                                          • Instruction Fuzzy Hash: B1B17236B09B82D9EB51EF24E850AB9B3B5FB44744F854236DE4D43B64EF38A065C360
                                          APIs
                                          • memset.VCRUNTIME140(?,00000000,IMGUI,00007FF749AE8EB7,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AE3F2F
                                          • memset.VCRUNTIME140(?,00000000,IMGUI,00007FF749AE8EB7,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AE3F6D
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,IMGUI,00007FF749AE8EB7,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AE3FA0
                                          • memmove.VCRUNTIME140(?,00000000,IMGUI,00007FF749AE8EB7,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AE3FB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset$mallocmemmove
                                          • String ID: #MOVE$IMGUI
                                          • API String ID: 1346079573-2253754107
                                          • Opcode ID: 860578fb86b96cea6f474b4badda22faaa2eb5b714278d442ca018c4e0a9f8b4
                                          • Instruction ID: 4ec5fa949cbbd407fa4e53a50ba0f8a6385c15df4d9d0405eebc01069f917175
                                          • Opcode Fuzzy Hash: 860578fb86b96cea6f474b4badda22faaa2eb5b714278d442ca018c4e0a9f8b4
                                          • Instruction Fuzzy Hash: 48C13632606B81DAD754DF29E98879877B8F345F14FA94239C7A84B3A0DF35E062C708
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ProcessToken_invalid_parameter_noinfo_noreturn$CurrentErrorInformationLastOpenfree
                                          • String ID: K]YU$W]GP$[W$]F__$^R\H
                                          • API String ID: 3737595156-3239892679
                                          • Opcode ID: 89e37f8684de987263b0c63f1ada3afa6c06dd906b7a781d77a036f487ae2a26
                                          • Instruction ID: 13af50151fd73bfc84cd85e1a21d3f1eedb6136e95b81482821ea14b6990fc35
                                          • Opcode Fuzzy Hash: 89e37f8684de987263b0c63f1ada3afa6c06dd906b7a781d77a036f487ae2a26
                                          • Instruction Fuzzy Hash: B4C1AE72908BC5CAEB24EF64E8443ED7771F751788F809125DA981BE9ADF78D284C350
                                          APIs
                                          • memmove.VCRUNTIME140(?,0000000100000000,?,00007FF749ADA665,?,?,?,?,00000000,00007FF749ADAA54), ref: 00007FF749ADC38E
                                          • memmove.VCRUNTIME140(?,0000000100000000,?,00007FF749ADA665,?,?,?,?,00000000,00007FF749ADAA54), ref: 00007FF749ADC39C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,0000000100000000,?,00007FF749ADA665,?,?,?,?,00000000,00007FF749ADAA54), ref: 00007FF749ADC3D5
                                          • memmove.VCRUNTIME140(?,0000000100000000,?,00007FF749ADA665,?,?,?,?,00000000,00007FF749ADAA54), ref: 00007FF749ADC3DF
                                          • memmove.VCRUNTIME140(?,0000000100000000,?,00007FF749ADA665,?,?,?,?,00000000,00007FF749ADAA54), ref: 00007FF749ADC3ED
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADC41F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2016347663-0
                                          • Opcode ID: f87abdf2ad6788e88da780162f623bea54c27cffbd71bb53fa6fdbdb531a4f23
                                          • Instruction ID: 96a1447f95d0f2a876471853d8e3b64520047bb70f83eac99d7cd2898ce17687
                                          • Opcode Fuzzy Hash: f87abdf2ad6788e88da780162f623bea54c27cffbd71bb53fa6fdbdb531a4f23
                                          • Instruction Fuzzy Hash: E8419D62B0DB85C1EE10BF26A50466DF376AB48BE4F884631DE6D0BB95DE7CE441C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: cosfsinf
                                          • String ID:
                                          • API String ID: 3160392742-0
                                          • Opcode ID: 7054fc144a9db7a41b42dc8d46730ea50af751d8d3562cf540aebf2072e0d97e
                                          • Instruction ID: 6c8dc7b3f860cfa92f57bb31ec95864eba7f7f93a6bfad153dec4a9ccdff25ed
                                          • Opcode Fuzzy Hash: 7054fc144a9db7a41b42dc8d46730ea50af751d8d3562cf540aebf2072e0d97e
                                          • Instruction Fuzzy Hash: 11616312D2DACD85E213AB3B64421F9F370AF7E295F5DDB23B94431672EB2931C19610
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: 30f6fc06d8aa99c44d6c7a1ec476e0cc198d3321f60e4c8ab49a2efde8a50462
                                          • Instruction ID: 35534be97bf69b322be83d4951266dd06f3c1522ee29add0143e2beba7f0ad0c
                                          • Opcode Fuzzy Hash: 30f6fc06d8aa99c44d6c7a1ec476e0cc198d3321f60e4c8ab49a2efde8a50462
                                          • Instruction Fuzzy Hash: 6C417A62B09B45D5EE50BF26A4046AAB366FB48BE0F940735DA7D07BD5DE3CE045C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID:
                                          • API String ID: 2016347663-0
                                          • Opcode ID: ff3c9f309dce709ab287b79d9d59a8e4a57c8a6cc1586f59748fab35eacf2815
                                          • Instruction ID: ebad23ae0607ef2f331ce5756dfb30faf80dda82994a1166283a62992cf7452b
                                          • Opcode Fuzzy Hash: ff3c9f309dce709ab287b79d9d59a8e4a57c8a6cc1586f59748fab35eacf2815
                                          • Instruction Fuzzy Hash: E0417162B0D789C5ED14BF16A5082A9A365EB09BE4F844635DFAD0BBD5CE3CE051C324
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ByteCharMultiWide$memset
                                          • String ID:
                                          • API String ID: 1216362210-0
                                          • Opcode ID: 2f86100075488dc2895ac80045b3172df7420ac5d353aafb5f5a24fd6fb9e648
                                          • Instruction ID: 02299886b422c6559eb36bb6fabbce13cb8102985875549fc487621c06d996dd
                                          • Opcode Fuzzy Hash: 2f86100075488dc2895ac80045b3172df7420ac5d353aafb5f5a24fd6fb9e648
                                          • Instruction Fuzzy Hash: ED41C132A0878586D724FF22B84486AB7A6F788BD0F848238EE9E47B55DF3CD150C700
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ConditionMask$InfoVerifyVersion
                                          • String ID:
                                          • API String ID: 2793162063-0
                                          • Opcode ID: 3ee7ddaf3e1c06c6a6398bdd6a421201e265b262f0c8a428d451b262cca2e102
                                          • Instruction ID: 208b9a9bfa88bc5d59df40583979aacdd5699b40877e2e34047b634b8739d674
                                          • Opcode Fuzzy Hash: 3ee7ddaf3e1c06c6a6398bdd6a421201e265b262f0c8a428d451b262cca2e102
                                          • Instruction Fuzzy Hash: 4141A122E1CA86D6F630AF11A4207BAE3B0EBE5354F465235E9CD06E54DE3DE880DF10
                                          APIs
                                          • ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA471
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA48E
                                          • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA4B7
                                          • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA502
                                            • Part of subcall function 00007FF749ADB8A0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB8B6
                                            • Part of subcall function 00007FF749ADB8A0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB8D0
                                            • Part of subcall function 00007FF749ADB8A0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB902
                                            • Part of subcall function 00007FF749ADB8A0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB92D
                                            • Part of subcall function 00007FF749ADB8A0: std::_Facet_Register.LIBCPMT ref: 00007FF749ADB946
                                            • Part of subcall function 00007FF749ADB8A0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADB965
                                          • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA517
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA52E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                          • String ID:
                                          • API String ID: 3911317180-0
                                          • Opcode ID: e45fd2e57c03baaa525226abc4910a52dce2dc27cc26d15a03e824d62b295426
                                          • Instruction ID: 30cd82afe3f5d1f5b47008c242549d8646470777ebb873e6e68c6786011009ff
                                          • Opcode Fuzzy Hash: e45fd2e57c03baaa525226abc4910a52dce2dc27cc26d15a03e824d62b295426
                                          • Instruction Fuzzy Hash: 1C311532609B85C5EB50EF25E840229B3B5FB88F98F880135DA8E87B58EF3CD559C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$freemalloc
                                          • String ID:
                                          • API String ID: 1763039611-0
                                          • Opcode ID: 99efab27ae5e9b5faac00c1493ce1478530f9ecc7bd48990b3ba1aedb960b922
                                          • Instruction ID: 4681565cf78fbd187ab2f901627f78fbdb5e1b721f688dc8f0e577bf0633a80d
                                          • Opcode Fuzzy Hash: 99efab27ae5e9b5faac00c1493ce1478530f9ecc7bd48990b3ba1aedb960b922
                                          • Instruction Fuzzy Hash: E7612012E18BC596E711AF3499112F96330F7A978CF41A325EE8D12A5BEF68E6D4C310
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CreateThread_invalid_parameter_noinfo_noreturn
                                          • String ID: C$xh=U$zY
                                          • API String ID: 2430190256-441139468
                                          • Opcode ID: c5f02b9ad058b4ba9fa1cfba331c6733887d9d1d4aa68394696c7e08015486d3
                                          • Instruction ID: 437b91f7bbf0a8b6de12671ca64cd33591a7d582ae8d18f940552de62cc90c59
                                          • Opcode Fuzzy Hash: c5f02b9ad058b4ba9fa1cfba331c6733887d9d1d4aa68394696c7e08015486d3
                                          • Instruction Fuzzy Hash: 9651DB22F18681C9FB10EF24D4403ACBB70FB897A8F945239DE691AA99DF38C145C360
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                          • String ID: && timeout /t 5"
                                          • API String ID: 2016347663-934313417
                                          • Opcode ID: d38c32d26b6d8627c8941b386b5ce6912851c2795a87a45ad6e5a617f0f6f6cf
                                          • Instruction ID: 1e64bee2633d00a543512bce5b68f30dbfab009cf5b063f2f36df2c226608da9
                                          • Opcode Fuzzy Hash: d38c32d26b6d8627c8941b386b5ce6912851c2795a87a45ad6e5a617f0f6f6cf
                                          • Instruction Fuzzy Hash: 8E31D562B0D78994ED14BF1695082ADA265EB09BE0F884735DFAD0BFD5DE3CE051C311
                                          APIs
                                            • Part of subcall function 00007FF749B08DC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF749B08C70,?,?,00000000,00007FF749AE3451), ref: 00007FF749B08E19
                                            • Part of subcall function 00007FF749B08DC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF749B08C70,?,?,00000000,00007FF749AE3451), ref: 00007FF749B08EBF
                                            • Part of subcall function 00007FF749B08DC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF749B08C70,?,?,00000000,00007FF749AE3451), ref: 00007FF749B08EEB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08C8B
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08CAC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08CFA
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08D2A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08D56
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08D78
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3451), ref: 00007FF749B08D9A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 9855041c796d53968c798ecea06055c64b4a0f5ac50a62a94af5acda7a494944
                                          • Instruction ID: 2d3fe20da5a4dd3161af7674eb6c6e8834b90ba9cb29be08aa39472af7272f2b
                                          • Opcode Fuzzy Hash: 9855041c796d53968c798ecea06055c64b4a0f5ac50a62a94af5acda7a494944
                                          • Instruction Fuzzy Hash: 12410621A0EA4AC6EA94BF159590639B7B0EF45F80F880539CE8D43B65DF3DE940D264
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID: Alpha Bar
                                          • API String ID: 2075926362-368576921
                                          • Opcode ID: f11143dddd907de09378a5d065022c5f83e96f6967bade34131ae0f3a291269a
                                          • Instruction ID: 71422d524c1b6ae733e9620358af7da135fec230c9645e4c8339a8e2b1237a26
                                          • Opcode Fuzzy Hash: f11143dddd907de09378a5d065022c5f83e96f6967bade34131ae0f3a291269a
                                          • Instruction Fuzzy Hash: 7C317022B08B85C1EA14EF12A440669B2B6EB44BD4F984735DEAD07BD5DF3CE051C310
                                          APIs
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B0297D
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B029A6
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B029CF
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B02A04
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B02A2D
                                            • Part of subcall function 00007FF749B02950: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B02A59
                                            • Part of subcall function 00007FF749B086B0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B0871D
                                            • Part of subcall function 00007FF749B086B0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B0874D
                                            • Part of subcall function 00007FF749B086B0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749B0879E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF04E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF073
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF095
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF0B7
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF0D9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF0FB
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE3851), ref: 00007FF749ADF11D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 1dba98420b6e8eae88b31588a35daccaca3e5d8a497152ca6e3f8d75ca0533b5
                                          • Instruction ID: 3f114e52ea5dfff73618cbe5e4f057f93536fb33d8b354c7dafcaaf7b78ababf
                                          • Opcode Fuzzy Hash: 1dba98420b6e8eae88b31588a35daccaca3e5d8a497152ca6e3f8d75ca0533b5
                                          • Instruction Fuzzy Hash: 11315521B5E642D1EE58BF21D690B36B7B2EF41B81F884535CA1D43A61EF3CA840D270
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove
                                          • String ID: ##previewing_picker$##selectable$Alpha Bar$context
                                          • API String ID: 2162964266-280553805
                                          • Opcode ID: be9e0c706fcfe9cb437436cbeaf0ab1beb8b0aa52f74ba4f9d23982b9abd8ceb
                                          • Instruction ID: 654118f23f834a72a55e87eac350fde59cc4bb836c2e44e7eec056556ebf603c
                                          • Opcode Fuzzy Hash: be9e0c706fcfe9cb437436cbeaf0ab1beb8b0aa52f74ba4f9d23982b9abd8ceb
                                          • Instruction Fuzzy Hash: 25A1BA32A0C7C6C6EB51EF26D4413EAB7A0EB4AB44F884131DE4947AA5DB78E444C721
                                          APIs
                                          • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF749ADB4C3
                                          • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF749ADB4E4
                                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADB55C
                                          • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADB5DA
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749ADB626
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@Vlocale@2@
                                          • String ID:
                                          • API String ID: 481934583-0
                                          • Opcode ID: 91232f358c2bf9d958298b33d226d9d3e783bb1ef92b109507ab991e13bf674c
                                          • Instruction ID: a7013f4d3b2ef9bce01c050140b6f9d0e5679fc7f4fb1baddae9385b6ec6246c
                                          • Opcode Fuzzy Hash: 91232f358c2bf9d958298b33d226d9d3e783bb1ef92b109507ab991e13bf674c
                                          • Instruction Fuzzy Hash: F4518C22B09A85C5DB50EF2AD190739BBB1EB85F95F448232CE2E477A4CF39D449C320
                                          APIs
                                          • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF749ADD1BC
                                          • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADD1EE
                                          • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADD229
                                          • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF749ADD28C
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749ADD2C8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: D@std@@@std@@U?$char_traits@$?sbumpc@?$basic_streambuf@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@
                                          • String ID:
                                          • API String ID: 1457788575-0
                                          • Opcode ID: 8e53c51c7808d9a83926ee13e303a89c5079bc460ee0a4c8d43f6f96c49013e0
                                          • Instruction ID: d4f9bfc299c91bd339335e01b737f48305a62fd1961f3cfbefa645ebec314ba6
                                          • Opcode Fuzzy Hash: 8e53c51c7808d9a83926ee13e303a89c5079bc460ee0a4c8d43f6f96c49013e0
                                          • Instruction Fuzzy Hash: CA416B3270CA85C1DA60EF19E580A29BBB1FB95B94F448235DEAE43B64CF39D441C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: e986e104909cdb5543e856eae09ddaa1bb993b21445b1d754270e3d06ca4473c
                                          • Instruction ID: 8defee38c1285c36e8ecfbcb4f2f84e64680ccbfe5cf38962fe406f85a5fc743
                                          • Opcode Fuzzy Hash: e986e104909cdb5543e856eae09ddaa1bb993b21445b1d754270e3d06ca4473c
                                          • Instruction Fuzzy Hash: 6231F63660EB4AC1EB98AF24E590A38B7B4FF44F84B884535CE4D42B64DF38D854D360
                                          APIs
                                          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD7D59
                                          • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF749AD7D78
                                          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF749AD7DAB
                                          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF749AD7DC6
                                            • Part of subcall function 00007FF749ADA440: ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA471
                                            • Part of subcall function 00007FF749ADA440: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA48E
                                            • Part of subcall function 00007FF749ADA440: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA4B7
                                            • Part of subcall function 00007FF749ADA440: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA502
                                            • Part of subcall function 00007FF749ADA440: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,00007FF749AD62E9), ref: 00007FF749ADA517
                                          • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF749AD7E11
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Fiopen@std@@U_iobuf@@V?$basic_streambuf@Vlocale@2@_get_stream_buffer_pointers
                                          • String ID:
                                          • API String ID: 219286276-0
                                          • Opcode ID: 169c17c70c3e3fc55da383ea1330478abd85ecee2554d7c0be9f064c70077c30
                                          • Instruction ID: b49c848c86028030aea4a529233537be93f91bb738f5f9c2f1fafcb377a70c1d
                                          • Opcode Fuzzy Hash: 169c17c70c3e3fc55da383ea1330478abd85ecee2554d7c0be9f064c70077c30
                                          • Instruction Fuzzy Hash: 29215932608B81C5EB00EF25E858769BBB0FB89B99F858531CA4D87B24EF7CD059C750
                                          APIs
                                          Strings
                                          • ** Resuming transfer from byte position %I64d, xrefs: 00007FF749B5C9F8
                                          • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF749B5CC55
                                          • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF749B5CA0B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fflush
                                          • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                          • API String ID: 497872470-664487449
                                          • Opcode ID: afc1dcec37a860a47eb59120197269415b9d67e2045f598db2bd42290ef41b11
                                          • Instruction ID: 7bde52c86069b4c62e764563db05aeb8305bb3382e22e9ee55a9986e3647218e
                                          • Opcode Fuzzy Hash: afc1dcec37a860a47eb59120197269415b9d67e2045f598db2bd42290ef41b11
                                          • Instruction Fuzzy Hash: 3E91AD62A0AB8AD5DA61EF05E5457AAB3A5FB84BD4F821032DE4D87F95FF38D401C700
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: malloc$ChainCreateDeviceSwap
                                          • String ID: imgui_impl_dx11
                                          • API String ID: 2169213826-2671864370
                                          • Opcode ID: 1a6ade1793cb5f3162f320b5d3e5937a98367d3efd800cadc89ad57da0e6f194
                                          • Instruction ID: 1e7b62711d2e62a8dc0399ab463ff48efc11b1e050614da081a7cf339db92523
                                          • Opcode Fuzzy Hash: 1a6ade1793cb5f3162f320b5d3e5937a98367d3efd800cadc89ad57da0e6f194
                                          • Instruction Fuzzy Hash: DB911A32A09B82D6EB00EF25E8406A9B7B4FB85B48F844136DE4D47B64EF7CE154C320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: fwrite
                                          • String ID: ...$...
                                          • API String ID: 3559309478-2253869979
                                          • Opcode ID: 97594f703943f479b0833ac58e7adeaa4a1f39e5f324280c9d694f730d27d5b3
                                          • Instruction ID: a0b58d2f94661149bf40af6084c89c24151f320d35b7776b959ff983afc8b56a
                                          • Opcode Fuzzy Hash: 97594f703943f479b0833ac58e7adeaa4a1f39e5f324280c9d694f730d27d5b3
                                          • Instruction Fuzzy Hash: 5E31A021A1CA8AE2EB24FF11D4487B9A3B1FB84B94F848131CA5D43B94DF3DE155C790
                                          APIs
                                            • Part of subcall function 00007FF749B50400: GetModuleHandleA.KERNEL32(?,?,00000000,00007FF749B7955A,?,?,?,?,00007FF749B5078B), ref: 00007FF749B50414
                                          • GetProcAddress.KERNEL32(?,?,?,?,00007FF749B5078B), ref: 00007FF749B79570
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: AddressHandleModuleProc
                                          • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                          • API String ID: 1646373207-3788156360
                                          • Opcode ID: 304e363b5f213cb32a6d3cd893ee8ee189bb5b52218f7ebc0898f5c48cd68133
                                          • Instruction ID: c2766e106b5e3754b44c723022ee839401fbf96c5646f30ece5454b27659a83c
                                          • Opcode Fuzzy Hash: 304e363b5f213cb32a6d3cd893ee8ee189bb5b52218f7ebc0898f5c48cd68133
                                          • Instruction Fuzzy Hash: 91F01460E0EB1BC0FE18FF25A891770A2B0AF59384FC44578C40D82B95FE2CE559C320
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID: $.
                                          • API String ID: 1294909896-3929174939
                                          • Opcode ID: 2a02021faaadef8e18ea8dcbe0163aa643635b69c4e0ee1248587c4c7edbd21b
                                          • Instruction ID: f5816e55c46afb070d0cd24a24be9674b4dd3729c868c0da8646dcd48ec562ff
                                          • Opcode Fuzzy Hash: 2a02021faaadef8e18ea8dcbe0163aa643635b69c4e0ee1248587c4c7edbd21b
                                          • Instruction Fuzzy Hash: 3D02C372A09A4AC6CB95EF25C09087CB7B1FB54F88B915232CB0E57798EF38E585C750
                                          APIs
                                          • memset.VCRUNTIME140(?,?,00000001,00007FF749ADCC26,?,?,?,?,?,?,00000000,?,?,00007FF749ADCA19), ref: 00007FF749ADE62E
                                          • memmove.VCRUNTIME140(?,?,00000001,00007FF749ADCC26,?,?,?,?,?,?,00000000,?,?,00007FF749ADCA19), ref: 00007FF749ADE65C
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000001,00007FF749ADCC26,?,?,?,?,?,?,00000000,?,?,00007FF749ADCA19), ref: 00007FF749ADE6C5
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADE6D2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemmovememset
                                          • String ID:
                                          • API String ID: 2090792099-0
                                          • Opcode ID: 4428559fd562f3816a1f16d75ba0552f46b7a3d613fa3d96a481c4ded5072673
                                          • Instruction ID: 53ade4bf85972d2fc90cc51d7ae34fa45eba37c9be989746ac2f0d5c180e0e4e
                                          • Opcode Fuzzy Hash: 4428559fd562f3816a1f16d75ba0552f46b7a3d613fa3d96a481c4ded5072673
                                          • Instruction Fuzzy Hash: 9A517E62B09A85C2EA14BF25D5486BDB372EB44BA0FA88635DB7D07794DF2CE451C320
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cpp_error@std@@Throw_$Mtx_lockMtx_unlockmemmove
                                          • String ID:
                                          • API String ID: 3408330162-0
                                          • Opcode ID: ef96c0bd6185b336125b9c3a69d9e7a4550403b20bc196a1039556215fd47863
                                          • Instruction ID: 9c4a9de3b04d7573cb217a3b32544ba90b23dfc7d8086bbaaaab48fad819b3d2
                                          • Opcode Fuzzy Hash: ef96c0bd6185b336125b9c3a69d9e7a4550403b20bc196a1039556215fd47863
                                          • Instruction Fuzzy Hash: CC514C32A0CB81C2E750BF25E440269B7B1FB86B94F998235DA9D437A5DF3CE491C720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: 42a36bb7b05c09e4cc9df34325f73003b25a7bba15863f9cdb47993b06d34c32
                                          • Instruction ID: 0a0f0cdd001ea0e71d2d9ae18eda2e5e007f3ef107f38a7651b286459454ed5e
                                          • Opcode Fuzzy Hash: 42a36bb7b05c09e4cc9df34325f73003b25a7bba15863f9cdb47993b06d34c32
                                          • Instruction Fuzzy Hash: D241806260DA89C1EA24EF56A5081AEA3A5FB48BD0FA44635EFAD07B95CE3CD140C210
                                          APIs
                                          • memmove.VCRUNTIME140(?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC092
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC0D8
                                          • memmove.VCRUNTIME140(?,00000007,?,00007FF749AD9D6C), ref: 00007FF749ADC0E2
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADC11E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: 94464976a98b57fdf5548a8204c263eb13b021a89d60fed489e77c73e56be74c
                                          • Instruction ID: 6caf6f47e567aeb2086a12fb7aeafe2c8de5dd1694f86a6cd789413e29376c3e
                                          • Opcode Fuzzy Hash: 94464976a98b57fdf5548a8204c263eb13b021a89d60fed489e77c73e56be74c
                                          • Instruction Fuzzy Hash: 97417822B08A45C1EA14BF16A544668B276AB04BF0FE44735DA7D07BD9DE7CE091C360
                                          APIs
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADBAA8
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADBAEB
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ACEE1F), ref: 00007FF749ADBAF5
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADBB30
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: 609695741809de67368d3fac1e96d2c4d0d0f73c5bb6f7babe097cace3dac5b8
                                          • Instruction ID: 54aa130928bc1a2c06a8de4fd6c4224c5144aff8f1fe56f1ba46b80480351274
                                          • Opcode Fuzzy Hash: 609695741809de67368d3fac1e96d2c4d0d0f73c5bb6f7babe097cace3dac5b8
                                          • Instruction Fuzzy Hash: 8141BB31B0CA85C6EA10BF12A5486A9B266EB04BF0F944735DE7D07BE5DE7CE059C320
                                          APIs
                                          • memmove.VCRUNTIME140(?,?,FFFFFFFF,?,00007FF749AD4817), ref: 00007FF749ADD424
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • memmove.VCRUNTIME140(?,?,FFFFFFFF,?,00007FF749AD4817), ref: 00007FF749ADD411
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,FFFFFFFF,?,00007FF749AD4817), ref: 00007FF749ADD497
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADD4A4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: d35861098fdd09bd8a1f34c21687fef5b1a9fc3e450ae56f0b26a99dac073fb3
                                          • Instruction ID: f2cd5074cf270e28a10223bc3fc9eb9d8b40df84263cd640aa6bb5de95473be0
                                          • Opcode Fuzzy Hash: d35861098fdd09bd8a1f34c21687fef5b1a9fc3e450ae56f0b26a99dac073fb3
                                          • Instruction Fuzzy Hash: 08418B62B08A8991EA14FF66D4446ADA375EB08BE4F948735DA7D07BC5CF3CE191C320
                                          APIs
                                          • memmove.VCRUNTIME140(?,00000000,?,00007FF749AC2953), ref: 00007FF749ADA7D7
                                          • memmove.VCRUNTIME140(?,00000000,?,00007FF749AC2953), ref: 00007FF749ADA893
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF749AC2953), ref: 00007FF749ADA8EE
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADA8FB
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                          • String ID:
                                          • API String ID: 2075926362-0
                                          • Opcode ID: c70a6b56bcbbce2d7771b05c0fc620c9da4ae7e43073677214b6eb6038743869
                                          • Instruction ID: 1eb032d1b9b099d6548c0a05ae9827b4f184d3196e1daf7a6bc41adad0f9f5d4
                                          • Opcode Fuzzy Hash: c70a6b56bcbbce2d7771b05c0fc620c9da4ae7e43073677214b6eb6038743869
                                          • Instruction Fuzzy Hash: A1318D22B0DA86D4EA14BF11950477DA2A2AB84BD4FD40635DE2D07BC5DE7CE681C320
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5266f0db459a36a0d2b7f28362d52a71896580e5c18aeeecfd2ad1d402f068f
                                          • Instruction ID: 323f2541c37b072db9dda3876078db2caa307aabc259827e488fb46ed95fc462
                                          • Opcode Fuzzy Hash: e5266f0db459a36a0d2b7f28362d52a71896580e5c18aeeecfd2ad1d402f068f
                                          • Instruction Fuzzy Hash: 58413C32708B81C5DB60AF29E0402ADB3B1F785B98F944236DBAD83798EF38C544C751
                                          APIs
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,00007FF749B3B06F,?,?,?,00007FF749B3BB45), ref: 00007FF749B3B345
                                          • memset.VCRUNTIME140(?,?,?,?,?,?,?,00007FF749B3B06F,?,?,?,00007FF749B3BB45), ref: 00007FF749B3B34E
                                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF749B3B06F,?,?,?,00007FF749B3BB45), ref: 00007FF749B3B353
                                          • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF749B3B06F,?,?,?,00007FF749B3BB45), ref: 00007FF749B3B35F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _errno_invalid_parameter_noinfomemmovememset
                                          • String ID:
                                          • API String ID: 524079128-0
                                          • Opcode ID: 269885a8c9e9ba6e83a5d36a60530a54724e6bfda06aa084f56e9ebb6792c8bd
                                          • Instruction ID: 51ee725a3c33b1367e8e46c15add1aee13d0791f8caa58e92e7bb3739ed32398
                                          • Opcode Fuzzy Hash: 269885a8c9e9ba6e83a5d36a60530a54724e6bfda06aa084f56e9ebb6792c8bd
                                          • Instruction Fuzzy Hash: 3A416A36A08B59C6DB14EF6AE44422DB7B0FB88F94F558126EB5C03B99CF38D491C750
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD9989
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          • memmove.VCRUNTIME140(?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD99AF
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749AD99D3
                                          • ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF749AD3BAF,00000000,?,0000000100000000,00007FF749AC1AAF), ref: 00007FF749AD99F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: ??1?$codecvt@_Concurrency::cancel_current_taskMbstatet@@@std@@_invalid_parameter_noinfo_noreturnmallocmemmove
                                          • String ID:
                                          • API String ID: 3548894795-0
                                          • Opcode ID: e6ae5f57510792ba2cd01619b0cf3882c169c1b500e03dad1697386274561107
                                          • Instruction ID: cfc3a3a9bb80cb2f6e3d419387b9574203fcea2a7003af41cf86405bdb7dfd35
                                          • Opcode Fuzzy Hash: e6ae5f57510792ba2cd01619b0cf3882c169c1b500e03dad1697386274561107
                                          • Instruction Fuzzy Hash: 7631A222B0EB41C1EA14FF11A540379B2B6EB84B94F548635DA7D07BA5DF3CD492C360
                                          APIs
                                          • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF749ADCD6D,?,?,?,?,?,?,00000000), ref: 00007FF749ADCE04
                                            • Part of subcall function 00007FF749AC2140: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF749ADBE28,?,?,?,00007FF749AC157C), ref: 00007FF749AC214B
                                            • Part of subcall function 00007FF749AC2140: terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749AC157C), ref: 00007FF749AC216A
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749ADCEC4
                                            • Part of subcall function 00007FF749AC2000: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF749ADBE2E), ref: 00007FF749AC2044
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Concurrency::cancel_current_taskXlength_error@std@@__std_exception_copymemmoveterminate
                                          • String ID:
                                          • API String ID: 83684134-0
                                          • Opcode ID: d622e3976a3386cf40aab5df8f51c927bd6991605de9d5cb1f4bd99570b60d09
                                          • Instruction ID: 737c0ef286e7db9b4635353a28cd195d357f4eef43166bb07db93dc5493df843
                                          • Opcode Fuzzy Hash: d622e3976a3386cf40aab5df8f51c927bd6991605de9d5cb1f4bd99570b60d09
                                          • Instruction Fuzzy Hash: DC31D022B0C782C5EA14BF219500369B276AB04BD8FA40735DAAD07BD6CF3CE152D360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 3006004123-0
                                          • Opcode ID: bf14d93d66a9cdba98c7895aa927e6710893babc47a09119a4abf9ba59995b98
                                          • Instruction ID: 191bf7e003b079b77c34627a8d547b0084072c51cc52729e243ea7d14de73df2
                                          • Opcode Fuzzy Hash: bf14d93d66a9cdba98c7895aa927e6710893babc47a09119a4abf9ba59995b98
                                          • Instruction Fuzzy Hash: 8C21BF22B0D786C5EA14FF21A40036DB266AB84F94FA44734EA7D0ABD6DE3CE551C360
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF749B2818B), ref: 00007FF749B2E98E
                                          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF749B2E9AA
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B2E9F7
                                            • Part of subcall function 00007FF749BEEC78: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF749ADBDE4,?,?,?,00007FF749AC157C), ref: 00007FF749BEEC92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmalloc
                                          • String ID:
                                          • API String ID: 4234954712-0
                                          • Opcode ID: 981f2f83ee7d4e66d055e64084f7ea18b204ad351ff1fd929de05a1b9bf6a2a7
                                          • Instruction ID: 67bf3c890cbf077c6485a09c36541a25b7b8b211a360048accbee4c5d6fc7766
                                          • Opcode Fuzzy Hash: 981f2f83ee7d4e66d055e64084f7ea18b204ad351ff1fd929de05a1b9bf6a2a7
                                          • Instruction Fuzzy Hash: F131AF66E0E78AC1ED54BB26984D2BCA2A0EF457B0FD00735D67D06BD4EE7C9181C720
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset
                                          • String ID: imgui.ini$imgui_log.txt
                                          • API String ID: 2221118986-3179804127
                                          • Opcode ID: 3989f4551654fc91eccfbd091d3aff7b13819ee947a2a74cbf4125f082a5346c
                                          • Instruction ID: 221924c276ebfd2c4e3f87bfff5f7291853fd51f2251ecf16a36e4541a84627e
                                          • Opcode Fuzzy Hash: 3989f4551654fc91eccfbd091d3aff7b13819ee947a2a74cbf4125f082a5346c
                                          • Instruction Fuzzy Hash: 9251F6B2109781DAC711EF39D964389BBACF715B48F688139DB580F768CB328159CB94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$Concurrency::cancel_current_task
                                          • String ID:
                                          • API String ID: 1247048853-0
                                          • Opcode ID: 9360f2a89afff1852bef6d5ae0e547c705ffa27da32ae28d27c905fe2d670a3f
                                          • Instruction ID: c7f5b371dbf0fa1821ba519b0ca283327e6078c8460606b7ec6f8969546bd19e
                                          • Opcode Fuzzy Hash: 9360f2a89afff1852bef6d5ae0e547c705ffa27da32ae28d27c905fe2d670a3f
                                          • Instruction Fuzzy Hash: 11217C22B0D795C8FA64BF11A440769B2A5EB04BA4F940734EBAD07BC6CF3CE451C360
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CloseCriticalHandleSection$EnterLeaveObjectSingleWaitclosesocket
                                          • String ID:
                                          • API String ID: 817826440-0
                                          • Opcode ID: d5addcc30ed4ea0cd7408a6bedd336dc0c30e29af4b52891fe4f44d7884a5eb2
                                          • Instruction ID: 8876902e19cd2ce380502cf1819524f6b5ff1c5e527f0c46269b9020e8b76d18
                                          • Opcode Fuzzy Hash: d5addcc30ed4ea0cd7408a6bedd336dc0c30e29af4b52891fe4f44d7884a5eb2
                                          • Instruction Fuzzy Hash: DB212726A49A45D2EA20FF52E584369A370FB88B90F844031CF8E47F95CF39E4A1D720
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Cpp_error@std@@Throw_$Mtx_lockMtx_unlock
                                          • String ID:
                                          • API String ID: 3599876872-0
                                          • Opcode ID: 8c7db72ab6ae6d1bb55c7c4ef6b06f52d2034e9b74f6a2352c212f4c36f03ce4
                                          • Instruction ID: 222a87e3e05f39dc41f4df59af62cd294e9eea24109cfe4a4ba5c07fa1908984
                                          • Opcode Fuzzy Hash: 8c7db72ab6ae6d1bb55c7c4ef6b06f52d2034e9b74f6a2352c212f4c36f03ce4
                                          • Instruction Fuzzy Hash: 0F215C21B1DA86C1EA50FF36E454675B7B2BB86B85BC44136C95E473E4EE3CE454C230
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: CriticalSection$CloseEnterHandleLeaveclosesocket
                                          • String ID:
                                          • API String ID: 1837779049-0
                                          • Opcode ID: 9d53ab1e991a2fa011f81cda854530d774672790b4523a534734eae501045703
                                          • Instruction ID: 376a9d818f0e2c5b3dc478eddb689872eff6bd5ba58954e0dc037a87fabc7329
                                          • Opcode Fuzzy Hash: 9d53ab1e991a2fa011f81cda854530d774672790b4523a534734eae501045703
                                          • Instruction Fuzzy Hash: 9A11043AA48A45D6E620BF52E584229B370FB89BA0F444135CF8E43F44DF39E4A1D720
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B02820,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9A84
                                          • memmove.VCRUNTIME140(?,?,##Foreground,00007FF749B02820,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9AA4
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B02820,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9AC4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: ##Foreground
                                          • API String ID: 2537350866-985450567
                                          • Opcode ID: 8857963311e4dc5e3d3d746ded119a0283c34e5257ac4bcf7becbcaac8fc0add
                                          • Instruction ID: 14f6c8a1a9748b1ab160c8134d9c8616a1f462c4b4fb41d70b0718a76b4ec52d
                                          • Opcode Fuzzy Hash: 8857963311e4dc5e3d3d746ded119a0283c34e5257ac4bcf7becbcaac8fc0add
                                          • Instruction Fuzzy Hash: 4F011825B0A686C1EF54FF15E290539B3B0EB84B88B488436DA4D47759EF38E442C630
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B027FD,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9CE2
                                          • memmove.VCRUNTIME140(?,?,##Foreground,00007FF749B027FD,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9CFD
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B027FD,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9D1D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: ##Foreground
                                          • API String ID: 2537350866-985450567
                                          • Opcode ID: 9a832e22dae9ef9c6c146a722e45b183566854b42753b16d29766cdbedf1757d
                                          • Instruction ID: f63f2359c0cbcd66ede01f0eef80befe82047c4f2011dcfe546e298e4936f09b
                                          • Opcode Fuzzy Hash: 9a832e22dae9ef9c6c146a722e45b183566854b42753b16d29766cdbedf1757d
                                          • Instruction Fuzzy Hash: 9F010926B0A786C5EA54EF15E250638B7B0EF88F84B588436DE4D07B59EF3CE841C660
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B02869,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AFA0E3
                                          • memmove.VCRUNTIME140(?,?,##Foreground,00007FF749B02869,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AFA0FF
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B02869,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AFA11F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: ##Foreground
                                          • API String ID: 2537350866-985450567
                                          • Opcode ID: a25bfb4edf31d9a2b34675817523291ef6eaa1420561b14a3af584327e69b476
                                          • Instruction ID: 43a4aa3db69062c131aa64ea1594851dfe9fd4b48b1146d18e0377630ce948f4
                                          • Opcode Fuzzy Hash: a25bfb4edf31d9a2b34675817523291ef6eaa1420561b14a3af584327e69b476
                                          • Instruction Fuzzy Hash: D6010966B0A786C5EA54AF15E650578B7B0EF48F84B498036DE0D07B59EE2CE841C630
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B028AF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9833
                                          • memmove.VCRUNTIME140(?,?,##Foreground,00007FF749B028AF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF984F
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B028AF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF986F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: ##Foreground
                                          • API String ID: 2537350866-985450567
                                          • Opcode ID: 82de06b08a3a85152a3b0ea398c5d8f205a964e808980e28480ba5c7da047c80
                                          • Instruction ID: 0e5bf95cfde2e4a61cf19a1daea25e166b905ffef331515ded7f825c96aeabc0
                                          • Opcode Fuzzy Hash: 82de06b08a3a85152a3b0ea398c5d8f205a964e808980e28480ba5c7da047c80
                                          • Instruction Fuzzy Hash: 79010965B0A686C1EA54EF16E250538B7B0EB88F84B488036DE0D07B59EF28E841C670
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B028FF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9E90
                                          • memmove.VCRUNTIME140(?,?,##Foreground,00007FF749B028FF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9EAC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,##Foreground,00007FF749B028FF,?,?,?,?,?,?,?,?,?,?,##Foreground,00007FF749AE4BE3), ref: 00007FF749AF9ECC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemallocmemmove
                                          • String ID: ##Foreground
                                          • API String ID: 2537350866-985450567
                                          • Opcode ID: a0ffbfd60b0d753cf186eb7ed6f9d4dc8881b535461f925524548978ca4cc258
                                          • Instruction ID: 400c4480f75aede9e8f979a48c45f608f53a9e3941e05eb3c50951d0f645e944
                                          • Opcode Fuzzy Hash: a0ffbfd60b0d753cf186eb7ed6f9d4dc8881b535461f925524548978ca4cc258
                                          • Instruction Fuzzy Hash: 5B013C21B0E786C1EE54EF15E180538B3B0EF84F88B988436DE4D07759EE38D441C230
                                          APIs
                                          • cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF749AEA8F4
                                          • sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF749AEA905
                                            • Part of subcall function 00007FF749B04070: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,42F00000,00000000,?,?), ref: 00007FF749B04177
                                            • Part of subcall function 00007FF749B04070: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,42F00000,00000000,?,?), ref: 00007FF749B04196
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: cosffreemallocsinf
                                          • String ID: 0
                                          • API String ID: 2497593509-4108050209
                                          • Opcode ID: 58d8d62589fae7a55932e55a50c9c93a9773106c94e78167fbadbac08a9b2a17
                                          • Instruction ID: 88ff295e76419b185c23f198e6a9e2b69fecec0ae853711cb059e38321873de5
                                          • Opcode Fuzzy Hash: 58d8d62589fae7a55932e55a50c9c93a9773106c94e78167fbadbac08a9b2a17
                                          • Instruction Fuzzy Hash: 1E22D733E18689CAE722EF3690416A9F370FF5D348F549321EA49665A5EF38F184DB10
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACE6C7
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACE718
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID: ##Foreground
                                          • API String ID: 3668304517-985450567
                                          • Opcode ID: 83996087b63d8135fb703a34007471bf31fb3f265f286255cf03d33e4cf21c70
                                          • Instruction ID: 368b5c4022dea5c424d4841aac112db112fefa7121a3afbf11c75ffa8aec5799
                                          • Opcode Fuzzy Hash: 83996087b63d8135fb703a34007471bf31fb3f265f286255cf03d33e4cf21c70
                                          • Instruction Fuzzy Hash: C1D1AE72A18BC5C9E700EF25E4403ADB7B0FB99794F509226EA8D17BA9DF38D580C710
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B15D12
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749B15D65
                                            • Part of subcall function 00007FF749AC2140: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF749ADBE28,?,?,?,00007FF749AC157C), ref: 00007FF749AC214B
                                            • Part of subcall function 00007FF749AC2140: terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749AC157C), ref: 00007FF749AC216A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn$Xlength_error@std@@terminate
                                          • String ID: picker
                                          • API String ID: 2366732336-3847375488
                                          • Opcode ID: e9066b35cc28ffa4883a18bc164761c17617263fe9657f34b0dc829a65b49ab5
                                          • Instruction ID: c86ef80c4b0ad4b9ce93fec51069da8c74830463298c7cef35f56f1087238823
                                          • Opcode Fuzzy Hash: e9066b35cc28ffa4883a18bc164761c17617263fe9657f34b0dc829a65b49ab5
                                          • Instruction Fuzzy Hash: 5D61AE72908789C6D711EB669044369BB70EB99BA0F58C731DAAC17BE5DF79E0848B00
                                          APIs
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACAC0F
                                          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF749ACAC6E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: _invalid_parameter_noinfo_noreturn
                                          • String ID: ##Background
                                          • API String ID: 3668304517-465303879
                                          • Opcode ID: 467a22e2b036990cec47e3dce1d3f956643a962c021b3e457179d1461d09c8fe
                                          • Instruction ID: d5f63ac71cc6e13d466d8dc03ab93bb3d46a3ff49523606f618e739483ff11f8
                                          • Opcode Fuzzy Hash: 467a22e2b036990cec47e3dce1d3f956643a962c021b3e457179d1461d09c8fe
                                          • Instruction Fuzzy Hash: DB518062E1CBC5D6EA10EF25E4407A9B3B1FB957A0F949332EA9C13799DF68D480C710
                                          APIs
                                          • __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF749AE13B1
                                          • __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF749AE1459
                                            • Part of subcall function 00007FF749AF9C20: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749AF9C4F
                                            • Part of subcall function 00007FF749AF9C20: memmove.VCRUNTIME140 ref: 00007FF749AF9C67
                                            • Part of subcall function 00007FF749AF9C20: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF749AF9C87
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: __stdio_common_vsprintf$freemallocmemmove
                                          • String ID: [focus] SetNavWindow("%s")
                                          • API String ID: 4069205237-2701392973
                                          • Opcode ID: 0627d270482ac4665912d82a30ed4fec64a7f919f65ffaa288f01022040f38f8
                                          • Instruction ID: 5efac78e43745cefd09b2c5b57c2f1b8597b9a29a904f7031f187f02c4ab661c
                                          • Opcode Fuzzy Hash: 0627d270482ac4665912d82a30ed4fec64a7f919f65ffaa288f01022040f38f8
                                          • Instruction Fuzzy Hash: E331D432B0CA5187EB14EE55A884B69B7A1FB88BD0F444235EE9D83B88DF3CE441C750
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$strncpy
                                          • String ID:
                                          • API String ID: 2493730309-0
                                          • Opcode ID: 61ee727bb4c4ae3722bf5c46819d1e88e83b842603bec7fdbfe9cefde8c016c0
                                          • Instruction ID: dd616e0415b029ef3aae8a0c3b6bee327aba5d7ff4b138c060abcc64753f8b84
                                          • Opcode Fuzzy Hash: 61ee727bb4c4ae3722bf5c46819d1e88e83b842603bec7fdbfe9cefde8c016c0
                                          • Instruction Fuzzy Hash: AAB1D222A1C6CEC5EA60FE11E4417BAB7B2AB417C0F944031DA8D57AC9DE2CE589C720
                                          APIs
                                          • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF749ADBE28,?,?,?,00007FF749AC157C), ref: 00007FF749AC214B
                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF749AC157C), ref: 00007FF749AC216A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: Xlength_error@std@@terminate
                                          • String ID: string too long
                                          • API String ID: 2379810350-2556327735
                                          • Opcode ID: 169adc0e3de13610cd5ca846d9b44a00163b0b216df77fa6cc347fda1da935a8
                                          • Instruction ID: 905f6e3065d1a81dde1a904e86eb5d324e90e4a14d2afb0a073f2e22013c58ae
                                          • Opcode Fuzzy Hash: 169adc0e3de13610cd5ca846d9b44a00163b0b216df77fa6cc347fda1da935a8
                                          • Instruction Fuzzy Hash: 26D0C930E1EA4AE2E608FF29D88A224B274AB54B15FD44435C20D406649E2C64DBCB20
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: freemalloc
                                          • String ID:
                                          • API String ID: 3061335427-0
                                          • Opcode ID: edd4d7e3b75e09861694e90607a4603040769e8647cb26362e852af793d4e9e2
                                          • Instruction ID: ee569de2bd3986f3b1473127ce15dd3c14f41b1d7318186e6e3107d337bd6e35
                                          • Opcode Fuzzy Hash: edd4d7e3b75e09861694e90607a4603040769e8647cb26362e852af793d4e9e2
                                          • Instruction Fuzzy Hash: 7FA1D822E18E89C5E761EF35944467EF7B4FF59788F448332EE8952A54DB38E482C710
                                          APIs
                                          • memmove.VCRUNTIME140(00000000,00000000,00000000,00000000,00007FF749AE5558), ref: 00007FF749AF7EAA
                                          • memchr.VCRUNTIME140(00000000,00000000,00000000,00000000,00007FF749AE5558), ref: 00007FF749AF7F79
                                          • memchr.VCRUNTIME140(00000000,00000000,00000000,00000000,00007FF749AE5558), ref: 00007FF749AF7F95
                                          • memmove.VCRUNTIME140 ref: 00007FF749AF801C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memchrmemmove
                                          • String ID:
                                          • API String ID: 1132781299-0
                                          • Opcode ID: d3753ad99b9200b29fb4508eb50ecd162747e337a2313351e2632f57a286e9bb
                                          • Instruction ID: 2739ccaf989bf404db653adbf2b8a4d8837687a4b79624a4d5fae1040c0b17cc
                                          • Opcode Fuzzy Hash: d3753ad99b9200b29fb4508eb50ecd162747e337a2313351e2632f57a286e9bb
                                          • Instruction Fuzzy Hash: 2161C312B0DA86C5EA15FE259844ABAB6A1BB85BC4FC44137DE5D47389EF3CE442C331
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memset
                                          • String ID:
                                          • API String ID: 2221118986-0
                                          • Opcode ID: a576f89e6d8b2a5be89842fa561e0871bfa1ac0ce8401a22f2c37af45f85e054
                                          • Instruction ID: a49709606aca87a535410f31e035dbf7c0e7368e0cbc28ca8f4aaf20b2d6e86b
                                          • Opcode Fuzzy Hash: a576f89e6d8b2a5be89842fa561e0871bfa1ac0ce8401a22f2c37af45f85e054
                                          • Instruction Fuzzy Hash: 04510632A18BD886DA94DF2A90416BEB365FF49F80F59832AEE5823B55DF34E054C340
                                          APIs
                                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,00007FF749AE8F4F,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AF9B6F
                                          • memmove.VCRUNTIME140(?,00000000,?,00007FF749AE8F4F,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AF9B8B
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,00007FF749AE8F4F,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AF9BAB
                                          • memmove.VCRUNTIME140(?,00000000,?,00007FF749AE8F4F,?,?,00000000,00000000,?,00007FF749AEB2FD), ref: 00007FF749AF9BD9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: memmove$freemalloc
                                          • String ID:
                                          • API String ID: 1763039611-0
                                          • Opcode ID: 91c0450a41a75ca4ac15953552837f8b7f1ed7c208ceccb945d04025e8bde06b
                                          • Instruction ID: 27a2c9e063092ea58479283f8df5e817b0c02e7dfeb386d50311e161351f9751
                                          • Opcode Fuzzy Hash: 91c0450a41a75ca4ac15953552837f8b7f1ed7c208ceccb945d04025e8bde06b
                                          • Instruction Fuzzy Hash: F4317072B09A82C6EE14EF19D5441A8B370FB88B84B888436DF5D47B59EF3CE491C360
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE38F2), ref: 00007FF749AF925A
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE38F2), ref: 00007FF749AF927C
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE38F2), ref: 00007FF749AF92BC
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF749AE38F2), ref: 00007FF749AF92E6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 04837effac51bfa224af48e3b16ec6590a9726606423d3909839f9984ec78e46
                                          • Instruction ID: b23b646e7665d58830aa850a7a6a533a61cca95d6032655d226bf6f4557470df
                                          • Opcode Fuzzy Hash: 04837effac51bfa224af48e3b16ec6590a9726606423d3909839f9984ec78e46
                                          • Instruction Fuzzy Hash: 48313922A09642C2EE58EF15D550639B7B0FB84F94F884436CE4D03B59EF38E951D360
                                          APIs
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00004B58,00007FF749AF93C1,?,?,?,00007FF749AE39E6), ref: 00007FF749AF9DD4
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00004B58,00007FF749AF93C1,?,?,?,00007FF749AE39E6), ref: 00007FF749AF9DF9
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00004B58,00007FF749AF93C1,?,?,?,00007FF749AE39E6), ref: 00007FF749AF9E1E
                                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00004B58,00007FF749AF93C1,?,?,?,00007FF749AE39E6), ref: 00007FF749AF9E43
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1703798771.00007FF749AC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF749AC0000, based on PE: true
                                          • Associated: 00000000.00000002.1703782887.00007FF749AC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703896635.00007FF749BF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703935322.00007FF749C3F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703951826.00007FF749C40000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1703988847.00007FF749C94000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.1704005003.00007FF749C96000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ff749ac0000_SecuriteInfo.jbxd
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 8f99f53d87bff53837bfb06f9b48e60c416c81466948d74a5607a031f5541ee4
                                          • Instruction ID: 4c83bfa577c7c50d83f1d49fb86335276107baaaf6b2c5cf8d0191ff9a7e7bcf
                                          • Opcode Fuzzy Hash: 8f99f53d87bff53837bfb06f9b48e60c416c81466948d74a5607a031f5541ee4
                                          • Instruction Fuzzy Hash: 6F11D620B0E646C5EE59BF15D590B75B770EF85B49F980436CD0D46A64EF2CA880D230