Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gEP8SOoakR.exe

Overview

General Information

Sample name:gEP8SOoakR.exe
renamed because original name is a hash value
Original sample name:1af918875c67d204941ec2c8a780e312.exe
Analysis ID:1542677
MD5:1af918875c67d204941ec2c8a780e312
SHA1:ce9e2ce0460d9536f863c4fc4042958207f0802a
SHA256:3621c6a555e79fd6640b3073b245d4e3b225d7a73403e2529d13a82a2b228c7f
Tags:64exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
.NET source code contains potential unpacker
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Hijacks the control flow in another process
Machine Learning detection for sample
Sets debug register (to hijack the execution of another thread)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • gEP8SOoakR.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\gEP8SOoakR.exe" MD5: 1AF918875C67D204941EC2C8A780E312)
    • conhost.exe (PID: 6528 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • gEP8SOoakR.exe (PID: 6192 cmdline: C:\Users\user\Desktop\gep8sooakr.exe 1028 MD5: 1AF918875C67D204941EC2C8A780E312)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: gEP8SOoakR.exeAvira: detected
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: gEP8SOoakR.exeJoe Sandbox ML: detected
Source: gEP8SOoakR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\dev\nett\Source\Nett\obj\Release\net40\Nett.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591B3AC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591BBAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136559465.0000025908B70000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: /obj/Release/net45/CommandLineArgumentsParser.pdb source: gEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591ABAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136473689.0000025908AC0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\dev\nett\Source\Nett\obj\Release\net40\Nett.pdbSHA256 source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591B3AC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591BBAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136559465.0000025908B70000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntdll.pdb source: gEP8SOoakR.exe, 00000000.00000002.2148281849.0000023B7B8C0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148438414.0000023B7BACC000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148595797.0000023B7BCC3000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148126231.0000023B7B6CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147812964.0000023B7B2CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147967283.0000023B7B4CE000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136609033.0000025908BBF000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136763598.0000025908DB1000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137405137.00000259095B2000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137074507.00000259091B0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136922310.0000025908FB9000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137249390.00000259093B9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\projects\snaffler\SnaffCore\obj\Release\SnaffCore.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136232211.0000025908870000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.0000025919941000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: gEP8SOoakR.exe, 00000000.00000002.2148281849.0000023B7B8C0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148438414.0000023B7BACC000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148595797.0000023B7BCC3000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148126231.0000023B7B6CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147812964.0000023B7B2CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147967283.0000023B7B4CE000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136609033.0000025908BBF000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136763598.0000025908DB1000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137405137.00000259095B2000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137074507.00000259091B0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136922310.0000025908FB9000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137249390.00000259093B9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\projects\nlog\src\NLog\obj\Release\net45\NLog.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\projects\nlog\src\NLog\obj\Release\net45\NLog.pdbSHA256ySI source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmp
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/dummynamespace/
Source: gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/3
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/5
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/ILogReceiverOneWayServer/ProcessLogMessages
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesResponsep
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesT
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://nlog-project.org/ws/T
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: gEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: gEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591ABAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136473689.0000025908AC0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/j-maly/CommandLineParser
Source: gEP8SOoakR.exe, 00000003.00000003.2121654717.0000025909829000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://hooks.slack.com/services/T
Source: gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://nlog-project.org/
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/NLog.Web.AspNetCore
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush,0_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,Thread32Next,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,NtTraceEvent,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,3_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864BEE0 NtTraceEvent,3_2_00007FF61864BEE0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864BF80 GetThreadContext,NtTraceEvent,SetThreadContext,BaseThreadInitThunk,BaseThreadInitThunk,3_2_00007FF61864BF80
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186FCED8 OpenThread,Thread32Next,RtlAddVectoredExceptionHandler,BaseThreadInitThunk,SetThreadContext,NtTraceEvent,3_2_00007FF6186FCED8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB1B10 NtProtectVirtualMemory,NtCreateSection,3_2_0000025906CB1B10
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB1BA8 NtCreateSection,3_2_0000025906CB1BA8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C2400_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864F6D00_2_00007FF61864F6D0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61865A58A0_2_00007FF61865A58A
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF6186469700_2_00007FF618646970
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF618644A800_2_00007FF618644A80
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF6186467600_2_00007FF618646760
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864B4200_2_00007FF61864B420
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864E7F00_2_00007FF61864E7F0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF618652CA00_2_00007FF618652CA0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF6186504600_2_00007FF618650460
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864C2403_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864F6D03_2_00007FF61864F6D0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF618652CA03_2_00007FF618652CA0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186504603_2_00007FF618650460
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61865A58A3_2_00007FF61865A58A
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186469703_2_00007FF618646970
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF618644A803_2_00007FF618644A80
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186467603_2_00007FF618646760
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864B4203_2_00007FF61864B420
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864E7F03_2_00007FF61864E7F0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB09993_2_0000025906CB0999
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB0B363_2_0000025906CB0B36
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB07303_2_0000025906CB0730
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB0AB33_2_0000025906CB0AB3
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_0000025906CB0BAD3_2_0000025906CB0BAD
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E619303_2_00007FF848E61930
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E6C6DE3_2_00007FF848E6C6DE
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E690F23_2_00007FF848E690F2
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E619E03_2_00007FF848E619E0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E696BC3_2_00007FF848E696BC
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E606803_2_00007FF848E60680
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E618D33_2_00007FF848E618D3
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E618B03_2_00007FF848E618B0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: String function: 00007FF6186420F0 appears 78 times
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: String function: 00007FF61864E170 appears 48 times
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: String function: 00007FF6186461C0 appears 86 times
Source: gEP8SOoakR.exeStatic PE information: Number of sections : 12 > 10
Source: gEP8SOoakR.exe, 00000000.00000002.2147967283.0000023B7B646000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2136922310.0000025909131000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591B3AC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNett.dll* vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: _originalFileName vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNLog.dll: vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnaffCore.dll4 vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCommandLineArgumentsParser.dllV vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591BBAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNett.dll* vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000003.2121654717.0000025909829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnaffler.exe2 vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591ABAC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCommandLineArgumentsParser.dllV vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2136232211.0000025908870000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSnaffCore.dll4 vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2136559465.0000025908B70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNett.dll* vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNett.dll* vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnaffler.exe2 vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: _originalFileName vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNLog.dll: vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2138843871.0000025919941000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSnaffCore.dll4 vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: _originalFileName vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNLog.dll: vs gEP8SOoakR.exe
Source: gEP8SOoakR.exe, 00000003.00000002.2136473689.0000025908AC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCommandLineArgumentsParser.dllV vs gEP8SOoakR.exe
Source: classification engineClassification label: mal72.evad.winEXE@4/3@0/0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,0_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\gep8sooakr.exe.logJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6528:120:WilError_03
Source: gEP8SOoakR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\gEP8SOoakR.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\gEP8SOoakR.exe "C:\Users\user\Desktop\gEP8SOoakR.exe"
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess created: C:\Users\user\Desktop\gEP8SOoakR.exe C:\Users\user\Desktop\gep8sooakr.exe 1028
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess created: C:\Users\user\Desktop\gEP8SOoakR.exe C:\Users\user\Desktop\gep8sooakr.exe 1028Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: gEP8SOoakR.exeStatic PE information: More than 235 > 100 exports found
Source: gEP8SOoakR.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: gEP8SOoakR.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: C:\dev\nett\Source\Nett\obj\Release\net40\Nett.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591B3AC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591BBAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136559465.0000025908B70000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: /obj/Release/net45/CommandLineArgumentsParser.pdb source: gEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591ABAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136473689.0000025908AC0000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\dev\nett\Source\Nett\obj\Release\net40\Nett.pdbSHA256 source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591B3AC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591BBAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136559465.0000025908B70000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntdll.pdb source: gEP8SOoakR.exe, 00000000.00000002.2148281849.0000023B7B8C0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148438414.0000023B7BACC000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148595797.0000023B7BCC3000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148126231.0000023B7B6CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147812964.0000023B7B2CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147967283.0000023B7B4CE000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136609033.0000025908BBF000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136763598.0000025908DB1000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137405137.00000259095B2000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137074507.00000259091B0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136922310.0000025908FB9000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137249390.00000259093B9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\projects\snaffler\SnaffCore\obj\Release\SnaffCore.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136232211.0000025908870000.00000004.08000000.00040000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.0000025919941000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: gEP8SOoakR.exe, 00000000.00000002.2148281849.0000023B7B8C0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148438414.0000023B7BACC000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148595797.0000023B7BCC3000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2148126231.0000023B7B6CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147812964.0000023B7B2CD000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000000.00000002.2147967283.0000023B7B4CE000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136609033.0000025908BBF000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136763598.0000025908DB1000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137405137.00000259095B2000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137074507.00000259091B0000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136922310.0000025908FB9000.00000004.00000020.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2137249390.00000259093B9000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\projects\nlog\src\NLog\obj\Release\net45\NLog.pdb source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmp
Source: Binary string: C:\projects\nlog\src\NLog\obj\Release\net45\NLog.pdbSHA256ySI source: gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmp

Data Obfuscation

barindex
Source: 3.2.gEP8SOoakR.exe.25908af0000.2.raw.unpack, ModuleLoader.cs.Net Code: ReadAssemblyFromResource System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush,0_2_00007FF61864C240
Source: gEP8SOoakR.exeStatic PE information: section name: .eh_fram
Source: gEP8SOoakR.exeStatic PE information: section name: .xdata
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E68167 push ebx; ret 3_2_00007FF848E6816A
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF848E600BD pushad ; iretd 3_2_00007FF848E600C1
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeMemory allocated: 25907000000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeMemory allocated: 25921940000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,0_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exe TID: 1120Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: gEP8SOoakR.exe, 00000003.00000002.2137602174.00000259097B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXP0
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,0_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,0_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush,0_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush,0_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF618641154 GetStartupInfoA,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,exit,_cexit,0_2_00007FF618641154
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,0_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF6186FCEE8 CloseHandle,Thread32Next,RtlAddVectoredExceptionHandler,0_2_00007FF6186FCEE8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF6186FCED8 OpenThread,Thread32Next,RtlAddVectoredExceptionHandler,0_2_00007FF6186FCED8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF61864D570 RtlAddVectoredExceptionHandler,memset,CreateToolhelp32Snapshot,Thread32First,Thread32Next,GetCurrentProcessId,CloseHandle,OpenThread,GetThreadContext,NtTraceEvent,SetThreadContext,CloseHandle,GetModuleHandleA,BaseThreadInitThunk,GetModuleHandleA,GetProcAddress,RtlInitUnicodeString,LdrLoadDll,BaseThreadInitThunk,3_2_00007FF61864D570
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF618641154 GetStartupInfoA,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,exit,_cexit,3_2_00007FF618641154
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186FCEE8 CloseHandle,Thread32Next,RtlAddVectoredExceptionHandler,BaseThreadInitThunk,3_2_00007FF6186FCEE8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 3_2_00007FF6186FCED8 OpenThread,Thread32Next,RtlAddVectoredExceptionHandler,BaseThreadInitThunk,SetThreadContext,NtTraceEvent,3_2_00007FF6186FCED8
Source: C:\Users\user\Desktop\gEP8SOoakR.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtProtectVirtualMemory: Indirect: 0x7FF618654F98Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtWriteVirtualMemory: Indirect: 0x7FF618654CABJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtProtectVirtualMemory: Indirect: 0x7FF618654D00Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtAllocateVirtualMemory: Indirect: 0x7FF618654B51Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtProtectVirtualMemory: Indirect: 0x7FF618654C80Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeNtWriteVirtualMemory: Indirect: 0x7FF618654F5FJump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeMemory written: PID: 6192 base: 25906CB0000 value: E9Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeThread register set: 6192 4Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeProcess created: C:\Users\user\Desktop\gEP8SOoakR.exe C:\Users\user\Desktop\gep8sooakr.exe 1028Jump to behavior
Source: C:\Users\user\Desktop\gEP8SOoakR.exeCode function: 0_2_00007FF61864C240 RtlGetVersion,memcpy,GetProcessHeap,GetProcessHeap,exit,exit,memcpy,GetTickCount,Sleep,SleepEx,exit,memcpy,memcpy,GetFileAttributesW,GetFileAttributesW,OpenProcess,GetModuleHandleA,GetProcAddress,memcpy,memcpy,GetFileAttributesW,memcpy,memcpy,HeapCreate,VirtualProtect,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,CreateProcessW,LoadLibraryA,GetProcAddress,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,fwrite,fflush,NtWriteVirtualMemory,NtProtectVirtualMemory,ResumeThread,exit,memcpy,memcpy,fwrite,fflush,fwrite,fflush,0_2_00007FF61864C240
Source: C:\Users\user\Desktop\gEP8SOoakR.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
211
Process Injection
1
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
31
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
Process Injection
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Abuse Elevation Control Mechanism
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
gEP8SOoakR.exe100%AviraHEUR/AGEN.1329661
gEP8SOoakR.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesResponsepgEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
      unknown
      https://hooks.slack.com/services/TgEP8SOoakR.exe, 00000003.00000003.2121654717.0000025909829000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://nlog-project.org/dummynamespace/gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
          unknown
          http://nlog-project.org/ws/ILogReceiverOneWayServer/ProcessLogMessagesgEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
            unknown
            http://schemas.xmlsoap.org/soap/envelope/gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://nlog-project.org/gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
              unknown
              http://nlog-project.org/ws/gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                unknown
                http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesTgEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namegEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.nuget.org/packages/NLog.Web.AspNetCoregEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                    unknown
                    http://nlog-project.org/ws/3gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                      unknown
                      https://github.com/j-maly/CommandLineParsergEP8SOoakR.exe, 00000003.00000002.2137807466.0000025909941000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591ABAC000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2136473689.0000025908AC0000.00000004.08000000.00040000.00000000.sdmpfalse
                        unknown
                        http://nlog-project.org/ws/5gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                          unknown
                          http://nlog-project.org/ws/TgEP8SOoakR.exe, 00000003.00000002.2138843871.000002591A1FE000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2138843871.000002591997C000.00000004.00000800.00020000.00000000.sdmp, gEP8SOoakR.exe, 00000003.00000002.2143826152.0000025922000000.00000004.08000000.00040000.00000000.sdmpfalse
                            unknown
                            No contacted IP infos
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1542677
                            Start date and time:2024-10-26 06:25:11 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 3s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:gEP8SOoakR.exe
                            renamed because original name is a hash value
                            Original Sample Name:1af918875c67d204941ec2c8a780e312.exe
                            Detection:MAL
                            Classification:mal72.evad.winEXE@4/3@0/0
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 93
                            • Number of non-executed functions: 70
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): dllhost.exe
                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
                            • Not all processes where analyzed, report is missing behavior information
                            • VT rate limit hit for: gEP8SOoakR.exe
                            No simulations
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            s-part-0017.t-0009.t-msedge.netfile.exeGet hashmaliciousStealcBrowse
                            • 13.107.246.45
                            https://load.aberegg-immobilien.ch/Get hashmaliciousHTMLPhisherBrowse
                            • 13.107.246.45
                            file.exeGet hashmaliciousStealcBrowse
                            • 13.107.246.45
                            http://mychronictravel.eu.org/Get hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            https://docs.google.com/drawings/d/1igp9x84Q_2r8qSa1YDSk9dpVvjHGWjRjQMSbSGGfj2M/preview?pli=1VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1Bv689W8l3mkPZmP2UR2g0HlFBjRUIoZvJzUgEXisf43J0VKXX1BvGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            https://certify.us.com/D5QkoQ3Eniw4G2APQ3ED5QpQ3E4RAionz01coq01Get hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            Rob.Kuster@stonhard.com.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                            • 13.107.246.45
                            zip file.zipGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                            • 13.107.246.45
                            ACTION required to activate your account - bp Supplier Portal.emlGet hashmaliciousUnknownBrowse
                            • 13.107.246.45
                            https://docs.google.com/drawings/d/1gvM7ysnJ7zDcSUShXnPoiA6pG4cjDDn9uHRbivsGidA/preview?pli=1jjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZseeIf3YM4Csy3PIV85PbXFYIuATiQmdLLycE9d8EeWpqjjQQnZsGet hashmaliciousMamba2FABrowse
                            • 13.107.246.45
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\gEP8SOoakR.exe
                            File Type:CSV text
                            Category:modified
                            Size (bytes):847
                            Entropy (8bit):5.354334472896228
                            Encrypted:false
                            SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQwYHKGSI6oPtHTHhAHKKkb
                            MD5:9F9FA9EFE67E9BBD165432FA39813EEA
                            SHA1:6FE9587FB8B6D9FE9FA9ADE987CB8112C294247A
                            SHA-256:4488EA75E0AC1E2DEB4B7FC35D304CAED2F877A7FB4CC6B8755AE13D709CF37B
                            SHA-512:F4666179D760D32871DDF54700D6B283AD8DA82FA6B867A214557CBAB757F74ACDFCAD824FB188005C0CEF3B05BF2352B9CA51B2C55AECF762468BB8F5560DB3
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..
                            Process:C:\Users\user\Desktop\gEP8SOoakR.exe
                            File Type:ASCII text, with CRLF, LF line terminators
                            Category:dropped
                            Size (bytes):3423
                            Entropy (8bit):4.925282229780145
                            Encrypted:false
                            SSDEEP:96:XWiA24IKTTXFZwvulZwcLCwjRSYHj8IWn:mi9iXPX99H8n
                            MD5:134241D99B17EB93716F6E2AB3F3EBC1
                            SHA1:59CFD80CFB28BE549409CCFFBEA34E2B625C7BE5
                            SHA-256:766065F9921FE8E1D374AD628CB05A0A28A744358A5B38D6C3F924914AF0FF22
                            SHA-512:400ED3FEE282432FE5E28664B16E79353747D2DEAB3032E6CAFBA5E9FD8A1DD04F3BBF0826DCBC510C04F9AECBB0DFA7EB2037F194CE62158FDC7A952F8A002F
                            Malicious:false
                            Reputation:low
                            Preview: .::::::.:::. :::. :::. .-:::::'.-:::::'::: .,:::::: :::::::.. ..;;;` ``;;;;, `;;; ;;`;; ;;;'''' ;;;'''' ;;; ;;;;'''' ;;;;``;;;; ..'[==/[[[[, [[[[[. '[[ ,[[ '[[, [[[,,== [[[,,== [[[ [[cccc [[[,/[[[' .. ''' $ $$$ 'Y$c$$c$$$cc$$$c`$$$'`` `$$$'`` $$' $$"" $$$$$$c .. 88b dP 888 Y88 888 888,888 888 o88oo,.__888oo,__ 888b '88bo,.. 'YMmMY' MMM YM YMM ''` 'MM, 'MM, ''''YUMMM''''YUMMMMMMM 'W' .. by l0ss and Sh3r4 - github.com/SnaffCon/Snaffler .......Usage:...-e, --timeout[optional]... Interval between status updates (in minutes) also acts as a timeout for AD data to be gathered via LDAP. Turn this knob up if you aren't getting any computers from AD when you run Snaffler through a proxy or other slow link. Default = 5 .....-z, --config[optional]... Path to a .toml config file. Run with 'generate' to puke a sample config file into the working directory. .....-o, --outfile[optional]... Path for output
                            File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                            Entropy (8bit):7.768576563287834
                            TrID:
                            • Win64 Executable (generic) (12005/4) 74.95%
                            • Generic Win/DOS Executable (2004/3) 12.51%
                            • DOS Executable Generic (2002/1) 12.50%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                            File name:gEP8SOoakR.exe
                            File size:710'656 bytes
                            MD5:1af918875c67d204941ec2c8a780e312
                            SHA1:ce9e2ce0460d9536f863c4fc4042958207f0802a
                            SHA256:3621c6a555e79fd6640b3073b245d4e3b225d7a73403e2529d13a82a2b228c7f
                            SHA512:498420dc4c3e44496159c9491580924c6c3ecf0a71d360c03c747dd4852980aeeda2b55d13059c198877aecf2653e182af1453d81842c7c61e9c28e0a40fbf7a
                            SSDEEP:12288:x/uVxEZsd6Rq8sQ1M7dKHB8u4EqcJDhJzuT6p4qd7DmHrE0S48v7:x/axEadkqbEzTxnp4qdfoE0a
                            TLSH:C4E40132E36358F9C29AD23987C369A2E771FC290530387D56815A35BF7B960479EF02
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...X..g...............$.........`..%..........@..........................................`... ............................
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x140001125
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x670F8558 [Wed Oct 16 09:20:24 2024 UTC]
                            TLS Callbacks:0x400163a0, 0x1, 0x4001645f, 0x1
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:e16254f44ddd98c690f5ad4d0a981e4a
                            Instruction
                            push ebp
                            dec eax
                            mov ebp, esp
                            dec eax
                            sub esp, 30h
                            mov dword ptr [ebp-04h], 000000FFh
                            dec eax
                            mov eax, dword ptr [000A2A25h]
                            mov dword ptr [eax], 00000000h
                            call 00007FE4FC6C4F73h
                            mov dword ptr [ebp-04h], eax
                            nop
                            nop
                            mov eax, dword ptr [ebp-04h]
                            dec eax
                            add esp, 30h
                            pop ebp
                            ret
                            push ebp
                            dec eax
                            mov ebp, esp
                            dec eax
                            sub esp, 000000E0h
                            dec eax
                            mov dword ptr [ebp-08h], 00000000h
                            mov dword ptr [ebp-0Ch], 00000000h
                            dec eax
                            lea eax, dword ptr [ebp-000000C0h]
                            inc ecx
                            mov eax, 00000068h
                            mov edx, 00000000h
                            dec eax
                            mov ecx, eax
                            call 00007FE4FC6E0DADh
                            dec eax
                            mov eax, dword ptr [000A29D1h]
                            mov eax, dword ptr [eax]
                            test eax, eax
                            je 00007FE4FC6C4F75h
                            dec eax
                            lea eax, dword ptr [ebp-000000C0h]
                            dec eax
                            mov ecx, eax
                            dec eax
                            mov eax, dword ptr [000C60D6h]
                            call eax
                            dec eax
                            mov dword ptr [ebp-18h], 00000000h
                            mov dword ptr [ebp-24h], 00000030h
                            mov eax, dword ptr [ebp-24h]
                            dec eax
                            mov eax, dword ptr [eax]
                            dec eax
                            mov dword ptr [ebp-30h], eax
                            dec eax
                            mov eax, dword ptr [ebp-30h]
                            dec eax
                            mov eax, dword ptr [eax+08h]
                            dec eax
                            mov dword ptr [ebp-20h], eax
                            mov dword ptr [ebp-10h], 00000000h
                            jmp 00007FE4FC6C4F83h
                            dec eax
                            mov eax, dword ptr [ebp-18h]
                            dec eax
                            cmp eax, dword ptr [ebp-20h]
                            jne 00007FE4FC6C4F6Bh
                            mov dword ptr [ebp-10h], 00000001h
                            jmp 00007FE4FC6C4FA7h
                            mov ecx, 000003E8h
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0xbe0000x8226.edata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc70000x900.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa60000xcd8.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000x158.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xa2f200x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xc724c0x210.idata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x213080x21400697461e01ea78406b90f0c3f56dc54b5False0.4983626057330827data6.317912809044539IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0x230000x1700x200499ad6b262ca2e8683e48cb01f36411fFalse0.203125data1.2750151770303946IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rdata0x240000x80a800x80c0019af8bda14eca7045e096ea8167cc840False0.9353837985436894data7.965105880061288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .eh_fram0xa50000x40x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0xa60000xcd80xe00e9fd6227820d1caa8f630a9567078d3fFalse0.45926339285714285data4.8752339858897455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .xdata0xa70000xdbc0xe000d71a3ce1111cb21376017b8bcb0cd4fFalse0.2826450892857143shared library4.535733918192951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .bss0xa80000x15e200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .edata0xbe0000x82260x84008fa0892c1b7fd738d7fc722b628796daFalse0.3539003314393939data5.748512008657241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                            .idata0xc70000x9000xa00f9096555bfa86aebf2337962d6c0ed43False0.325390625data3.944209218952523IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .CRT0xc80000x680x200d8260c5c2386e113692c96907f8e5744False0.07421875data0.39026490088656424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0xc90000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .reloc0xca0000x1580x200525a090b94176a23533a576afca74d54False0.53125data3.7955317654975613IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            DLLImport
                            KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, FreeLibrary, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, MultiByteToWideChar, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WideCharToMultiByte
                            msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fileno, _fmode, _initterm, _lock, _onexit, _setjmp, _setmode, _unlock, abort, calloc, exit, fflush, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memchr, memcpy, memset, signal, strcmp, strerror, strlen, strncmp, strstr, vfprintf, wcslen
                            NameOrdinalAddress
                            AmIDebugged__76oader_137210x200000000
                            BaseThreadInitThunk__76oader_159220x200000000
                            CheckHardwareBreakPoints__76oader_138830x200000000
                            CreatedInterrupt__76oader_141640x200000000
                            CurrentAssembly__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_2050x1400b5e88
                            Dl_1023410185_60x1400a8120
                            Dl_1023410187_70x1400b6000
                            Dl_1023410194_80x200000000
                            Dl_1023410203_90x200000000
                            Dl_1056973869_100x200000000
                            Dl_1342179610_110x1400a8178
                            Dl_1342179648_120x1400a8170
                            Dl_1342179665_130x1400a8168
                            Dl_1342179856_140x1400a8158
                            Dl_1342180241_150x200000000
                            Dl_1342180301_160x1400a8150
                            Dl_1342180314_170x1400a8148
                            Dl_1342180339_180x1400a8138
                            Dl_1342180341_190x200000000
                            Dl_1342180365_200x1400a8130
                            Dl_1342181099_210x1400a8128
                            Dl_1342181994_220x1400a8160
                            Dl_1342184270_230x1400a8140
                            Dl_1375737445_240x1400a8188
                            Dl_1375737893_250x1400a8180
                            Dl_1862271172_260x1400a8190
                            Dl_1862271258_270x200000000
                            Dl_2113941776_280x200000000
                            Dl_2113941788_290x200000000
                            Dl_2113941820_300x1400b5e28
                            Dl_2113941866_310x1400b5e20
                            Dl_2113941903_320x200000000
                            Dl_2113941905_330x200000000
                            Dl_2113943166_340x200000000
                            Dl_2113943836_350x1400b5f60
                            Dl_2516586222_360x1400a8198
                            Dl_2566914147_370x200000000
                            Dl_2566914180_380x200000000
                            Dl_2566914183_390x200000000
                            Dl_436208173_400x200000000
                            Dl_436208175_410x200000000
                            Dl_452985033_420x200000000
                            Dl_452986305_430x200000000
                            Dl_452986337_440x200000000
                            ETWExceptionHandler__76oader_1578450x200000000
                            GetPPEB__76oader_359460x200000000
                            GetSyscallStub__76oader_1023470x200000000
                            Kernel32ThreadInitThunkFunction__76oader_1590480x200000000
                            LPWSTRtoLowercase__76oader_294490x200000000
                            MultiByteToWideChar__76oader_777500x200000000
                            MyCloseHandle__76oader_773510x200000000
                            MyCreateFileA__76oader_985520x1400a8278
                            MyGetComputerNameExA__76oader_1439530x200000000
                            MyGetCurrentProcessId__76oader_764540x200000000
                            MyGetCurrentThreadId__76oader_775550x200000000
                            MyGetDiskFreeSpaceExA__76oader_1441560x200000000
                            MyGetFileSize__76oader_986570x1400a8270
                            MyGetModuleHandleA__76oader_770580x1400b5e08
                            MyGetProcAddress__76oader_768590x1400b5df0
                            MyGetProcessHeap__76oader_767600x1400a8288
                            MyGetThreadContext__76oader_771610x200000000
                            MyGetTickCount__76oader_779620x200000000
                            MyGlobalMemoryStatusEx__76oader_1440630x200000000
                            MyLdrLoadDll__76oader_429640x1400b5df8
                            MyOpenProcess__76oader_765650x200000000
                            MyOpenThread__76oader_774660x200000000
                            MyReadFile__76oader_988670x1400a8260
                            MyRtlAddVectoredExceptionHandler__76oader_769680x200000000
                            MyRtlAllocateHeap__76oader_987690x1400a8268
                            MyRtlInitUnicodeString__76oader_284700x1400b5e00
                            MySetThreadContext__76oader_772710x200000000
                            MySleep__76oader_778720x1400a8280
                            MyVirtualAllocEx__76oader_763730x200000000
                            MyVirtualProtect__76oader_766740x1400a8290
                            MyWaitForSingleObject__76oader_776750x200000000
                            NTIarithmeticdefect__cT9c9bHlHSpA1QTnKbHjnIkA_760x200000000
                            NTIarrayL48OO48_safearrayboundT__nKvO7wXZAsroXb0Wz9b7Rmw_770x200000000
                            NTIarrayL48OO494957_uint5452T__wa4ExhM0I5D0wQQmyrXAHA_780x200000000
                            NTIarrayL48OO5149_byteT__vEOa9c5qaE9ajWxR5R4zwfQg_790x200000000
                            NTIbcgrmproc__7kPg4iIrFVxPW1SngAif2w_800x200000000
                            NTIbool__VaVACK0bpYmqIQ0mKcHfQQ_810x200000000
                            NTIbyte__k3HXouOuhqAKq0dx450lXQ_820x200000000
                            NTIcatchableerror__qrLSDoe2oBoAqNtJ9badtnA_830x200000000
                            NTIchar__nmiMWKVIe46vacnhAFrQvw_840x200000000
                            NTIclrerror__PUxYufCPDbgUFMvFpPtSfQ_850x1400b5e40
                            NTIcstring__S9agCYBinaYZnGWcjTdxclg_860x200000000
                            NTIcy95struct49__ROud78kqeHjXYisn4jhtaw_870x200000000
                            NTIcy__wDff8zKdhpvos9c7lBHUPSQ_880x200000000
                            NTIdecimal95union4995struct49__79a7mES62JQ1oSE6vhkv3Mg_890x200000000
                            NTIdecimal95union49__WGoXHqhEWH1qpRGdTEgBIQ_900x200000000
                            NTIdecimal95union5095struct49__ndD9aJVbTCK7WcNNlcFDdRQ_910x200000000
                            NTIdecimal95union50__AHLY3ntS3ifZxbjvCnrSYw_920x200000000
                            NTIdecimal__7lwbcpbVYQOsyXq5rL9casA_930x200000000
                            NTIdefect__LbeSGvgPzGzXnW9caIkJqMA_940x200000000
                            NTIdouble__w9bl9a1ul9ctRJWiMl9cNnIMvg_950x200000000
                            NTIecb__FqrsHsObEDvZPY9aUEY69aCA_960x200000000
                            NTIexception__XEycrCsme5C8CVWAYEcdBQ_970x200000000
                            NTIfloat__C875xFvYpI7aGybrDGHIaQ_980x200000000
                            NTIhcryptprov__hMQEc0FMry7Up7EoPki79aA_990x200000000
                            NTIidispatch__25afB9aQxduZVFt1Yu6YBbw_1000x200000000
                            NTIidispatchvtbl__m6cgE8u5k2W48yvpP0M9cVg_1010x200000000
                            NTIindexdefect__n6tGEPHKkh7E1AP9bj30WrQ_1020x200000000
                            NTIint__rR5Bzr1D5krxoo1NcNyeMA_1030x200000000
                            NTIint__xHTZrq9aYs6boc9bCba0JbpQ_1040x200000000
                            NTIioerror__iLZrPn9anoh9ad1MmO0RczFw_1050x1400a80e0
                            NTIirecordinfo__o7mu6JCMnDiOC4fiz5Cxtw_1060x200000000
                            NTIirecordinfovtbl__Rtoycx0FzRmTEejgGZss8w_1070x200000000
                            NTIiunknown__GaCOTm3fAeQng3LkqGK9cpw_1080x200000000
                            NTIiunknownvtbl__jF4R4hWZYkQD9a5uVek42vg_1090x200000000
                            NTIkeyvaluepair__2wauyaneUIEXFZnckdv0OQ_1100x200000000
                            NTIkeyvaluepairseq__QyuekR9bgDQj4oxD9cw0z4fw_1110x1400b5f80
                            NTIlong__sVg18TP9cLifHyygRe9cro9aA_1120x200000000
                            NTIlonglong__Aav8dQoMlCFnZRxA0IhTHQ_1130x200000000
                            NTImyntflushinstructioncache__3eV1XklMMklNDUIHDUNWNQ_1140x200000000
                            NTIobject__diB2NTuAIWY0FO9c5IUJRGg_1150x200000000
                            NTIobject__nftp7RTJl9bUkGnValdDrfQ_1160x1400a8220
                            NTIoverflowdefect__9cxMi1BPLc3UKt9br86bGfGQ_1170x200000000
                            NTIpointer__vr5DoT1jILTGdRlYv1OYpw_1180x200000000
                            NTIprocLself58ptridispatch_dispidmember58dispid_riid58refiid_lcid58lcid_wflags58word_pdispparams58ptrdispparams_pvarresult58ptrvariant_pexcepinfo58ptrexcepinfo_puargerr58ptruintT58hresultLOstdcallOT__HMTIlg0ibX9c3DUxZWiFDlg_1190x200000000
                            NTIprocLself58ptridispatch_itinfo58uint_lcid58lcid_pptinfo58ptrptritypeinfoT58hresultLOstdcallOT__PJRj0uRX50rVBId5wxoWWg_1200x200000000
                            NTIprocLself58ptridispatch_pctinfo58ptruintT58hresultLOstdcallOT__zezkKyqfMpGrdLXfsTMoKg_1210x200000000
                            NTIprocLself58ptridispatch_riid58refiid_rgsznames58ptrlpolestr_cnames58uint_lcid58lcid_rgdispid58ptrdispidT58hresultLOstdcallOT__vTmQiiZaMJLP5PVxP1nC6g_1220x200000000
                            NTIprocLself58ptrirecordinfoT58pvoidLOstdcallOT__tl4K6HbRH9akfWlpgfxzhhQ_1230x200000000
                            NTIprocLself58ptrirecordinfo_pbstrname58ptrbstrT58hresultLOstdcallOT__CiNRVOLKE0o4du7TW0veXA_1240x200000000
                            NTIprocLself58ptrirecordinfo_pcbsize58ptrulongT58hresultLOstdcallOT__9bUQLlQzyTYq9cn1PPQoncWg_1250x200000000
                            NTIprocLself58ptrirecordinfo_pcnames58ptrulong_rgbstrnames58ptrbstrT58hresultLOstdcallOT__3flVhatAuo2wDQ3pLqPtWw_1260x200000000
                            NTIprocLself58ptrirecordinfo_pguid58ptrguidT58hresultLOstdcallOT__szvo7XZUqIEvn15njypZnQ_1270x200000000
                            NTIprocLself58ptrirecordinfo_pptypeinfo58ptrptritypeinfoT58hresultLOstdcallOT__lgbxIcoFlqaRoc8l1J5x6A_1280x200000000
                            NTIprocLself58ptrirecordinfo_precordinfo58ptrirecordinfoT58winboolLOstdcallOT__UrLfbkx3jYpl8aTT7EGhew_1290x200000000
                            NTIprocLself58ptrirecordinfo_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariantT58hresultLOstdcallOT__a8wuVcgf8JFBdtyIlUvAGg_1300x200000000
                            NTIprocLself58ptrirecordinfo_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariant_ppvdatacarray58ptrpvoidT58hresultLOstdcallOT__V5FpwH0D4atxA49a8FYaWEg_1310x200000000
                            NTIprocLself58ptrirecordinfo_pvexisting58pvoid_pvnew58pvoidT58hresultLOstdcallOT__ZI1jobj8DmvwFnbiO6qPCg_1320x200000000
                            NTIprocLself58ptrirecordinfo_pvnew58pvoidT58hresultLOstdcallOT__79cx3unW0Z6BgDnOrcHfitQ_1330x200000000
                            NTIprocLself58ptrirecordinfo_pvsource58pvoid_ppvdest58ptrpvoidT58hresultLOstdcallOT__ymDIUs9akB6qYPB24WgIOaQ_1340x200000000
                            NTIprocLself58ptrirecordinfo_wflags58ulong_pvdata58pvoid_szfieldname58lpcolestr_pvarfield58ptrvariantT58hresultLOstdcallOT__LKhTenaIJkf6RxVNrDi3BA_1350x200000000
                            NTIprocLself58ptriunknownT58ulongLOstdcallOT__3MBg39aXrFJCcyBWUf6B79aQ_1360x200000000
                            NTIprocLself58ptriunknown_riid58refiid_ppvobject58ptrpointerT58hresultLOstdcallOT__9bWBI5aELdW2XHTbyYNjFXQ_1370x200000000
                            NTIprocLx58timeT58zonedtimeLOclosure_gcsafe_locks5848OT__7xnKxEC24cr3qZyj3gX32w_1380x200000000
                            NTIptrbstr__Pdw3MEiEie9cIIBXdRF4aZg_1390x200000000
                            NTIptrbyte__cG1a2XAxsP28AUq2q9aXnNg_1400x200000000
                            NTIptrchar__9b60r3P3z08159cCfYvgtoSg_1410x200000000
                            NTIptrcy__jXbtSxLfw0itmjWsMdWfNw_1420x200000000
                            NTIptrdecimal__tOyFM5VpR5CfoueNblK2NQ_1430x200000000
                            NTIptrdouble__dHulNBWhJTS79cd5h9cp4OHg_1440x200000000
                            NTIptrfloat__K9c5mNCKsxyPa9bhQF1Un42w_1450x200000000
                            NTIptridispatch__kYuJ1yXKaTDKM1gBNBYZMA_1460x200000000
                            NTIptridispatchvtbl__D2nH2Oqivmr8QTsU9aLjsOQ_1470x200000000
                            NTIptrirecordinfo__3WT32ZAg6wsc9ay7tyclJnQ_1480x200000000
                            NTIptrirecordinfovtbl__7VzmdWawVAQPByb1qFKRtA_1490x200000000
                            NTIptriunknown__UyU8VSOcMgg7fdJy7SxeGw_1500x200000000
                            NTIptriunknownvtbl__RE27JCE9bOJX1xy12IDcHnA_1510x200000000
                            NTIptrlong__9awHbpuyuG8AxbsaqeBLKDQ_1520x200000000
                            NTIptrlonglong__qTZjETMuYhaATb9arhin3WA_1530x200000000
                            NTIptrolechar__9arplNu1iE9bhlDxcL6A4PMw_1540x200000000
                            NTIptrptridispatch__9cAC89c2ntOozT6m3udvMQRQ_1550x200000000
                            NTIptrptriunknown__8MnBU5BrvTao0wsQ9alw3AQ_1560x200000000
                            NTIptrptrsafearray__SD30oco7TmqisM1c9brwQSg_1570x200000000
                            NTIptrsafearray__DTydpwcrqtIWM70d0MgBsw_1580x200000000
                            NTIptrshort__BjHmAJOH9agj4KRxOkanazQ_1590x200000000
                            NTIptrvariant__k5zDQ9aqJXQRCQNlOgs85Ow_1600x200000000
                            NTIqipcproc__BlBp9c2J7tRXTU9adX1vV5gQ_1610x200000000
                            NTIqpcproc__eV9b9cYSUZoo6tKaCd9b3k9bzA_1620x200000000
                            NTIquitproc__PD9b9cqhDqM6Xy1oSxwODsOQ_1630x200000000
                            NTIrefclrerror__FRS9cQbNhae5zCH8EuU1Jew_1640x200000000
                            NTIrefexception__vU9aO9cTqOMn6CBzhV8rX7Sw_1650x200000000
                            NTIrefindexdefect__RJnHOb9cQV3neNC9cDkRgMyw_1660x200000000
                            NTIrefioerror__HMIVdYjdZYWskTmTQVo5BQ_1670x1400a80a0
                            NTIrefobject__HsJiUUcO9cHBdUCi0HwkSTA_1680x200000000
                            NTIrefobject__PNpya69bg5jOKXuhnlj83NQ_1690x1400a81e0
                            NTIrefoverflowdefect__r8GBEWywN07B3Rat3azS4Q_1700x200000000
                            NTIrefreraisedefect__uG62cfJZ15c2siK3CKLmnQ_1710x200000000
                            NTIrefvalueerror__Ie1m0dv1ZHg72IgPRr1cDw_1720x1400b6060
                            NTIrefvariantconversionerror__sSrF5S0WQBiSGAvsVyZTJQ_1730x1400b5ee0
                            NTIreraisedefect__E0L0wGYS1gPD81VLstNO2g_1740x200000000
                            NTIrijndaelcontext__uzMEyYcUmtQ6HTVQxlfmCQ_1750x200000000
                            NTIrootobj__ytyiCJqK439aF9cIibuRVpAg_1760x200000000
                            NTIsafearray__DKskJgJKqdiGvU7qvx1u8A_1770x200000000
                            NTIsafearraybound__MAW7pPwMg9cUv0ZH0AE2pzQ_1780x200000000
                            NTIseqLbyteT__6H5Oh5UUvVCLiakt9aTwtUQ_1790x1400b5da0
                            NTIseqLstacktraceentryT__uB9b75OUPRENsBAu4AnoePA_1800x200000000
                            NTIseqLstringT__sM4lkSb7zS6F7OVMvW9cffQ_1810x1400b5fc0
                            NTIseqLvariantT__3a0Lf6u9aPn9bq0V0eQ07mtw_1820x200000000
                            NTIshort__kDPg4wXyR8DDyA0MeEjIsw_1830x200000000
                            NTIstacktraceentry__oLyohQ7O2XOvGnflOss8EA_1840x200000000
                            NTIstring__77mFvmsOLKik79ci2hXkHEg_1850x200000000
                            NTIsystemrng58objecttype__X9aKjcE9bDr41cpowCIZoGpQ_1860x200000000
                            NTIsystemrng__9aWCZSregXolmau8IgbwrpA_1870x200000000
                            NTItable__MyiXBZqHlwtVNEEvYnEmjg_1880x200000000
                            NTItableref__mmbDGmie1Vw3nGJ9cRqQG7w_1890x1400a81a0
                            NTItimezone58objecttype__F8OvqlxXyGXRSiK9c1fCDVw_1900x200000000
                            NTItimezone__9a5v4OQPlGqsA25ioN8hFYA_1910x200000000
                            NTIuint5150__JrFyJbYm9b5I4hJ9cWDqvfYA_1920x200000000
                            NTIuint5452__wMtfD88jmrPZwfzTH9c8e9cA_1930x200000000
                            NTIuncheckedarrayLutf4954charT__Tyd4y3haUOOHTj71TPIRag_1940x200000000
                            NTIvalueerror__yoNlBGx0D2tRizIdhQuENw_1950x1400b6020
                            NTIvariant58objecttype__FBSF3pWyJz9clqwLRXzZTsA_1960x200000000
                            NTIvariant95union4995struct4995union4995struct49__DtI9bsEAgJB3Tyh5MHrgkrw_1970x200000000
                            NTIvariant95union4995struct4995union49__DjJ9a9aNjdVJoA2NlSK7Lz7Q_1980x200000000
                            NTIvariant95union4995struct49__c8Wtv5nqLcM2jwvHc9cTY9bg_1990x200000000
                            NTIvariant95union49__Sr5LLwiwjGCKhbDlb25pAQ_2000x200000000
                            NTIvariant__UPxdF8T9b3GRPNZqBCwEDkw_2010x200000000
                            NTIvariant__VYnrN9cMJav8fTNB7Pu9bPZw_2020x1400b5f20
                            NTIvariantconversionerror__Y4pKacDNXcA9boOh7ryibHg_2030x1400b5ea0
                            NTIvartype__M4na42GvebBMnI5wV9cYMxg_2040x200000000
                            NTIwidecstringobj__4HwedE75WPfqZSQ0Cq2OUg_2050x200000000
                            NaturalToInt32__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZwinstr_492060x200000000
                            NimMain2070x200000000
                            NimMainInner2080x200000000
                            NimMainModule2090x200000000
                            NtAllocateVirtualMemory__76oader_8172100x200000000
                            NtClose__76oader_8002110x200000000
                            NtCreateSection__76oader_8982120x200000000
                            NtCreateThreadEx__76oader_8322130x200000000
                            NtFreeVirtualMemory__76oader_9362140x200000000
                            NtMapViewOfSection__76oader_9232150x200000000
                            NtProtectVirtualMemory__76oader_8792160x200000000
                            NtReadVirtualMemory__76oader_9512170x200000000
                            NtWriteVirtualMemory__76oader_8642180x200000000
                            Null__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_182190x1400b5e90
                            OpenMoreMaxPIDProcess__76oader_15092200x200000000
                            PreMain2210x200000000
                            PreMainInner2220x200000000
                            RVAtoRawOffset__76oader_9892230x200000000
                            Rcon__OOZOOZ85sersZnicksZOnimbleZpkgsZnimcrypto4548O54O48ZnimcryptoZrijndael_62240x200000000
                            RuntimeHelp__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZclr_22482250x200000000
                            SYSCALL_STUB_SIZE__76oader_7932260x200000000
                            SetupETWBreakpoints__76oader_32062270x14000d570
                            SinkVtbl__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_71252280x200000000
                            Sink_AddRef__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70242290x200000000
                            Sink_GetIDsOfNames__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70512300x200000000
                            Sink_GetTypeInfoCount__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70402310x200000000
                            Sink_GetTypeInfo__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70442320x200000000
                            Sink_Invoke__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70602330x200000000
                            Sink_QueryInterface__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70062340x200000000
                            Sink_Release__OOZOOZ85sersZnicksZOnimbleZpkgsZwinim4551O57O50ZwinimZcom_70322350x200000000
                            StartProcess__76oader_17822360x200000000
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 26, 2024 06:26:21.691421986 CEST1.1.1.1192.168.2.50x4393No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                            Oct 26, 2024 06:26:21.691421986 CEST1.1.1.1192.168.2.50x4393No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:00:26:05
                            Start date:26/10/2024
                            Path:C:\Users\user\Desktop\gEP8SOoakR.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\gEP8SOoakR.exe"
                            Imagebase:0x7ff618640000
                            File size:710'656 bytes
                            MD5 hash:1AF918875C67D204941EC2C8A780E312
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:00:26:05
                            Start date:26/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:00:26:07
                            Start date:26/10/2024
                            Path:C:\Users\user\Desktop\gEP8SOoakR.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\gep8sooakr.exe 1028
                            Imagebase:0x7ff618640000
                            File size:710'656 bytes
                            MD5 hash:1AF918875C67D204941EC2C8A780E312
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:15%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:31.4%
                              Total number of Nodes:1705
                              Total number of Limit Nodes:37
                              execution_graph 11003 7ff61865985e 11004 7ff61865986b 11003->11004 11005 7ff61865988c 11004->11005 11017 7ff618657c5b 11004->11017 11010 7ff618657a84 11005->11010 11008 7ff6186598ac 11009 7ff618657a84 2 API calls 11008->11009 11009->11008 11011 7ff618657a9b 11010->11011 11012 7ff618657ada strlen 11011->11012 11013 7ff618657ab1 11011->11013 11024 7ff618657985 11012->11024 11015 7ff618657985 fputc 11013->11015 11016 7ff618657ad8 11015->11016 11016->11008 11018 7ff618657c72 11017->11018 11019 7ff618657c88 11018->11019 11020 7ff618657cb1 11018->11020 11036 7ff618657afc 11019->11036 11021 7ff618657afc 5 API calls 11020->11021 11023 7ff618657caf 11021->11023 11023->11005 11029 7ff6186579a3 11024->11029 11025 7ff618657a28 11026 7ff618657a54 11025->11026 11032 7ff618657900 11025->11032 11028 7ff618657a7c 11026->11028 11030 7ff618657900 fputc 11026->11030 11028->11016 11029->11025 11031 7ff618657900 fputc 11029->11031 11030->11026 11031->11029 11033 7ff61865791f 11032->11033 11034 7ff618657955 11033->11034 11035 7ff618657941 fputc 11033->11035 11034->11025 11035->11034 11046 7ff61865d570 11036->11046 11038 7ff618657b27 11043 7ff618657900 fputc 11038->11043 11044 7ff618657bba 11038->11044 11039 7ff618657c2b 11040 7ff618657c53 11039->11040 11042 7ff618657900 fputc 11039->11042 11040->11023 11041 7ff61865d570 4 API calls 11041->11044 11042->11039 11043->11038 11044->11039 11044->11041 11045 7ff618657900 fputc 11044->11045 11045->11044 11047 7ff61865d590 ___mb_cur_max_func ___lc_codepage_func 11046->11047 11051 7ff61865d4b0 11047->11051 11052 7ff61865d4ff 11051->11052 11053 7ff61865d4d0 11051->11053 11055 7ff61865d555 _errno 11052->11055 11056 7ff61865d4ec 11052->11056 11054 7ff61865d4da _errno 11053->11054 11053->11056 11054->11056 11055->11056 11056->11038 9205 7ff618641125 9208 7ff618641154 9205->9208 9209 7ff618641188 9208->9209 9210 7ff618641249 9209->9210 9211 7ff61864123d _amsg_exit 9209->9211 9212 7ff61864127e 9210->9212 9213 7ff618641256 _initterm 9210->9213 9211->9212 9214 7ff618641296 _initterm 9212->9214 9217 7ff6186412bc 9212->9217 9213->9212 9214->9217 9216 7ff61864140e 9229 7ff61865d9e0 9216->9229 9224 7ff618641591 9217->9224 9220 7ff618641455 exit 9221 7ff618641462 9220->9221 9222 7ff61864146c _cexit 9221->9222 9223 7ff618641146 9221->9223 9222->9223 9225 7ff6186415b7 9224->9225 9226 7ff61864166a 9225->9226 9227 7ff6186415d2 9225->9227 9226->9216 9228 7ff6186415f1 malloc memcpy 9227->9228 9228->9225 9230 7ff61865da88 9229->9230 9231 7ff61866222f 9230->9231 9365 7ff6186420f0 GetProcAddress 9230->9365 9232 7ff618642050 5 API calls 9231->9232 9234 7ff61866223b 9232->9234 9237 7ff618642050 5 API calls 9234->9237 9236 7ff6186420f0 5 API calls 9243 7ff61865e86b 9236->9243 9238 7ff618662247 9237->9238 9239 7ff618642050 5 API calls 9238->9239 9240 7ff618662253 9239->9240 9241 7ff618642050 5 API calls 9240->9241 9244 7ff61866225f 9241->9244 9242 7ff6186622bb 9754 7ff618641df0 9242->9754 9243->9242 9371 7ff61864fde0 9243->9371 9246 7ff618642050 5 API calls 9244->9246 9248 7ff61866226b 9246->9248 9250 7ff618642050 5 API calls 9248->9250 9252 7ff618662277 9250->9252 9254 7ff618642050 5 API calls 9252->9254 9253 7ff61864fde0 15 API calls 9255 7ff61865ef15 9253->9255 9256 7ff618662283 9254->9256 9257 7ff61864fde0 15 API calls 9255->9257 9258 7ff618642050 5 API calls 9256->9258 9259 7ff61865ef28 9257->9259 9260 7ff61866228f 9258->9260 9261 7ff61864fde0 15 API calls 9259->9261 9262 7ff618642050 5 API calls 9260->9262 9263 7ff61865ef34 9261->9263 9264 7ff61866229b 9262->9264 9265 7ff61864fde0 15 API calls 9263->9265 9267 7ff618642050 5 API calls 9264->9267 9266 7ff61865ef61 9265->9266 9270 7ff61865ef8e signal signal signal signal 9266->9270 9268 7ff6186622a7 9267->9268 9269 7ff618642050 5 API calls 9268->9269 9271 7ff6186622af 9269->9271 9272 7ff61865f1b2 9270->9272 9273 7ff618642050 5 API calls 9271->9273 9272->9234 9274 7ff6186420f0 5 API calls 9272->9274 9273->9242 9275 7ff61865f1d1 9274->9275 9275->9238 9276 7ff6186420f0 5 API calls 9275->9276 9277 7ff61865f203 9276->9277 9278 7ff61865f229 9277->9278 9279 7ff618662223 9277->9279 9280 7ff6186420f0 5 API calls 9278->9280 9744 7ff618642050 9279->9744 9282 7ff61865f235 9280->9282 9283 7ff6186420f0 5 API calls 9282->9283 9284 7ff61865f24f 9283->9284 9285 7ff6186420f0 5 API calls 9284->9285 9286 7ff61865f269 9285->9286 9286->9240 9287 7ff61865f28f 9286->9287 9288 7ff6186420f0 5 API calls 9287->9288 9289 7ff61865f29b 9288->9289 9290 7ff6186420f0 5 API calls 9289->9290 9291 7ff61865f2b5 9290->9291 9292 7ff6186420f0 5 API calls 9291->9292 9293 7ff61865f2cf 9292->9293 9294 7ff6186420f0 5 API calls 9293->9294 9295 7ff61865f2e9 9294->9295 9296 7ff6186420f0 5 API calls 9295->9296 9297 7ff61865f303 9296->9297 9298 7ff6186420f0 5 API calls 9297->9298 9299 7ff61865f31d 9298->9299 9300 7ff6186420f0 5 API calls 9299->9300 9301 7ff61865f337 9300->9301 9302 7ff6186420f0 5 API calls 9301->9302 9303 7ff61865f351 9302->9303 9304 7ff6186420f0 5 API calls 9303->9304 9305 7ff61865f36b 9304->9305 9306 7ff6186420f0 5 API calls 9305->9306 9307 7ff61865f385 9306->9307 9308 7ff6186420f0 5 API calls 9307->9308 9309 7ff61865f39f 9308->9309 9310 7ff6186420f0 5 API calls 9309->9310 9311 7ff61865f3b9 9310->9311 9312 7ff6186420f0 5 API calls 9311->9312 9313 7ff61865f3d3 9312->9313 9313->9244 9314 7ff61865f3f9 9313->9314 9315 7ff6186420f0 5 API calls 9314->9315 9316 7ff61865f40c 9315->9316 9317 7ff6186420f0 5 API calls 9316->9317 9318 7ff61865f426 9317->9318 9318->9248 9319 7ff61865f532 9318->9319 9320 7ff6186420f0 5 API calls 9319->9320 9321 7ff61865f53e 9320->9321 9322 7ff6186420f0 5 API calls 9321->9322 9323 7ff61865f558 9322->9323 9323->9256 9324 7ff6186420f0 5 API calls 9323->9324 9325 7ff618661940 9324->9325 9326 7ff6186420f0 5 API calls 9325->9326 9327 7ff61866195a 9326->9327 9327->9252 9328 7ff618661980 9327->9328 9329 7ff6186420f0 5 API calls 9328->9329 9330 7ff61866198c 9329->9330 9331 7ff6186420f0 5 API calls 9330->9331 9332 7ff6186619a6 9331->9332 9333 7ff6186420f0 5 API calls 9332->9333 9334 7ff6186619c0 9333->9334 9335 7ff6186420f0 5 API calls 9334->9335 9336 7ff6186619da 9335->9336 9337 7ff6186420f0 5 API calls 9336->9337 9338 7ff6186619f4 9337->9338 9339 7ff6186420f0 5 API calls 9338->9339 9340 7ff618661a0e 9339->9340 9340->9260 9341 7ff618661a34 9340->9341 9342 7ff6186420f0 5 API calls 9341->9342 9343 7ff618661a40 9342->9343 9343->9264 9344 7ff618661a66 9343->9344 9345 7ff6186420f0 5 API calls 9344->9345 9346 7ff618661a79 9345->9346 9347 7ff6186420f0 5 API calls 9346->9347 9348 7ff618661a93 9347->9348 9349 7ff6186420f0 5 API calls 9348->9349 9350 7ff618661aad 9349->9350 9379 7ff61864bb80 9350->9379 9352 7ff618662107 9352->9268 9353 7ff618662125 9352->9353 9354 7ff6186420f0 5 API calls 9353->9354 9355 7ff618662131 9354->9355 9355->9271 9356 7ff618662157 9355->9356 9357 7ff6186420f0 5 API calls 9356->9357 9358 7ff618662163 9357->9358 9359 7ff6186420f0 5 API calls 9358->9359 9360 7ff61866217d 9359->9360 9391 7ff618648c30 9360->9391 9361 7ff61866218e 9421 7ff61864c240 9361->9421 9362 7ff618641445 9362->9220 9362->9221 9366 7ff618642115 9365->9366 9368 7ff618642127 9365->9368 9366->9236 9367 7ff618641db0 strlen fwrite fflush 9367->9368 9368->9366 9368->9367 9756 7ff618641db0 strlen fwrite 9368->9756 9370 7ff61864223a exit 9370->9368 9759 7ff6186429d0 9371->9759 9374 7ff61864fe50 9378 7ff61864fe60 9374->9378 9769 7ff618642d60 9374->9769 9375 7ff61864ff3a 9375->9378 9776 7ff618642290 9375->9776 9378->9253 9832 7ff61864b420 9379->9832 9381 7ff61864bce2 9381->9352 9383 7ff61864b420 36 API calls 9388 7ff61864bbb1 9383->9388 9384 7ff618643f10 36 API calls 9384->9388 9386 7ff618643f10 36 API calls 9389 7ff61864bd6d memcpy 9386->9389 9387 7ff61864bc5f memcpy 9390 7ff61864bc94 memcpy 9387->9390 9388->9381 9388->9383 9388->9384 9388->9386 9388->9390 9836 7ff618643f10 9388->9836 9845 7ff618646370 9388->9845 9389->9388 9390->9388 9392 7ff618648c43 _fileno _setmode 9391->9392 9393 7ff618648c67 _fileno _setmode 9392->9393 9394 7ff618648c7d _fileno _setmode SetConsoleOutputCP SetConsoleCP LoadLibraryA 9393->9394 9395 7ff618648cb7 GetProcAddress 9394->9395 9401 7ff618648cc4 9394->9401 9395->9401 9396 7ff618648fb9 9397 7ff618641df0 3 API calls 9396->9397 9398 7ff618648fbe 9397->9398 10064 7ff618641e40 9398->10064 9401->9396 9401->9398 9402 7ff618648e04 9401->9402 9403 7ff618648e68 9402->9403 9404 7ff618648e59 CoInitialize 9402->9404 10025 7ff618652480 9403->10025 9404->9403 9407 7ff618648e85 9409 7ff618648e91 9407->9409 10050 7ff618650300 9407->10050 9408 7ff618648f50 9410 7ff618650300 56 API calls 9408->9410 10033 7ff6186487d0 9409->10033 9415 7ff618648f55 9410->9415 9414 7ff618648edb 9414->9361 9417 7ff618650240 20 API calls 9415->9417 9416 7ff618650240 20 API calls 9419 7ff618648ef5 9416->9419 9418 7ff618648f0d 9417->9418 9418->9409 9420 7ff618650240 20 API calls 9418->9420 9419->9361 9420->9409 9422 7ff61864c25c 9421->9422 9718 7ff61864d1d2 9421->9718 9432 7ff61864c3c1 RtlGetVersion 9422->9432 9422->9718 9423 7ff618641e40 4 API calls 9424 7ff61864d1e1 9423->9424 9425 7ff618654230 9424->9425 9426 7ff618643f10 36 API calls 9425->9426 9427 7ff618654254 9426->9427 9428 7ff61864b420 36 API calls 9427->9428 9429 7ff618654273 9428->9429 9430 7ff61864bb80 40 API calls 9429->9430 9431 7ff618654280 HeapCreate 9430->9431 9433 7ff6186542aa 9431->9433 9448 7ff61864c3f3 9432->9448 9434 7ff61864b420 36 API calls 9433->9434 9436 7ff6186542e6 9434->9436 9435 7ff61864b420 36 API calls 9435->9448 9437 7ff61864bb80 40 API calls 9436->9437 9439 7ff6186542f3 9437->9439 9438 7ff61864bb80 40 API calls 9438->9448 10335 7ff61864f6d0 9439->10335 9441 7ff61864ccc0 9443 7ff61864cce7 9441->9443 9447 7ff618650240 20 API calls 9441->9447 9442 7ff618654313 9444 7ff61864b420 36 API calls 9442->9444 9451 7ff61864b420 36 API calls 9443->9451 9446 7ff618654324 9444->9446 9445 7ff61864cb80 9449 7ff618651ec0 36 API calls 9445->9449 9450 7ff61864bb80 40 API calls 9446->9450 9447->9443 9448->9435 9448->9438 9448->9441 9448->9445 9452 7ff618645b50 56 API calls 9448->9452 9455 7ff618650240 20 API calls 9448->9455 9453 7ff61864cb98 memcpy 9449->9453 9454 7ff618654331 9450->9454 9456 7ff61864cd13 9451->9456 9457 7ff61864c4af memcpy 9452->9457 9453->9448 9458 7ff61864f6d0 64 API calls 9454->9458 9455->9448 9462 7ff618643f10 36 API calls 9456->9462 9477 7ff61864cda7 9456->9477 9482 7ff61864c4d9 9457->9482 9461 7ff618654351 9458->9461 9459 7ff618645b50 56 API calls 9459->9482 9460 7ff618643f10 36 API calls 9460->9477 9464 7ff61864b420 36 API calls 9461->9464 9463 7ff61864cd4d 9462->9463 9465 7ff61864cd6c memcpy 9463->9465 9466 7ff61864cd8d memcpy 9463->9466 9468 7ff618654362 9464->9468 9465->9466 9466->9477 9467 7ff61864d159 memcpy 9467->9477 9469 7ff61864bb80 40 API calls 9468->9469 9471 7ff61865436f 9469->9471 9470 7ff61864b420 36 API calls 9470->9477 9473 7ff61864f6d0 64 API calls 9471->9473 9472 7ff618650240 20 API calls 9472->9477 9475 7ff61865438f 9473->9475 9474 7ff61864bb80 40 API calls 9474->9477 9476 7ff61864b420 36 API calls 9475->9476 9478 7ff6186543a0 9476->9478 9477->9460 9477->9467 9477->9470 9477->9472 9477->9474 10332 7ff618644090 9477->10332 9480 7ff61864bb80 40 API calls 9478->9480 9484 7ff6186543ad 9480->9484 9482->9459 9490 7ff618650240 20 API calls 9482->9490 9506 7ff61864bb80 40 API calls 9482->9506 9559 7ff61864e020 40 API calls 9482->9559 9621 7ff61864e170 42 API calls 9482->9621 9627 7ff618646670 38 API calls 9482->9627 9684 7ff61864f3c0 36 API calls 9482->9684 9694 7ff61864c0f0 40 API calls 9482->9694 9695 7ff61864ca71 GetProcessHeap GetProcessHeap 9482->9695 9696 7ff61864ca91 exit 9482->9696 9697 7ff61864b420 36 API calls 9482->9697 9698 7ff61864cbca 9482->9698 9699 7ff618652bf0 4 API calls 9482->9699 9483 7ff61864b420 36 API calls 9494 7ff61864ce39 9483->9494 9486 7ff61864f6d0 64 API calls 9484->9486 9485 7ff61864bb80 40 API calls 9485->9494 9487 7ff6186543d1 9486->9487 9489 7ff61864b420 36 API calls 9487->9489 9488 7ff61864b420 36 API calls 9488->9494 9491 7ff6186543e2 9489->9491 9490->9482 9492 7ff61864bb80 40 API calls 9491->9492 9493 7ff6186543f6 9492->9493 9495 7ff61864f6d0 64 API calls 9493->9495 9494->9485 9494->9488 9496 7ff618644090 36 API calls 9494->9496 9497 7ff61865441a 9495->9497 9498 7ff61864ce8b GetFileAttributesW 9496->9498 9499 7ff61864bb80 40 API calls 9497->9499 9500 7ff61864ce9d OpenProcess 9498->9500 9501 7ff61864d0f0 9498->9501 9503 7ff61865442b 9499->9503 9504 7ff61864d07c 9500->9504 9505 7ff61864cebd 9500->9505 9507 7ff618644090 36 API calls 9501->9507 9512 7ff61864f6d0 64 API calls 9503->9512 9508 7ff61864b420 36 API calls 9504->9508 9509 7ff61864b420 36 API calls 9505->9509 9506->9482 9510 7ff61864d111 GetFileAttributesW 9507->9510 9511 7ff61864d08d 9508->9511 9513 7ff61864cece 9509->9513 9510->9477 9514 7ff61864bb80 40 API calls 9511->9514 9515 7ff61865444b VirtualProtect 9512->9515 9516 7ff61864bb80 40 API calls 9513->9516 9517 7ff61864d09a 9514->9517 9518 7ff61864bb80 40 API calls 9515->9518 9522 7ff61864cedb 9516->9522 9519 7ff618641d60 20 API calls 9517->9519 9529 7ff61865447b 9518->9529 9521 7ff61864d0a9 9519->9521 9520 7ff61864cf0e 9523 7ff61864b420 36 API calls 9520->9523 9524 7ff618644270 37 API calls 9521->9524 9522->9520 9527 7ff618650240 20 API calls 9522->9527 9525 7ff61864cf26 9523->9525 9526 7ff61864d0bc 9524->9526 9530 7ff61864bb80 40 API calls 9525->9530 9526->9505 9537 7ff618650240 20 API calls 9526->9537 9527->9520 9528 7ff6186544ca 9532 7ff61864bb80 40 API calls 9528->9532 9529->9528 9531 7ff61864bb80 40 API calls 9529->9531 9533 7ff61864cf33 9530->9533 9534 7ff6186544b5 9531->9534 9542 7ff6186544db 9532->9542 9535 7ff61864cf4b GetModuleHandleA 9533->9535 9536 7ff61864cf3f 9533->9536 9538 7ff618652bf0 4 API calls 9534->9538 9539 7ff61864b420 36 API calls 9535->9539 9536->9535 9537->9505 9538->9528 9540 7ff61864cf65 9539->9540 9541 7ff61864bb80 40 API calls 9540->9541 9544 7ff61864cf72 GetProcAddress 9541->9544 9543 7ff618655848 9542->9543 10360 7ff618648350 9542->10360 9546 7ff61864bb80 40 API calls 9543->9546 9544->9425 9549 7ff618655869 9546->9549 9551 7ff618652bf0 4 API calls 9549->9551 9550 7ff618654577 9552 7ff618644090 36 API calls 9550->9552 9556 7ff618654a1c 9550->9556 9679 7ff618654d83 9551->9679 9560 7ff618654648 9552->9560 9558 7ff618648350 59 API calls 9556->9558 9557 7ff61864bb80 40 API calls 9557->9679 9562 7ff618654a21 9558->9562 9559->9482 9561 7ff618654680 9560->9561 9563 7ff618655840 9560->9563 9567 7ff618644090 36 API calls 9560->9567 9564 7ff61864b420 36 API calls 9561->9564 9566 7ff618654a38 9562->9566 9569 7ff6186483f0 61 API calls 9562->9569 10569 7ff61864fbe0 9563->10569 9595 7ff61865469a 9564->9595 9565 7ff618643f10 36 API calls 9565->9679 9570 7ff61864bb80 40 API calls 9566->9570 9566->9679 9567->9560 9572 7ff618654a30 9569->9572 9573 7ff618654a51 LoadLibraryA 9570->9573 9571 7ff618648350 59 API calls 9571->9595 9575 7ff61864d1f0 58 API calls 9572->9575 9576 7ff61864bb80 40 API calls 9573->9576 9575->9566 9579 7ff618654a83 GetProcAddress 9576->9579 9577 7ff61865478b 9580 7ff61864b420 36 API calls 9577->9580 9578 7ff61864b420 36 API calls 9578->9595 9585 7ff618645b50 56 API calls 9579->9585 9582 7ff6186547a4 9580->9582 9591 7ff618644a80 38 API calls 9582->9591 9583 7ff618648350 59 API calls 9583->9679 9584 7ff6186483f0 61 API calls 9584->9595 9590 7ff618654abb 9585->9590 9586 7ff618654fbc ResumeThread 9588 7ff618654fdd exit 9586->9588 9587 7ff6186483f0 61 API calls 9587->9679 9665 7ff618654e2a 9588->9665 9589 7ff61864d1f0 58 API calls 9589->9679 9590->9588 9593 7ff618645b50 56 API calls 9590->9593 9594 7ff6186547e6 9591->9594 9592 7ff618643f10 36 API calls 9592->9595 9596 7ff618654be0 9593->9596 9597 7ff61864b420 36 API calls 9594->9597 9595->9571 9595->9577 9595->9578 9595->9584 9595->9592 9598 7ff618654719 memcpy 9595->9598 9599 7ff618654738 memcpy 9595->9599 9600 7ff61865475b memcpy 9595->9600 9601 7ff618656050 9596->9601 9605 7ff618654c8a 9596->9605 9602 7ff6186547ff 9597->9602 9598->9595 9599->9595 9600->9595 9603 7ff61864bb80 40 API calls 9601->9603 9610 7ff618643f10 36 API calls 9602->9610 9604 7ff618656061 9603->9604 9607 7ff618643f10 36 API calls 9604->9607 9609 7ff61864bb80 40 API calls 9605->9609 9605->9679 9606 7ff6186559dc fwrite 9613 7ff6186559fe fflush 9606->9613 9624 7ff618656094 9607->9624 9608 7ff61864bb80 40 API calls 9608->9665 9611 7ff618654cc7 9609->9611 9612 7ff618654850 9610->9612 10373 7ff618652bf0 9611->10373 9615 7ff61865486a memcpy 9612->9615 9616 7ff618654885 9612->9616 9613->9679 9615->9616 9617 7ff6186548aa 9616->9617 9618 7ff61865488a memcpy 9616->9618 9619 7ff6186548af memcpy 9617->9619 9620 7ff6186548d1 9617->9620 9618->9617 9619->9620 9622 7ff6186548f6 9620->9622 9623 7ff6186548d6 memcpy 9620->9623 9621->9482 9625 7ff61865491b 9622->9625 9626 7ff6186548fb memcpy 9622->9626 9623->9622 9643 7ff618656121 9624->9643 9629 7ff618644090 36 API calls 9625->9629 9626->9625 9627->9482 9628 7ff618654cd7 9630 7ff61864bb80 40 API calls 9628->9630 9628->9679 9639 7ff618654942 9629->9639 9632 7ff618654d19 9630->9632 9634 7ff618652bf0 fputc fputc fwrite fputc 9632->9634 9633 7ff618652bf0 4 API calls 9633->9679 9636 7ff618654d29 9634->9636 9635 7ff618652480 35 API calls 9635->9679 9640 7ff618654d4d 9636->9640 9641 7ff618654e90 9636->9641 9637 7ff618652af0 fputc fputc fputc 9637->9643 9638 7ff618650300 56 API calls 9638->9679 9646 7ff61864b420 36 API calls 9639->9646 9642 7ff61864bb80 40 API calls 9640->9642 9644 7ff61864bb80 40 API calls 9641->9644 9648 7ff618654d61 9642->9648 9643->9637 9653 7ff6186561d6 fwrite 9643->9653 9647 7ff618654ea1 9644->9647 9645 7ff618655ec9 9645->9362 9649 7ff6186549a3 9646->9649 9651 7ff618652bf0 fputc fputc fwrite fputc 9647->9651 9652 7ff618643f10 36 API calls 9648->9652 10368 7ff618646670 9649->10368 9651->9679 9652->9679 9658 7ff6186561f7 fflush 9653->9658 9655 7ff6186525f0 35 API calls 9655->9679 9656 7ff6186549ab CreateProcessW 9656->9556 9658->9624 9659 7ff618649280 43 API calls 9659->9679 9662 7ff618648fd0 39 API calls 9662->9679 9663 7ff618652af0 fputc fputc fputc 9663->9665 9665->9606 9665->9608 9665->9663 9666 7ff618652480 35 API calls 9665->9666 9668 7ff618654e64 fwrite 9665->9668 9669 7ff618650300 56 API calls 9665->9669 9672 7ff618650240 20 API calls 9665->9672 9665->9679 9680 7ff6186487d0 56 API calls 9665->9680 9681 7ff618648350 59 API calls 9665->9681 9682 7ff618645bb0 56 API calls 9665->9682 9683 7ff6186483f0 61 API calls 9665->9683 9685 7ff61864d1f0 58 API calls 9665->9685 9686 7ff618651ec0 36 API calls 9665->9686 9688 7ff618656270 9665->9688 9690 7ff618645b50 56 API calls 9665->9690 9692 7ff618651ec0 36 API calls 9665->9692 10428 7ff61864d570 9665->10428 10489 7ff618646970 9665->10489 10503 7ff61864a3e0 9665->10503 10523 7ff61864e630 9665->10523 10574 7ff618652ca0 _setjmp 9665->10574 9666->9665 9667 7ff6186487d0 56 API calls 9667->9679 9670 7ff618654e85 fflush 9668->9670 9669->9665 9670->9679 9671 7ff6186556f5 9673 7ff61864adb0 97 API calls 9671->9673 9672->9665 9675 7ff61865573d 9673->9675 9674 7ff618650420 20 API calls 9674->9679 9675->9362 9676 7ff618645a20 56 API calls 9676->9679 9678 7ff618650240 20 API calls 9678->9679 9679->9557 9679->9565 9679->9583 9679->9586 9679->9587 9679->9588 9679->9589 9679->9633 9679->9635 9679->9638 9679->9645 9679->9655 9679->9659 9679->9662 9679->9665 9679->9667 9679->9671 9679->9674 9679->9676 9679->9678 10533 7ff61864a080 9679->10533 10552 7ff61864adb0 9679->10552 9680->9665 9681->9665 9682->9665 9683->9665 9684->9482 9685->9665 9687 7ff6186554b5 memcpy 9686->9687 9687->9665 9689 7ff618645b50 56 API calls 9688->9689 9691 7ff618656283 9689->9691 9690->9665 9693 7ff61865580c memcpy 9692->9693 9693->9665 9694->9482 9695->9482 9695->9696 9696->9482 9697->9482 10253 7ff61864be00 GetCurrentThread GetThreadContext 9698->10253 9701 7ff61864cac0 exit 9699->9701 9701->9448 9702 7ff61864cbcf 9703 7ff61864cbd7 9702->9703 9704 7ff61864cfb0 9702->9704 9706 7ff61864b420 36 API calls 9703->9706 9705 7ff61864b420 36 API calls 9704->9705 9707 7ff61864cfc3 9705->9707 9708 7ff61864cbe8 9706->9708 9710 7ff61864d178 9707->9710 9711 7ff61864cfde 9707->9711 9709 7ff61864bb80 40 API calls 9708->9709 9719 7ff61864cbf5 9709->9719 9713 7ff618643f10 36 API calls 9710->9713 9712 7ff618643f10 36 API calls 9711->9712 9714 7ff61864cffd 9712->9714 9716 7ff61864d194 9713->9716 9717 7ff61864d01b memcpy memcpy 9714->9717 9714->9718 9715 7ff61864cc29 10262 7ff61864f3c0 9715->10262 9720 7ff61864d1b2 memcpy 9716->9720 9721 7ff61864d054 9716->9721 9717->9721 9718->9423 9719->9715 9725 7ff618650240 20 API calls 9719->9725 9720->9721 10379 7ff618641d60 9721->10379 9725->9715 9731 7ff61864f3c0 36 API calls 9732 7ff61864cc54 9731->9732 9733 7ff61864e020 40 API calls 9732->9733 9734 7ff61864cc5c 9733->9734 9735 7ff61864e170 42 API calls 9734->9735 9736 7ff61864cc6e 9735->9736 9737 7ff61864f3c0 36 API calls 9736->9737 9738 7ff61864cc73 9737->9738 9739 7ff61864e020 40 API calls 9738->9739 9740 7ff61864cc7b 9739->9740 9741 7ff61864e170 42 API calls 9740->9741 9742 7ff61864cc8d GetTickCount Sleep SleepEx 9741->9742 9742->9443 9743 7ff61864ccaf exit 9742->9743 9743->9441 9745 7ff618642070 9744->9745 9746 7ff618641db0 3 API calls 9745->9746 9747 7ff61864207f 9746->9747 9748 7ff618641db0 3 API calls 9747->9748 9749 7ff6186420a2 GetLastError 9748->9749 9750 7ff6186420af 9749->9750 9751 7ff618641db0 3 API calls 9750->9751 9752 7ff618641db0 3 API calls 9750->9752 9753 7ff6186420c5 exit 9751->9753 9752->9750 9753->9750 9755 7ff618641e01 fwrite fflush exit 9754->9755 9757 7ff61865d018 fflush 9756->9757 9757->9370 9758 7ff6187073bc 9757->9758 9760 7ff6186429ed 9759->9760 9768 7ff618642b96 9759->9768 9761 7ff618642cf4 9760->9761 9762 7ff618642370 15 API calls 9760->9762 9765 7ff618642b46 9760->9765 9760->9768 9761->9768 9798 7ff618642370 9761->9798 9762->9761 9764 7ff618642290 12 API calls 9766 7ff618642bea 9764->9766 9765->9768 9794 7ff618642610 9765->9794 9766->9374 9766->9375 9768->9764 9768->9766 9770 7ff618642d8b 9769->9770 9771 7ff618642e30 9769->9771 9773 7ff618642d60 12 API calls 9770->9773 9775 7ff618642d97 9770->9775 9772 7ff618642290 12 API calls 9771->9772 9774 7ff618642e3c 9771->9774 9772->9774 9773->9775 9774->9378 9775->9378 9777 7ff6186422a9 9776->9777 9778 7ff618642300 VirtualAlloc 9776->9778 9777->9778 9779 7ff6186422b1 9777->9779 9778->9779 9780 7ff618642360 9778->9780 9779->9378 9781 7ff618642260 8 API calls 9780->9781 9783 7ff618642365 9781->9783 9782 7ff6186425d4 9782->9378 9783->9782 9784 7ff6186425b8 VirtualAlloc 9783->9784 9785 7ff6186423c4 VirtualAlloc 9783->9785 9786 7ff6186425cf 9784->9786 9791 7ff6186423e2 9784->9791 9787 7ff6186423db 9785->9787 9788 7ff6186425e4 VirtualAlloc 9785->9788 9789 7ff618642260 8 API calls 9786->9789 9787->9791 9788->9786 9790 7ff6186425ff 9788->9790 9789->9782 9792 7ff618642290 8 API calls 9791->9792 9793 7ff618642426 9791->9793 9792->9793 9793->9378 9795 7ff618642666 9794->9795 9796 7ff6186426e6 9795->9796 9797 7ff618642290 12 API calls 9795->9797 9796->9768 9797->9796 9799 7ff6186425d4 9798->9799 9800 7ff61864238c 9798->9800 9799->9765 9801 7ff6186425b8 VirtualAlloc 9800->9801 9802 7ff6186423c4 VirtualAlloc 9800->9802 9803 7ff6186425cf 9801->9803 9808 7ff6186423e2 9801->9808 9804 7ff6186423db 9802->9804 9805 7ff6186425e4 VirtualAlloc 9802->9805 9811 7ff618642260 9803->9811 9804->9808 9805->9803 9807 7ff6186425ff 9805->9807 9809 7ff618642290 12 API calls 9808->9809 9810 7ff618642426 9808->9810 9809->9810 9810->9765 9812 7ff61864226f 9811->9812 9813 7ff618641db0 3 API calls 9812->9813 9814 7ff61864227e exit 9813->9814 9815 7ff618642290 9814->9815 9816 7ff618642300 VirtualAlloc 9815->9816 9817 7ff6186422b1 9815->9817 9816->9817 9818 7ff618642360 9816->9818 9817->9799 9819 7ff618642260 7 API calls 9818->9819 9821 7ff618642365 9819->9821 9820 7ff6186425d4 9820->9799 9821->9820 9822 7ff6186425b8 VirtualAlloc 9821->9822 9823 7ff6186423c4 VirtualAlloc 9821->9823 9824 7ff6186425cf 9822->9824 9829 7ff6186423e2 9822->9829 9825 7ff6186423db 9823->9825 9826 7ff6186425e4 VirtualAlloc 9823->9826 9827 7ff618642260 7 API calls 9824->9827 9825->9829 9826->9824 9828 7ff6186425ff 9826->9828 9827->9820 9830 7ff618642290 7 API calls 9829->9830 9831 7ff618642426 9829->9831 9830->9831 9831->9799 9833 7ff61864b471 9832->9833 9835 7ff61864b47c 9832->9835 9834 7ff618646370 36 API calls 9833->9834 9833->9835 9834->9835 9835->9388 9837 7ff618643f31 9836->9837 9838 7ff618643f41 9837->9838 9873 7ff618650460 9837->9873 9854 7ff618642ea0 9838->9854 9842 7ff618643f8c memset 9842->9387 9843 7ff618643f51 9843->9842 9928 7ff618643bd0 9843->9928 9846 7ff6186463a2 9845->9846 9847 7ff6186463b6 9846->9847 9848 7ff618650460 34 API calls 9846->9848 9849 7ff618642ea0 16 API calls 9847->9849 9848->9847 9851 7ff6186463c6 9849->9851 9850 7ff618646408 memcpy 9850->9388 9851->9850 9853 7ff618643bd0 20 API calls 9851->9853 9853->9850 9855 7ff618642f30 9854->9855 9856 7ff618642ec5 9854->9856 9859 7ff618643098 9855->9859 9860 7ff618642f45 9855->9860 9857 7ff618642ed6 9856->9857 9858 7ff618642fa0 VirtualAlloc 9856->9858 9862 7ff6186429d0 15 API calls 9857->9862 9858->9860 9861 7ff618642fc3 9858->9861 9863 7ff6186429d0 15 API calls 9859->9863 9866 7ff618642260 12 API calls 9860->9866 9867 7ff618642f09 9860->9867 9864 7ff618643003 9861->9864 9868 7ff618643022 9861->9868 9865 7ff618642ede 9862->9865 9863->9867 9870 7ff618642290 12 API calls 9864->9870 9871 7ff618642d60 12 API calls 9865->9871 9869 7ff618643162 9866->9869 9867->9843 9868->9865 9872 7ff618643125 9870->9872 9871->9867 9872->9843 9924 7ff618650478 9873->9924 9874 7ff618651ac9 9874->9838 9875 7ff618650c69 9934 7ff61864ddd0 9875->9934 9877 7ff618650ca4 9878 7ff618650cd5 9877->9878 9939 7ff618650240 9877->9939 9878->9838 9879 7ff618650c8f 9879->9877 9880 7ff618651622 9879->9880 9882 7ff61864ddd0 22 API calls 9879->9882 9883 7ff618651649 9880->9883 9884 7ff618643170 3 API calls 9880->9884 9882->9879 9885 7ff618643170 3 API calls 9883->9885 9884->9880 9886 7ff61865166b 9885->9886 9887 7ff618642ea0 16 API calls 9886->9887 9888 7ff61865168e 9887->9888 9904 7ff61865170f 9888->9904 9953 7ff61864fff0 9888->9953 9889 7ff618642ea0 16 API calls 9892 7ff618651016 memcpy 9889->9892 9890 7ff618642ea0 16 API calls 9894 7ff61865159b memcpy 9890->9894 9897 7ff618643170 3 API calls 9892->9897 9893 7ff618642ea0 16 API calls 9898 7ff618651080 memcpy 9893->9898 9900 7ff618643170 3 API calls 9894->9900 9895 7ff618642ea0 16 API calls 9901 7ff618651a15 memcpy 9895->9901 9896 7ff618642ea0 16 API calls 9902 7ff618651a7a memcpy 9896->9902 9897->9924 9903 7ff618643170 3 API calls 9898->9903 9899 7ff618642ea0 16 API calls 9905 7ff618651217 memcpy 9899->9905 9900->9924 9906 7ff618643170 3 API calls 9901->9906 9907 7ff618643170 3 API calls 9902->9907 9903->9924 9909 7ff61864fff0 22 API calls 9904->9909 9926 7ff618651788 9904->9926 9910 7ff618643170 3 API calls 9905->9910 9906->9924 9907->9924 9908 7ff618642ea0 16 API calls 9911 7ff6186513aa memcpy 9908->9911 9909->9904 9910->9924 9913 7ff618643170 3 API calls 9911->9913 9912 7ff618642ea0 16 API calls 9915 7ff618651474 memcpy 9912->9915 9913->9924 9914 7ff618642ea0 16 API calls 9917 7ff61865140f memcpy 9914->9917 9918 7ff618643170 3 API calls 9915->9918 9916 7ff618642ea0 16 API calls 9919 7ff618650ea5 memcpy 9916->9919 9921 7ff618643170 3 API calls 9917->9921 9918->9924 9946 7ff618643170 9919->9946 9920 7ff618642ea0 16 API calls 9923 7ff6186519b0 memcpy 9920->9923 9921->9924 9925 7ff618643170 3 API calls 9923->9925 9924->9874 9924->9875 9924->9889 9924->9890 9924->9893 9924->9895 9924->9896 9924->9899 9924->9908 9924->9912 9924->9914 9924->9916 9924->9920 9925->9924 9926->9877 9927 7ff618643170 VirtualFree exit fputc 9926->9927 9927->9926 9929 7ff618643c08 9928->9929 9930 7ff618643beb 9928->9930 9931 7ff618642ea0 16 API calls 9929->9931 9930->9842 9932 7ff618643c34 memcpy 9931->9932 9933 7ff618643170 3 API calls 9932->9933 9933->9930 9937 7ff61864ddf0 9934->9937 9935 7ff61864df00 9935->9879 9936 7ff618643170 3 API calls 9936->9937 9937->9935 9937->9936 9938 7ff618643c70 22 API calls 9937->9938 9938->9937 9940 7ff618650253 9939->9940 9941 7ff618650260 9939->9941 9940->9877 9942 7ff618642ea0 16 API calls 9941->9942 9945 7ff61865027b 9941->9945 9943 7ff6186502c1 memcpy 9942->9943 9944 7ff618643170 3 API calls 9943->9944 9944->9945 9945->9877 9947 7ff6186432a0 9946->9947 9948 7ff6186431a2 9946->9948 9947->9924 9948->9947 9949 7ff618643242 VirtualFree 9948->9949 9949->9947 9950 7ff618643288 9949->9950 9965 7ff618652c50 9950->9965 9977 7ff61864db70 9953->9977 9956 7ff61865021f 9957 7ff618643c70 22 API calls 9956->9957 9958 7ff618650232 9957->9958 9958->9958 9959 7ff6186500e8 9959->9888 9960 7ff6186501aa 9963 7ff618650015 9960->9963 9988 7ff618643c70 9960->9988 9961 7ff61864db70 20 API calls 9961->9963 9963->9959 9963->9961 9964 7ff618643c70 22 API calls 9963->9964 9964->9963 9966 7ff618652c79 9965->9966 9969 7ff6186578a0 9966->9969 9968 7ff618643294 exit 9968->9947 9970 7ff6186578c0 9969->9970 9973 7ff6186596cf 9970->9973 9972 7ff6186578e4 9972->9968 9975 7ff6186596ee 9973->9975 9974 7ff61865a0b3 9974->9972 9975->9974 9976 7ff618657900 fputc 9975->9976 9976->9975 9978 7ff61864dbba 9977->9978 9979 7ff61864dce0 9978->9979 9981 7ff61864dbd7 9978->9981 9982 7ff61864dc35 9978->9982 9980 7ff618642ea0 16 API calls 9979->9980 9983 7ff61864dd01 memset 9980->9983 9981->9956 9981->9960 9981->9963 9984 7ff618642ea0 16 API calls 9982->9984 9987 7ff61864dd2d 9983->9987 9984->9981 9985 7ff618643170 3 API calls 9986 7ff61864dd95 9985->9986 9987->9985 9987->9987 9989 7ff618643c85 9988->9989 9991 7ff618643cb1 9988->9991 9989->9991 9992 7ff618643ce0 9989->9992 9994 7ff618643caa 9989->9994 9990 7ff618643c70 22 API calls 9990->9992 9991->9960 9992->9990 9992->9991 9994->9991 9996 7ff618643d50 9994->9996 10001 7ff618643380 9994->10001 9997 7ff618643d79 9996->9997 9999 7ff618643d90 9996->9999 9997->9994 9998 7ff618643d50 22 API calls 9998->9999 9999->9997 9999->9998 10000 7ff618643380 22 API calls 9999->10000 10000->9999 10002 7ff61864338e 10001->10002 10009 7ff6186433bb 10001->10009 10003 7ff61864339b 10002->10003 10004 7ff618643480 10002->10004 10005 7ff6186433a1 10003->10005 10006 7ff6186433e0 10003->10006 10004->10009 10012 7ff618642ea0 16 API calls 10004->10012 10008 7ff618642ea0 16 API calls 10005->10008 10005->10009 10007 7ff61864db70 20 API calls 10006->10007 10010 7ff618650004 10007->10010 10011 7ff618643427 memcpy 10008->10011 10009->9994 10015 7ff61865021f 10010->10015 10020 7ff6186501aa 10010->10020 10024 7ff618650015 10010->10024 10013 7ff618643170 3 API calls 10011->10013 10014 7ff6186502c1 memcpy 10012->10014 10013->10009 10016 7ff618643170 3 API calls 10014->10016 10017 7ff618643c70 20 API calls 10015->10017 10016->10009 10018 7ff618650232 10017->10018 10018->10018 10019 7ff6186500e8 10019->9994 10022 7ff618643c70 20 API calls 10020->10022 10020->10024 10021 7ff61864db70 20 API calls 10021->10024 10022->10020 10023 7ff618643c70 20 API calls 10023->10024 10024->10019 10024->10021 10024->10023 10026 7ff61865249f 10025->10026 10027 7ff6186524ac 10026->10027 10028 7ff618650460 34 API calls 10026->10028 10029 7ff618642ea0 16 API calls 10027->10029 10028->10027 10031 7ff6186524ba 10029->10031 10030 7ff618648e74 10030->9407 10030->9408 10031->10030 10032 7ff618643bd0 20 API calls 10031->10032 10032->10030 10036 7ff6186487ed 10033->10036 10034 7ff618648852 10042 7ff6186488a7 10034->10042 10069 7ff618645b50 10034->10069 10035 7ff618648c13 10088 7ff618645ac0 10035->10088 10036->10034 10036->10035 10039 7ff618643f10 36 API calls 10036->10039 10040 7ff618648834 10036->10040 10039->10040 10040->10034 10041 7ff618650240 20 API calls 10040->10041 10041->10034 10043 7ff618645b50 56 API calls 10042->10043 10049 7ff6186488f2 10042->10049 10046 7ff618648a65 10043->10046 10044 7ff618648992 10044->10042 10045 7ff618650240 20 API calls 10044->10045 10045->10042 10046->10035 10047 7ff618648a80 10046->10047 10046->10049 10048 7ff618650240 20 API calls 10047->10048 10047->10049 10048->10049 10049->9414 10049->9416 10051 7ff618643f10 36 API calls 10050->10051 10054 7ff618650318 10051->10054 10052 7ff618650414 10055 7ff618645ac0 56 API calls 10052->10055 10053 7ff61865034d 10053->10052 10056 7ff618650397 10053->10056 10054->10053 10057 7ff618650240 20 API calls 10054->10057 10058 7ff618650419 10055->10058 10059 7ff618643f10 36 API calls 10056->10059 10057->10053 10060 7ff61865039f 10059->10060 10061 7ff6186503e0 10060->10061 10062 7ff618650240 20 API calls 10060->10062 10061->9418 10063 7ff618650405 10062->10063 10063->9418 10065 7ff618641e51 fwrite fflush exit 10064->10065 10066 7ff618642010 VariantClear 10065->10066 10068 7ff618641ee4 10065->10068 10067 7ff6186fd088 10066->10067 10068->10066 10070 7ff618645b77 10069->10070 10071 7ff618645ba1 10070->10071 10072 7ff618645b8f 10070->10072 10073 7ff618645ac0 55 API calls 10071->10073 10074 7ff618643f10 36 API calls 10072->10074 10075 7ff618645ba6 10073->10075 10076 7ff618645b94 10074->10076 10077 7ff618645cb8 10075->10077 10080 7ff618645bcd 10075->10080 10076->10044 10079 7ff618645b50 55 API calls 10077->10079 10078 7ff618645be3 10078->10044 10079->10078 10080->10078 10081 7ff618645cd4 10080->10081 10082 7ff618645c55 10080->10082 10083 7ff618645ac0 55 API calls 10081->10083 10084 7ff618643f10 36 API calls 10082->10084 10085 7ff618645cd9 10083->10085 10086 7ff618645c5d memcpy 10084->10086 10086->10078 10095 7ff6186525f0 10088->10095 10092 7ff618645b00 10094 7ff618650240 20 API calls 10092->10094 10108 7ff618645a20 10092->10108 10094->10092 10096 7ff61865260f 10095->10096 10097 7ff618652620 10096->10097 10098 7ff618650460 34 API calls 10096->10098 10099 7ff618642ea0 16 API calls 10097->10099 10098->10097 10101 7ff61865262e 10099->10101 10100 7ff618645adc 10103 7ff618644270 10100->10103 10101->10100 10102 7ff618643bd0 20 API calls 10101->10102 10102->10100 10104 7ff618644287 10103->10104 10105 7ff618644280 10103->10105 10104->10092 10105->10104 10116 7ff618651ec0 10105->10116 10107 7ff6186442b8 memcpy 10107->10092 10109 7ff618645a39 10108->10109 10139 7ff618645bb0 10109->10139 10111 7ff618645a80 10151 7ff618645970 10111->10151 10115 7ff618650240 20 API calls 10115->10111 10117 7ff618651efb 10116->10117 10118 7ff618651f0c 10117->10118 10121 7ff618650460 34 API calls 10117->10121 10119 7ff618651fd8 10118->10119 10120 7ff618651f24 10118->10120 10124 7ff618651fee 10119->10124 10125 7ff618652140 10119->10125 10122 7ff618651f35 10120->10122 10123 7ff618652050 VirtualAlloc 10120->10123 10121->10118 10126 7ff6186429d0 15 API calls 10122->10126 10127 7ff618652073 10123->10127 10128 7ff6186521f8 10123->10128 10124->10128 10133 7ff618651f70 memset 10124->10133 10129 7ff6186429d0 15 API calls 10125->10129 10130 7ff618651f41 10126->10130 10127->10130 10131 7ff6186520ac 10127->10131 10132 7ff618642260 12 API calls 10128->10132 10129->10133 10137 7ff618642d60 12 API calls 10130->10137 10136 7ff618642290 12 API calls 10131->10136 10135 7ff618652215 10132->10135 10133->10107 10138 7ff6186521d6 10136->10138 10137->10133 10138->10107 10140 7ff618645cb8 10139->10140 10143 7ff618645bcd 10139->10143 10142 7ff618645b50 55 API calls 10140->10142 10141 7ff618645a4e 10141->10111 10141->10115 10142->10141 10143->10141 10144 7ff618645cd4 10143->10144 10145 7ff618645c55 10143->10145 10146 7ff618645ac0 55 API calls 10144->10146 10147 7ff618643f10 36 API calls 10145->10147 10148 7ff618645cd9 10146->10148 10149 7ff618645c5d memcpy 10147->10149 10149->10141 10152 7ff618645a0d 10151->10152 10157 7ff618645988 10151->10157 10167 7ff618645110 10152->10167 10154 7ff618645a12 exit 10156 7ff618645a20 10154->10156 10155 7ff6186459be 10158 7ff6186459f0 longjmp 10155->10158 10160 7ff618650240 20 API calls 10155->10160 10161 7ff618645bb0 54 API calls 10156->10161 10157->10155 10159 7ff618650240 20 API calls 10157->10159 10158->10152 10159->10155 10160->10158 10164 7ff618645a4e 10161->10164 10162 7ff618645a80 10163 7ff618645970 54 API calls 10162->10163 10165 7ff618645ab5 10163->10165 10164->10162 10166 7ff618650240 20 API calls 10164->10166 10166->10162 10168 7ff61864515b 10167->10168 10173 7ff618645166 10167->10173 10169 7ff618643f10 36 API calls 10168->10169 10168->10173 10202 7ff618645291 10169->10202 10170 7ff6186451f3 10171 7ff61864521b strlen 10170->10171 10172 7ff618645855 10170->10172 10177 7ff618645236 10170->10177 10176 7ff618645697 memcpy strlen 10171->10176 10171->10177 10172->10154 10173->10170 10174 7ff6186451e6 10173->10174 10175 7ff6186451ce memcpy 10173->10175 10174->10170 10178 7ff618645667 10174->10178 10175->10174 10176->10154 10177->10172 10206 7ff6186450a0 10177->10206 10178->10177 10179 7ff61864567c strlen 10178->10179 10179->10176 10179->10177 10180 7ff61864574d 10181 7ff6186442f0 36 API calls 10180->10181 10184 7ff618645791 10181->10184 10183 7ff61864570b 10186 7ff6186442f0 36 API calls 10183->10186 10187 7ff6186442f0 36 API calls 10184->10187 10186->10180 10188 7ff6186457d2 10187->10188 10231 7ff618644a80 10188->10231 10189 7ff6186456c0 10223 7ff618651d60 10189->10223 10192 7ff6186457f6 10193 7ff6186442f0 36 API calls 10192->10193 10193->10170 10195 7ff618650460 34 API calls 10195->10202 10196 7ff618645603 10196->10173 10199 7ff618645614 memcpy 10196->10199 10197 7ff618644540 36 API calls 10197->10202 10198 7ff618642ea0 16 API calls 10198->10202 10199->10173 10200 7ff6186454e2 memcpy 10200->10202 10201 7ff618650240 20 API calls 10201->10202 10202->10173 10202->10180 10202->10183 10202->10184 10202->10189 10202->10195 10202->10196 10202->10197 10202->10198 10202->10200 10202->10201 10203 7ff618642ea0 16 API calls 10202->10203 10210 7ff6186442f0 10202->10210 10204 7ff6186458eb memcpy 10203->10204 10205 7ff618643170 3 API calls 10204->10205 10205->10202 10207 7ff6186450d0 fwrite 10206->10207 10208 7ff6186450be 10206->10208 10208->10154 10211 7ff6186444e0 10210->10211 10216 7ff618644306 10210->10216 10212 7ff618651d60 35 API calls 10211->10212 10214 7ff6186444f8 10212->10214 10213 7ff61864449e 10213->10202 10214->10202 10215 7ff618644388 10217 7ff618642ea0 16 API calls 10215->10217 10216->10213 10216->10215 10218 7ff618650460 34 API calls 10216->10218 10220 7ff618644398 10217->10220 10218->10215 10221 7ff618644459 memcpy 10220->10221 10222 7ff618643bd0 20 API calls 10220->10222 10221->10213 10222->10221 10224 7ff618651d7a 10223->10224 10225 7ff618651d87 10224->10225 10226 7ff618650460 34 API calls 10224->10226 10227 7ff618642ea0 16 API calls 10225->10227 10226->10225 10229 7ff618651d94 10227->10229 10228 7ff618651dcd 10228->10183 10229->10228 10230 7ff618643bd0 20 API calls 10229->10230 10230->10228 10232 7ff618644e40 10231->10232 10235 7ff618644a99 10231->10235 10233 7ff6186447f0 38 API calls 10232->10233 10238 7ff618644e6f 10233->10238 10237 7ff618644d69 10235->10237 10241 7ff6186447f0 10235->10241 10236 7ff618650240 20 API calls 10240 7ff618644da7 10236->10240 10237->10236 10237->10240 10238->10237 10239 7ff618650240 20 API calls 10238->10239 10239->10237 10240->10192 10240->10240 10242 7ff618644a20 10241->10242 10246 7ff61864481b 10241->10246 10243 7ff618643f10 36 API calls 10242->10243 10244 7ff6186449cb 10243->10244 10244->10237 10245 7ff618644898 10247 7ff618642ea0 16 API calls 10245->10247 10246->10244 10246->10245 10248 7ff618650460 34 API calls 10246->10248 10251 7ff6186448a8 10247->10251 10248->10245 10249 7ff61864496e memcpy memset 10249->10244 10251->10249 10252 7ff618643bd0 20 API calls 10251->10252 10252->10249 10254 7ff61864be3a 10253->10254 10255 7ff61864bea0 10253->10255 10256 7ff61864b420 36 API calls 10254->10256 10255->9702 10257 7ff61864be4b 10256->10257 10258 7ff61864bb80 40 API calls 10257->10258 10259 7ff61864be58 10258->10259 10260 7ff61864be87 10259->10260 10261 7ff618650240 20 API calls 10259->10261 10260->9702 10261->10260 10263 7ff61864f40a 10262->10263 10264 7ff618643f10 36 API calls 10263->10264 10265 7ff61864cc35 10264->10265 10266 7ff61864e020 10265->10266 10267 7ff61864b420 36 API calls 10266->10267 10268 7ff61864e03e 10267->10268 10269 7ff61864bb80 40 API calls 10268->10269 10271 7ff61864e04b 10269->10271 10270 7ff61864b420 36 API calls 10270->10271 10271->10270 10272 7ff61864bb80 40 API calls 10271->10272 10273 7ff61864cc3d 10271->10273 10272->10271 10274 7ff61864e170 10273->10274 10275 7ff61864cc4f 10274->10275 10276 7ff61864e1a3 10274->10276 10275->9731 10276->10275 10277 7ff61864b420 36 API calls 10276->10277 10278 7ff61864e1e8 10277->10278 10279 7ff61864bb80 40 API calls 10278->10279 10280 7ff61864e1f5 10279->10280 10280->10275 10281 7ff61864b420 36 API calls 10280->10281 10282 7ff61864e20c 10281->10282 10283 7ff61864bb80 40 API calls 10282->10283 10284 7ff61864e219 10283->10284 10284->10275 10285 7ff61864b420 36 API calls 10284->10285 10286 7ff61864e2be 10285->10286 10287 7ff61864bb80 40 API calls 10286->10287 10288 7ff61864e2cb 10287->10288 10289 7ff61864e540 10288->10289 10299 7ff61864e301 10288->10299 10290 7ff61864bb80 40 API calls 10289->10290 10330 7ff61864e4ae 10290->10330 10291 7ff61864e4f1 10292 7ff61864bb80 40 API calls 10291->10292 10292->10275 10293 7ff61864bb80 40 API calls 10293->10275 10294 7ff61864b420 36 API calls 10294->10299 10295 7ff61864bb80 40 API calls 10295->10299 10296 7ff61864e39c strlen 10296->10299 10297 7ff61864e612 10298 7ff61864e3ed strlen 10298->10299 10299->10291 10299->10294 10299->10295 10299->10296 10299->10297 10299->10298 10300 7ff61864e415 10299->10300 10301 7ff61864e42e 10300->10301 10302 7ff61864e560 10300->10302 10304 7ff61864bb80 40 API calls 10301->10304 10303 7ff61864e583 10302->10303 10305 7ff61864bb80 40 API calls 10302->10305 10307 7ff61864bb80 40 API calls 10303->10307 10306 7ff61864e448 10304->10306 10305->10303 10308 7ff61864bb80 40 API calls 10306->10308 10309 7ff61864e59e 10307->10309 10310 7ff61864e459 10308->10310 10311 7ff61864bb80 40 API calls 10309->10311 10312 7ff61864bb80 40 API calls 10310->10312 10313 7ff61864e5af 10311->10313 10314 7ff61864e46a 10312->10314 10315 7ff61864bb80 40 API calls 10313->10315 10316 7ff61864bb80 40 API calls 10314->10316 10317 7ff61864e5c0 10315->10317 10318 7ff61864e47b 10316->10318 10319 7ff61864bb80 40 API calls 10317->10319 10320 7ff61864bb80 40 API calls 10318->10320 10321 7ff61864e5d1 10319->10321 10322 7ff61864e48c 10320->10322 10323 7ff61864bb80 40 API calls 10321->10323 10325 7ff61864bb80 40 API calls 10322->10325 10324 7ff61864e5e2 10323->10324 10327 7ff61864bb80 40 API calls 10324->10327 10326 7ff61864e49d 10325->10326 10328 7ff61864bb80 40 API calls 10326->10328 10329 7ff61864e5f3 10327->10329 10328->10330 10331 7ff61864bb80 40 API calls 10329->10331 10330->10293 10331->10330 10333 7ff618643f10 36 API calls 10332->10333 10334 7ff6186440b5 GetFileAttributesW 10333->10334 10334->9483 10336 7ff61864f71f 10335->10336 10337 7ff61864fbc8 10336->10337 10340 7ff618643f10 36 API calls 10336->10340 10338 7ff618645ac0 56 API calls 10337->10338 10339 7ff61864fbd5 10338->10339 10342 7ff618643f10 36 API calls 10339->10342 10351 7ff61864fc16 10339->10351 10341 7ff61864f74b 10340->10341 10343 7ff61864b420 36 API calls 10341->10343 10342->10351 10345 7ff61864f78c 10343->10345 10344 7ff61864fd48 10344->9442 10346 7ff61864bb80 40 API calls 10345->10346 10347 7ff61864f799 CreateFileA 10346->10347 10350 7ff61864f7fd 10347->10350 10349 7ff618644540 36 API calls 10349->10351 10352 7ff61864f82c ReadFile 10350->10352 10353 7ff61864fab5 10350->10353 10351->10344 10351->10349 10352->10337 10357 7ff61864f886 10352->10357 10353->9442 10354 7ff618643f10 36 API calls 10354->10357 10355 7ff61864bb80 40 API calls 10355->10357 10357->10354 10357->10355 10359 7ff61864f93f 10357->10359 10639 7ff61864f490 10357->10639 10358 7ff61864f9d5 strcmp 10358->10359 10359->10353 10359->10358 10361 7ff618648365 GetCommandLineW 10360->10361 10367 7ff6186483af 10360->10367 10362 7ff61864fbe0 37 API calls 10361->10362 10363 7ff618648378 10362->10363 10643 7ff618645ce0 10363->10643 10365 7ff618648380 10366 7ff618650240 20 API calls 10365->10366 10365->10367 10366->10367 10367->9550 10383 7ff6186483f0 10367->10383 10369 7ff61864668a MultiByteToWideChar 10368->10369 10371 7ff618643f10 36 API calls 10369->10371 10372 7ff618646700 MultiByteToWideChar 10371->10372 10372->9656 10374 7ff618652c08 10373->10374 10656 7ff618652af0 10374->10656 10378 7ff618652c3b 10380 7ff618641d71 10379->10380 10381 7ff618650240 20 API calls 10380->10381 10382 7ff618641d94 10380->10382 10381->10382 10382->9522 10384 7ff618648412 GetCommandLineW 10383->10384 10392 7ff61864842d 10383->10392 10385 7ff61864fbe0 37 API calls 10384->10385 10387 7ff618648425 10385->10387 10386 7ff6186484c0 10388 7ff6186525f0 35 API calls 10386->10388 10389 7ff618645ce0 58 API calls 10387->10389 10390 7ff6186484d3 10388->10390 10389->10392 10393 7ff618651ec0 36 API calls 10390->10393 10400 7ff618648585 10390->10400 10391 7ff618648485 10409 7ff61864d1f0 _setjmp 10391->10409 10392->10386 10392->10391 10395 7ff618650240 20 API calls 10392->10395 10394 7ff61864851d 10393->10394 10398 7ff618650240 20 API calls 10394->10398 10394->10400 10395->10392 10397 7ff618644a80 38 API calls 10397->10400 10398->10400 10399 7ff618645a20 56 API calls 10399->10400 10400->10397 10400->10399 10401 7ff61864876a 10400->10401 10402 7ff618643f10 36 API calls 10400->10402 10404 7ff618643f10 36 API calls 10400->10404 10407 7ff6186486a6 memcpy 10400->10407 10408 7ff618650240 20 API calls 10400->10408 10671 7ff618650420 10400->10671 10403 7ff618643f10 36 API calls 10401->10403 10402->10400 10405 7ff618648785 10403->10405 10406 7ff618648633 memcpy 10404->10406 10406->10400 10406->10407 10407->10400 10408->10400 10413 7ff61864d498 10409->10413 10423 7ff61864d23d 10409->10423 10410 7ff61864d350 10411 7ff6186525f0 35 API calls 10410->10411 10412 7ff61864d4fb 10410->10412 10414 7ff61864d36c 10411->10414 10412->9550 10413->10412 10415 7ff618650240 20 API calls 10413->10415 10416 7ff61864d558 10414->10416 10417 7ff618643f10 36 API calls 10414->10417 10415->10412 10418 7ff61864d3c5 10417->10418 10419 7ff61864d439 10418->10419 10420 7ff61864d403 memcpy 10418->10420 10422 7ff61864d463 10419->10422 10425 7ff618650240 20 API calls 10419->10425 10420->10419 10424 7ff618650420 20 API calls 10422->10424 10423->10410 10675 7ff618645ff0 10423->10675 10426 7ff61864d472 10424->10426 10425->10422 10427 7ff618645a20 56 API calls 10426->10427 10427->10413 10429 7ff61864d586 10428->10429 10430 7ff61864d5ac RtlAddVectoredExceptionHandler memset 10429->10430 10431 7ff61864d971 10429->10431 10433 7ff61864d5e8 CreateToolhelp32Snapshot 10430->10433 10432 7ff61864b420 36 API calls 10431->10432 10434 7ff61864d982 10432->10434 10439 7ff61864d63c 10433->10439 10440 7ff61864d658 Thread32First 10433->10440 10435 7ff61864bb80 40 API calls 10434->10435 10436 7ff61864d98f GetModuleHandleA 10435->10436 10465 7ff61864d9b7 10436->10465 10439->9665 10441 7ff61864dac8 10440->10441 10442 7ff61864d6a5 10440->10442 10443 7ff61864b420 36 API calls 10441->10443 10446 7ff61864d6db CloseHandle 10442->10446 10447 7ff61864d6b3 GetCurrentProcessId 10442->10447 10445 7ff61864dad9 10443->10445 10444 7ff61864b420 36 API calls 10444->10465 10448 7ff61864bb80 40 API calls 10445->10448 10450 7ff61864d6ec 10446->10450 10451 7ff61864d7b0 10446->10451 10447->10442 10452 7ff61864dae6 10448->10452 10449 7ff61864bb80 40 API calls 10449->10465 10454 7ff61864d702 OpenThread 10450->10454 10453 7ff61864b420 36 API calls 10451->10453 10460 7ff61864b420 36 API calls 10452->10460 10456 7ff61864d7c1 10453->10456 10454->10439 10457 7ff61864d71e GetThreadContext 10454->10457 10455 7ff61864d9fa GetProcAddress 10455->10465 10458 7ff61864bb80 40 API calls 10456->10458 10457->10439 10459 7ff61864d732 10457->10459 10462 7ff61864d7ce GetModuleHandleA 10458->10462 10467 7ff61864d793 CloseHandle 10459->10467 10468 7ff61864bb80 40 API calls 10459->10468 10461 7ff61864dafc 10460->10461 10463 7ff61864bb80 40 API calls 10461->10463 10471 7ff61864b420 36 API calls 10462->10471 10488 7ff61864d965 10463->10488 10464 7ff618646670 38 API calls 10470 7ff61864da98 RtlInitUnicodeString LdrLoadDll 10464->10470 10465->10444 10465->10449 10465->10455 10465->10464 10467->10451 10467->10454 10469 7ff61864d750 SetThreadContext 10468->10469 10469->10439 10472 7ff61864d786 10469->10472 10470->10465 10473 7ff61864d807 10471->10473 10474 7ff61864bb80 40 API calls 10472->10474 10475 7ff61864bb80 40 API calls 10473->10475 10474->10467 10479 7ff61864d814 10475->10479 10476 7ff618643f10 36 API calls 10476->10479 10477 7ff61864b420 36 API calls 10477->10479 10478 7ff61864bb80 40 API calls 10478->10479 10479->10452 10479->10476 10479->10477 10479->10478 10480 7ff61864f490 strstr 10479->10480 10481 7ff61864d8e1 10479->10481 10480->10479 10482 7ff61864b420 36 API calls 10481->10482 10483 7ff61864d904 10482->10483 10484 7ff61864bb80 40 API calls 10483->10484 10486 7ff61864d917 10484->10486 10485 7ff61864b420 36 API calls 10485->10486 10486->10485 10487 7ff61864bb80 40 API calls 10486->10487 10486->10488 10487->10486 10490 7ff6186469a3 10489->10490 10499 7ff618646a6e 10489->10499 10491 7ff618643f10 36 API calls 10490->10491 10495 7ff6186469d4 10491->10495 10492 7ff618643f10 36 API calls 10501 7ff618646abc 10492->10501 10493 7ff618643f10 36 API calls 10493->10501 10494 7ff61864833b 10496 7ff618645ac0 56 API calls 10494->10496 10495->10494 10497 7ff618646a5f 10495->10497 10495->10501 10502 7ff618646e72 10496->10502 10498 7ff618643f10 36 API calls 10497->10498 10498->10499 10499->10492 10499->10501 10500 7ff618645b50 56 API calls 10500->10501 10501->10493 10501->10500 10501->10502 10502->9665 10504 7ff61864a6fd 10503->10504 10505 7ff61864a3fd 10503->10505 10505->10504 10506 7ff618643f10 36 API calls 10505->10506 10507 7ff61864a449 10506->10507 10508 7ff618643f10 36 API calls 10507->10508 10509 7ff61864a474 10508->10509 10684 7ff618652790 10509->10684 10512 7ff6186442f0 36 API calls 10513 7ff61864a4a3 10512->10513 10514 7ff618643f10 36 API calls 10513->10514 10516 7ff61864a4d2 10514->10516 10515 7ff618652790 60 API calls 10515->10516 10516->10515 10517 7ff6186442f0 36 API calls 10516->10517 10518 7ff618651ec0 36 API calls 10516->10518 10519 7ff618650420 20 API calls 10516->10519 10521 7ff618650240 20 API calls 10516->10521 10522 7ff618645a20 56 API calls 10516->10522 10517->10516 10520 7ff61864a6d6 memcpy 10518->10520 10519->10516 10520->10516 10521->10516 10522->10516 10524 7ff61864e65c _setjmp 10523->10524 10525 7ff61864e7d0 10523->10525 10530 7ff61864e6b2 10524->10530 10526 7ff61864a3e0 61 API calls 10525->10526 10527 7ff61864e7e1 10526->10527 10527->10527 10529 7ff61864a3e0 61 API calls 10529->10530 10530->10529 10532 7ff61864e7b7 10530->10532 10722 7ff618646540 10530->10722 10727 7ff61864a740 10530->10727 10532->9665 10534 7ff61864a0ae 10533->10534 10535 7ff61864a09f CoInitialize 10533->10535 10536 7ff618652480 35 API calls 10534->10536 10535->10534 10537 7ff61864a0ba 10536->10537 10538 7ff61864a0cb 10537->10538 10539 7ff618650300 56 API calls 10537->10539 10540 7ff618650300 56 API calls 10538->10540 10546 7ff61864a0db 10538->10546 10545 7ff61864a1d5 10539->10545 10548 7ff61864a220 10540->10548 10541 7ff6186487d0 56 API calls 10542 7ff61864a0ec 10541->10542 10543 7ff61864a0ff MultiByteToWideChar 10542->10543 10544 7ff61864a290 10542->10544 10547 7ff618643f10 36 API calls 10543->10547 10545->10538 10550 7ff618650240 20 API calls 10545->10550 10546->10541 10549 7ff61864a172 MultiByteToWideChar SysAllocString 10547->10549 10548->10546 10551 7ff618650240 20 API calls 10548->10551 10549->9679 10550->10538 10551->10546 10553 7ff61864adea _setjmp 10552->10553 10554 7ff61864b000 10552->10554 10559 7ff61864ae5c 10553->10559 10567 7ff61864aeb0 10553->10567 10555 7ff61864a3e0 61 API calls 10554->10555 10556 7ff61864b031 10555->10556 10557 7ff61864a3e0 61 API calls 10556->10557 10557->10559 10558 7ff61864ae9f 10558->9679 10559->10558 10560 7ff618646540 51 API calls 10559->10560 10562 7ff61864b055 10560->10562 10561 7ff61864af76 10561->10556 10566 7ff61864a740 78 API calls 10561->10566 10837 7ff61864b080 10562->10837 10564 7ff61864b080 96 API calls 10564->10567 10566->10554 10567->10561 10567->10562 10567->10564 10568 7ff61864a3e0 61 API calls 10567->10568 10568->10567 10570 7ff618643f10 36 API calls 10569->10570 10572 7ff61864fc16 10570->10572 10571 7ff61864fd48 10571->9543 10572->10571 10573 7ff618644540 36 API calls 10572->10573 10573->10572 10575 7ff618652d2f 10574->10575 10586 7ff618652eb3 10574->10586 10576 7ff618653038 10575->10576 10577 7ff618652d5f 10575->10577 10578 7ff61864a3e0 61 API calls 10576->10578 10579 7ff618653046 10577->10579 10604 7ff618652d86 10577->10604 10578->10579 10584 7ff61864a3e0 61 API calls 10579->10584 10580 7ff618646540 51 API calls 10580->10586 10581 7ff618652f26 _setjmp 10583 7ff618653230 10581->10583 10581->10586 10582 7ff61864a3e0 61 API calls 10582->10581 10587 7ff618653267 10583->10587 10588 7ff61864a3e0 61 API calls 10583->10588 10584->10586 10585 7ff618652db6 _setjmp 10585->10604 10586->10580 10586->10581 10586->10582 10590 7ff61865301b 10586->10590 10589 7ff618646670 38 API calls 10587->10589 10588->10587 10593 7ff618653271 10589->10593 10590->9665 10591 7ff618652e19 _setjmp 10591->10604 10592 7ff618643f10 36 API calls 10592->10604 10594 7ff618643f10 36 API calls 10593->10594 10599 7ff618653346 10593->10599 10601 7ff61865360e 10593->10601 10595 7ff6186532e6 10594->10595 10596 7ff61865333c 10595->10596 10597 7ff61865331d memcpy 10595->10597 10600 7ff61864a3e0 61 API calls 10596->10600 10597->10596 10598 7ff61864a3e0 61 API calls 10598->10601 10602 7ff61864a3e0 61 API calls 10599->10602 10607 7ff6186533ac 10599->10607 10636 7ff6186535db 10599->10636 10600->10599 10601->9665 10602->10607 10604->10585 10604->10586 10604->10591 10604->10592 10604->10601 10605 7ff618653696 10604->10605 10606 7ff6186461c0 36 API calls 10604->10606 10998 7ff618646580 10604->10998 10611 7ff618650300 56 API calls 10605->10611 10606->10604 10608 7ff618653640 10607->10608 10610 7ff61865347f 10607->10610 10622 7ff618653410 10607->10622 10609 7ff61864a3e0 61 API calls 10608->10609 10612 7ff61865364e 10609->10612 10613 7ff618652480 35 API calls 10610->10613 10621 7ff6186536cd 10611->10621 10619 7ff61864a3e0 61 API calls 10612->10619 10614 7ff6186534d3 10613->10614 10614->10605 10616 7ff6186534e7 10614->10616 10615 7ff61865367e 10618 7ff61864a3e0 61 API calls 10615->10618 10617 7ff618653704 10616->10617 10620 7ff6186534fa 10616->10620 10624 7ff618650300 56 API calls 10617->10624 10618->10605 10623 7ff618653666 10619->10623 10625 7ff6186487d0 56 API calls 10620->10625 10621->10617 10626 7ff618650240 20 API calls 10621->10626 10622->10610 10622->10612 10622->10615 10622->10623 10627 7ff61864a3e0 61 API calls 10623->10627 10632 7ff61865371d 10624->10632 10628 7ff61865350b 10625->10628 10626->10617 10627->10615 10629 7ff61864adb0 92 API calls 10628->10629 10630 7ff618653555 10629->10630 10631 7ff61864adb0 92 API calls 10630->10631 10633 7ff618653581 10631->10633 10632->10601 10634 7ff618650240 20 API calls 10632->10634 10635 7ff61864adb0 92 API calls 10633->10635 10634->10601 10637 7ff6186535a9 10635->10637 10636->10598 10637->10636 10638 7ff618650240 20 API calls 10637->10638 10638->10636 10641 7ff61864f4a8 10639->10641 10642 7ff61864f4fc 10639->10642 10640 7ff61864f4e1 strstr 10640->10642 10641->10640 10641->10642 10642->10357 10647 7ff618645d10 10643->10647 10644 7ff618645e1a 10645 7ff618643f10 36 API calls 10644->10645 10646 7ff618645e2b 10645->10646 10646->10365 10647->10644 10648 7ff618645e61 10647->10648 10649 7ff618645bb0 56 API calls 10647->10649 10650 7ff618644540 36 API calls 10647->10650 10651 7ff618645f98 10647->10651 10653 7ff618652220 36 API calls 10647->10653 10655 7ff618650240 20 API calls 10647->10655 10648->10365 10649->10647 10650->10647 10652 7ff618651ec0 36 API calls 10651->10652 10654 7ff618645fb6 memcpy 10652->10654 10653->10647 10654->10648 10655->10647 10657 7ff618652b03 10656->10657 10658 7ff618652b80 10656->10658 10668 7ff61864db40 10657->10668 10659 7ff61864db40 fputc 10658->10659 10666 7ff618652b96 10659->10666 10661 7ff618652b4f fwrite 10661->10378 10662 7ff618652b36 fputc 10662->10661 10667 7ff618652b25 10662->10667 10663 7ff618652bad fputc 10663->10661 10663->10666 10664 7ff61864db40 fputc 10664->10666 10665 7ff61864db40 fputc 10665->10667 10666->10661 10666->10663 10666->10664 10667->10661 10667->10662 10667->10665 10669 7ff6186578a0 fputc 10668->10669 10670 7ff61864db64 10669->10670 10670->10667 10672 7ff618650446 10671->10672 10673 7ff618650430 10671->10673 10672->10400 10673->10672 10674 7ff618650240 20 API calls 10673->10674 10674->10672 10676 7ff6186525f0 35 API calls 10675->10676 10677 7ff61864600b 10676->10677 10678 7ff618651ec0 36 API calls 10677->10678 10680 7ff61864602d 10678->10680 10679 7ff618650420 20 API calls 10679->10680 10680->10679 10681 7ff618645bb0 56 API calls 10680->10681 10682 7ff618645970 56 API calls 10680->10682 10683 7ff618650240 20 API calls 10680->10683 10681->10680 10682->10680 10683->10680 10686 7ff6186527e9 10684->10686 10685 7ff618652953 10688 7ff618652968 10685->10688 10691 7ff618646370 36 API calls 10685->10691 10686->10685 10687 7ff6186525f0 35 API calls 10686->10687 10689 7ff61865282f 10687->10689 10712 7ff6186461c0 10688->10712 10692 7ff618643f10 36 API calls 10689->10692 10691->10688 10694 7ff618652854 10692->10694 10693 7ff618652973 10695 7ff61865297b 10693->10695 10696 7ff6186529d0 10693->10696 10697 7ff618643f10 36 API calls 10694->10697 10698 7ff6186442f0 36 API calls 10695->10698 10699 7ff6186442f0 36 API calls 10696->10699 10700 7ff618652885 memcpy 10697->10700 10701 7ff618652986 10698->10701 10699->10701 10702 7ff618652924 10700->10702 10703 7ff618652909 10700->10703 10705 7ff61864a494 10701->10705 10707 7ff618652995 10701->10707 10711 7ff618650240 20 API calls 10701->10711 10704 7ff618650420 20 API calls 10702->10704 10703->10702 10706 7ff618650240 20 API calls 10703->10706 10708 7ff618652931 10704->10708 10705->10512 10706->10702 10707->10705 10709 7ff618652998 memcpy 10707->10709 10710 7ff618645a20 56 API calls 10708->10710 10709->10705 10710->10685 10711->10707 10713 7ff6186461d8 10712->10713 10715 7ff6186461d1 10712->10715 10713->10693 10714 7ff618646229 10716 7ff618642ea0 16 API calls 10714->10716 10715->10713 10715->10714 10717 7ff618650460 34 API calls 10715->10717 10720 7ff618646239 10716->10720 10717->10714 10718 7ff6186462f6 memcpy 10718->10693 10720->10718 10721 7ff618643bd0 20 API calls 10720->10721 10721->10718 10723 7ff618646550 longjmp 10722->10723 10724 7ff61864655f 10722->10724 10723->10724 10725 7ff618645110 49 API calls 10724->10725 10726 7ff61864656b exit 10725->10726 10728 7ff618646670 38 API calls 10727->10728 10729 7ff61864a77c SysAllocString _setjmp 10728->10729 10730 7ff61864a7ef 10729->10730 10731 7ff61864a906 SysFreeString 10729->10731 10733 7ff61864aa35 10730->10733 10740 7ff61864a88f 10730->10740 10741 7ff61864a970 10730->10741 10734 7ff61864a95b 10731->10734 10735 7ff61864aa2e 10731->10735 10736 7ff61864aa50 10733->10736 10737 7ff61864aa41 CoInitialize 10733->10737 10734->10530 10738 7ff618646540 51 API calls 10735->10738 10739 7ff618652480 35 API calls 10736->10739 10737->10736 10738->10733 10742 7ff61864aa5c 10739->10742 10744 7ff61864a8c8 10740->10744 10745 7ff61864a8b9 CoInitialize 10740->10745 10743 7ff618643f10 36 API calls 10741->10743 10746 7ff61864abf1 10742->10746 10747 7ff61864aced 10742->10747 10751 7ff6186487d0 56 API calls 10742->10751 10748 7ff61864a9aa memcpy 10743->10748 10749 7ff618652480 35 API calls 10744->10749 10745->10744 10750 7ff618650300 56 API calls 10746->10750 10753 7ff618650300 56 API calls 10747->10753 10752 7ff61864a3e0 61 API calls 10748->10752 10754 7ff61864a8d4 10749->10754 10761 7ff61864ac02 10750->10761 10755 7ff61864aa8e SafeArrayCreate 10751->10755 10752->10735 10770 7ff61864acf2 10753->10770 10756 7ff61864ab0e 10754->10756 10760 7ff61864aba9 10754->10760 10766 7ff6186487d0 56 API calls 10754->10766 10757 7ff61864ac36 10755->10757 10758 7ff61864aadf 10755->10758 10759 7ff618650300 56 API calls 10756->10759 10764 7ff6186525f0 35 API calls 10757->10764 10763 7ff61864aae0 SafeArrayPutElement 10758->10763 10774 7ff61864ab75 10759->10774 10762 7ff618650300 56 API calls 10760->10762 10761->10757 10767 7ff618650240 20 API calls 10761->10767 10768 7ff61864abbd 10762->10768 10763->10756 10763->10763 10769 7ff61864ac4e 10764->10769 10765 7ff61864ad26 10766->10731 10767->10757 10768->10746 10777 7ff618650240 20 API calls 10768->10777 10784 7ff618649280 10769->10784 10770->10765 10772 7ff618650240 20 API calls 10770->10772 10772->10765 10773 7ff61864ac77 10811 7ff618648fd0 10773->10811 10774->10760 10776 7ff618650240 20 API calls 10774->10776 10776->10760 10777->10746 10778 7ff61864acb8 10779 7ff618650420 20 API calls 10778->10779 10782 7ff61864acc7 10779->10782 10780 7ff61864ac86 10780->10778 10781 7ff618650240 20 API calls 10780->10781 10781->10778 10783 7ff618645a20 56 API calls 10782->10783 10783->10747 10785 7ff61864929a 10784->10785 10793 7ff6186492dc 10784->10793 10786 7ff6186492a6 10785->10786 10788 7ff618651d60 35 API calls 10785->10788 10787 7ff6186492af 10786->10787 10792 7ff6186442f0 36 API calls 10786->10792 10790 7ff6186492b8 10787->10790 10791 7ff6186493ce 10787->10791 10788->10786 10789 7ff618643f10 36 API calls 10789->10793 10790->10793 10795 7ff618649437 10790->10795 10796 7ff6186492c5 10790->10796 10794 7ff6186442f0 36 API calls 10791->10794 10792->10787 10793->10789 10797 7ff6186495d0 10793->10797 10799 7ff6186442f0 36 API calls 10793->10799 10801 7ff6186461c0 36 API calls 10793->10801 10806 7ff618649349 10793->10806 10794->10795 10798 7ff618644a80 38 API calls 10795->10798 10800 7ff6186442f0 36 API calls 10796->10800 10802 7ff6186461c0 36 API calls 10797->10802 10803 7ff618649478 10798->10803 10804 7ff618649511 memcpy 10799->10804 10800->10793 10801->10793 10805 7ff6186495dc 10802->10805 10803->10793 10807 7ff618643f10 36 API calls 10803->10807 10804->10793 10808 7ff6186442f0 36 API calls 10806->10808 10809 7ff6186494aa memcpy 10807->10809 10810 7ff618649354 memcpy 10808->10810 10809->10793 10810->10773 10812 7ff618648fe5 10811->10812 10813 7ff618648ff1 10811->10813 10812->10813 10814 7ff6186490f0 10812->10814 10815 7ff618648ffa 10813->10815 10816 7ff6186491e8 10813->10816 10818 7ff6186490f7 10814->10818 10819 7ff618649170 10814->10819 10820 7ff618646370 36 API calls 10815->10820 10828 7ff618649008 10815->10828 10817 7ff618643f10 36 API calls 10816->10817 10836 7ff618649203 10817->10836 10821 7ff618649100 10818->10821 10818->10828 10822 7ff618646370 36 API calls 10819->10822 10820->10828 10823 7ff618643f10 36 API calls 10821->10823 10824 7ff618649178 10822->10824 10825 7ff61864912a 10823->10825 10827 7ff618649184 10824->10827 10824->10828 10834 7ff61864909a memcpy 10825->10834 10826 7ff618643f10 36 API calls 10829 7ff61864902f memcpy 10826->10829 10830 7ff61864918d 10827->10830 10831 7ff618649248 10827->10831 10828->10826 10829->10834 10835 7ff6186490b8 10829->10835 10832 7ff618643f10 36 API calls 10830->10832 10833 7ff618643f10 36 API calls 10831->10833 10832->10825 10833->10836 10834->10835 10835->10780 10836->10780 10845 7ff61864b09d 10837->10845 10838 7ff618652ca0 95 API calls 10838->10845 10840 7ff61864e630 79 API calls 10840->10845 10841 7ff61864a080 60 API calls 10841->10845 10842 7ff61864b104 10846 7ff61864b158 10842->10846 10847 7ff61864b149 CoInitialize 10842->10847 10843 7ff61864adb0 95 API calls 10843->10845 10844 7ff61864a3e0 61 API calls 10844->10845 10845->10838 10845->10840 10845->10841 10845->10842 10845->10843 10845->10844 10848 7ff618650240 20 API calls 10845->10848 10861 7ff6186539a0 10845->10861 10849 7ff618652480 35 API calls 10846->10849 10847->10846 10848->10845 10856 7ff61864b164 10849->10856 10850 7ff618650300 56 API calls 10850->10856 10851 7ff6186487d0 56 API calls 10852 7ff61864b196 VariantCopy 10851->10852 10853 7ff61864b062 10852->10853 10852->10856 10854 7ff6186525f0 35 API calls 10854->10856 10855 7ff618649280 43 API calls 10855->10856 10856->10850 10856->10851 10856->10854 10856->10855 10857 7ff618648fd0 39 API calls 10856->10857 10858 7ff618650420 20 API calls 10856->10858 10859 7ff618650240 20 API calls 10856->10859 10860 7ff618645a20 56 API calls 10856->10860 10857->10856 10858->10856 10859->10856 10860->10856 10942 7ff6186537a0 10861->10942 10864 7ff618653ea8 10867 7ff61864a3e0 61 API calls 10864->10867 10865 7ff6186539c4 10866 7ff61864a080 60 API calls 10865->10866 10868 7ff618653a33 10866->10868 10869 7ff618653eb9 10867->10869 10965 7ff61864a2a0 10868->10965 10872 7ff6186525f0 35 API calls 10869->10872 10874 7ff618653ed3 10872->10874 10873 7ff61864adb0 97 API calls 10875 7ff618653a99 10873->10875 10876 7ff618649280 43 API calls 10874->10876 10878 7ff618652480 35 API calls 10875->10878 10877 7ff618653ef8 10876->10877 10879 7ff618648fd0 39 API calls 10877->10879 10880 7ff618653ac4 10878->10880 10906 7ff618653f07 10879->10906 10882 7ff6186487d0 56 API calls 10880->10882 10898 7ff618654083 10880->10898 10881 7ff618650300 56 API calls 10881->10898 10883 7ff618653afc 10882->10883 10886 7ff618654031 10883->10886 10888 7ff61864a080 60 API calls 10883->10888 10884 7ff618650420 20 API calls 10884->10906 10885 7ff618645a20 56 API calls 10885->10906 10889 7ff6186525f0 35 API calls 10886->10889 10887 7ff618650240 20 API calls 10887->10898 10890 7ff618653b4e 10888->10890 10891 7ff618654053 10889->10891 10894 7ff61864a080 60 API calls 10890->10894 10892 7ff618649280 43 API calls 10891->10892 10893 7ff618654074 10892->10893 10895 7ff618648fd0 39 API calls 10893->10895 10903 7ff618653b78 10894->10903 10895->10898 10896 7ff618650420 20 API calls 10896->10898 10897 7ff618650240 20 API calls 10897->10906 10898->10881 10898->10887 10898->10896 10901 7ff618645a20 56 API calls 10898->10901 10899 7ff618650300 56 API calls 10899->10906 10900 7ff61865400b 10902 7ff61864a3e0 61 API calls 10900->10902 10901->10898 10902->10886 10903->10900 10904 7ff618652480 35 API calls 10903->10904 10905 7ff618653bb7 10904->10905 10905->10906 10907 7ff6186487d0 56 API calls 10905->10907 10906->10884 10906->10885 10906->10897 10906->10899 10906->10900 10908 7ff618653bef 10907->10908 10908->10869 10909 7ff618653c33 10908->10909 10910 7ff61864a080 60 API calls 10909->10910 10911 7ff618653ca5 10910->10911 10912 7ff61864a2a0 57 API calls 10911->10912 10913 7ff618653cb4 10912->10913 10914 7ff61864adb0 97 API calls 10913->10914 10915 7ff618653d0e 10914->10915 10916 7ff61864a080 60 API calls 10915->10916 10917 7ff618653d21 10916->10917 10918 7ff61864adb0 97 API calls 10917->10918 10919 7ff618653d49 10918->10919 10920 7ff61864a2a0 57 API calls 10919->10920 10921 7ff618653d5c 10920->10921 10922 7ff61864adb0 97 API calls 10921->10922 10923 7ff618653d84 10922->10923 10924 7ff618643f10 36 API calls 10923->10924 10925 7ff618653d9e 10924->10925 10926 7ff61864a2a0 57 API calls 10925->10926 10927 7ff618653db0 10926->10927 10928 7ff61864adb0 97 API calls 10927->10928 10929 7ff618653dd8 10928->10929 10930 7ff61864a080 60 API calls 10929->10930 10931 7ff618653de8 10930->10931 10932 7ff61864adb0 97 API calls 10931->10932 10933 7ff618653e10 10932->10933 10934 7ff61864a2a0 57 API calls 10933->10934 10935 7ff618653e20 10934->10935 10936 7ff61864adb0 97 API calls 10935->10936 10937 7ff618653e46 10936->10937 10938 7ff61864a080 60 API calls 10937->10938 10939 7ff618653e66 10938->10939 10940 7ff61864adb0 97 API calls 10939->10940 10941 7ff618653e91 10940->10941 10941->10845 10943 7ff6186537c3 _setjmp 10942->10943 10944 7ff618653990 10942->10944 10947 7ff6186537f6 10943->10947 10950 7ff618653880 10943->10950 10945 7ff618652ca0 96 API calls 10944->10945 10946 7ff618653995 10945->10946 10946->10946 10948 7ff61865381a 10947->10948 10951 7ff61864a3e0 61 API calls 10947->10951 10952 7ff61864a080 60 API calls 10948->10952 10949 7ff618653848 10963 7ff618653869 10949->10963 10980 7ff618644f70 10949->10980 10950->10949 10954 7ff6186538ef 10950->10954 10955 7ff61864a3e0 61 API calls 10950->10955 10951->10948 10957 7ff61865382f 10952->10957 10956 7ff61864a080 60 API calls 10954->10956 10955->10954 10959 7ff618653904 10956->10959 10960 7ff61864e630 79 API calls 10957->10960 10961 7ff61864e630 79 API calls 10959->10961 10960->10949 10962 7ff61865391d 10961->10962 10962->10949 10964 7ff618650240 20 API calls 10962->10964 10963->10864 10963->10865 10964->10949 10966 7ff61864a2c3 10965->10966 10967 7ff61864a2b4 CoInitialize 10965->10967 10968 7ff618652480 35 API calls 10966->10968 10967->10966 10969 7ff61864a2cf 10968->10969 10970 7ff61864a2dc 10969->10970 10971 7ff618650300 56 API calls 10969->10971 10973 7ff618650300 56 API calls 10970->10973 10976 7ff61864a2e8 10970->10976 10975 7ff61864a325 10971->10975 10972 7ff6186487d0 56 API calls 10974 7ff61864a2fc 10972->10974 10977 7ff61864a36c 10973->10977 10974->10873 10975->10970 10978 7ff618650240 20 API calls 10975->10978 10976->10972 10977->10976 10979 7ff618650240 20 API calls 10977->10979 10978->10970 10979->10976 10981 7ff61864501f 10980->10981 10983 7ff618644f89 10980->10983 10984 7ff6186525f0 35 API calls 10981->10984 10982 7ff61864500d 10987 7ff618645110 49 API calls 10982->10987 10983->10982 10986 7ff618644fbe 10983->10986 10992 7ff618650240 20 API calls 10983->10992 10985 7ff618645032 10984->10985 10988 7ff618644270 37 API calls 10985->10988 10989 7ff618644ff0 longjmp 10986->10989 10994 7ff618650240 20 API calls 10986->10994 10990 7ff618645015 exit 10987->10990 10991 7ff618645056 10988->10991 10989->10982 10990->10981 10993 7ff61864507b 10991->10993 10996 7ff618650240 20 API calls 10991->10996 10992->10986 10995 7ff618645a20 56 API calls 10993->10995 10994->10989 10997 7ff61864509d 10995->10997 10996->10993 10999 7ff61864659e WideCharToMultiByte 10998->10999 11001 7ff618646648 10998->11001 11000 7ff618643f10 36 API calls 10999->11000 11002 7ff618646601 WideCharToMultiByte 11000->11002 11001->10604 11002->11001
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitmemcpy$ByteCharHeapMultiProcessSleepWide$CountTickVersion
                              • String ID: ,$6U$,{lW$CloseHandle$CreateFileA$GetComputerNameExA$GetCurrentProcessId$GetCurrentThreadId$GetDiskFreeSpaceExA$GetFileSize$GetModuleHandleA$GetProcAddress$GetProcessHeap$GetThreadContext$GetTickCount$GlobalMemoryStatusEx$LdrLoadDll$MultiByteToWideChar$OpenProcess$OpenThread$ReadFile$RtlAddVectoredExceptionHandler$RtlAllocateHeap$RtlInitUnicodeString$SetThreadContext$Sleep$VariantConversionError$VirtualProtect$WaitForSingleObject$com.nim$p$toVariant
                              • API String ID: 4036915570-2294705820
                              • Opcode ID: 9ad1a70c879cd67fce42ef66dbeb6a700c76d28bf200cf5e95a7a85a14cfdae9
                              • Instruction ID: 9c0f3513cb83aa3e4ee680be0ef3a9bae2c8db332dd3c05c8bb51f1e506becd4
                              • Opcode Fuzzy Hash: 9ad1a70c879cd67fce42ef66dbeb6a700c76d28bf200cf5e95a7a85a14cfdae9
                              • Instruction Fuzzy Hash: 56435B61A09F8681EB10DB25E8683BD63A1FF84FA0F444535DA5D8779ADF3CE504E388

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1245 7ff618641154-7ff618641193 call 7ff61865cfd0 1248 7ff6186411a8-7ff6186411d5 1245->1248 1249 7ff618641195-7ff61864119f 1245->1249 1250 7ff6186411f8-7ff61864122d 1248->1250 1249->1248 1251 7ff6186411d7-7ff6186411df 1250->1251 1252 7ff61864122f-7ff61864123b 1250->1252 1253 7ff6186411ea-7ff6186411ef 1251->1253 1254 7ff6186411e1-7ff6186411e8 1251->1254 1255 7ff618641249-7ff618641254 1252->1255 1256 7ff61864123d-7ff618641247 _amsg_exit 1252->1256 1253->1250 1254->1252 1258 7ff618641256-7ff61864127c _initterm 1255->1258 1259 7ff61864127e 1255->1259 1257 7ff618641288-7ff618641294 1256->1257 1260 7ff618641296-7ff6186412b6 _initterm 1257->1260 1261 7ff6186412bc-7ff6186412c0 1257->1261 1258->1257 1259->1257 1260->1261 1262 7ff6186412e1-7ff6186412ee 1261->1262 1263 7ff6186412c2-7ff6186412e0 1261->1263 1264 7ff61864130c-7ff618641364 call 7ff618656d3d call 7ff61865d760 call 7ff6186565d0 call 7ff61865d8c0 1262->1264 1265 7ff6186412f0-7ff618641305 1262->1265 1263->1262 1275 7ff618641366 1264->1275 1276 7ff6186413cc-7ff6186413d7 1264->1276 1265->1264 1279 7ff618641385-7ff61864138e 1275->1279 1277 7ff6186413d9-7ff6186413e4 1276->1277 1278 7ff6186413fa-7ff618641440 call 7ff618641591 call 7ff618656347 call 7ff61865d9e0 1276->1278 1282 7ff6186413e6-7ff6186413ed 1277->1282 1283 7ff6186413ef 1277->1283 1298 7ff618641445-7ff618641453 1278->1298 1280 7ff618641368-7ff618641371 1279->1280 1281 7ff618641390-7ff618641399 1279->1281 1288 7ff618641380 1280->1288 1289 7ff618641373-7ff61864137d 1280->1289 1285 7ff6186413a8-7ff6186413b1 1281->1285 1286 7ff61864139b-7ff61864139f 1281->1286 1287 7ff6186413f4 1282->1287 1283->1287 1292 7ff6186413be-7ff6186413c9 1285->1292 1293 7ff6186413b3-7ff6186413bc 1285->1293 1286->1280 1291 7ff6186413a1 1286->1291 1287->1278 1288->1279 1289->1288 1291->1285 1292->1276 1293->1292 1296 7ff6186413a3 1293->1296 1296->1285 1299 7ff618641455-7ff61864145d exit 1298->1299 1300 7ff618641462-7ff61864146a 1298->1300 1299->1300 1301 7ff61864146c _cexit 1300->1301 1302 7ff618641471-7ff61864147f 1300->1302 1301->1302
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _initterm$_amsg_exit_cexitexit
                              • String ID: 0
                              • API String ID: 602970348-4108050209
                              • Opcode ID: cd5f1854cfde108e582b60295d62e3ec039059220d8d68b3024adf7ac3627926
                              • Instruction ID: b0f595149582cd307fd3e98c512ac78ff56565fd87b2458c0bdf45a073660d42
                              • Opcode Fuzzy Hash: cd5f1854cfde108e582b60295d62e3ec039059220d8d68b3024adf7ac3627926
                              • Instruction Fuzzy Hash: 3CA1D225B08F0689EB50CB76E89036C37A1AB44FA8F404075DE4DD77A5DE3CE581A798

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1354 7ff61864f6d0-7ff61864f71d 1355 7ff61864f729-7ff61864f72d 1354->1355 1356 7ff61864f71f-7ff61864f726 1354->1356 1357 7ff61864f733-7ff61864f736 1355->1357 1358 7ff61864fbd0-7ff61864fc0d call 7ff618645ac0 1355->1358 1356->1355 1357->1358 1360 7ff61864f73c-7ff61864f7a4 call 7ff618643f10 call 7ff61864b420 call 7ff61864bb80 1357->1360 1364 7ff61864fc16-7ff61864fc2a 1358->1364 1365 7ff61864fc11 call 7ff618643f10 1358->1365 1380 7ff61864f7bc-7ff61864f80c CreateFileA 1360->1380 1381 7ff61864f7a6-7ff61864f7b9 1360->1381 1367 7ff61864fd48-7ff61864fd57 1364->1367 1368 7ff61864fc30-7ff61864fc33 1364->1368 1365->1364 1370 7ff61864fce0-7ff61864fcf8 1368->1370 1372 7ff61864fcfe-7ff61864fd08 1370->1372 1373 7ff61864fc40-7ff61864fc4d 1370->1373 1375 7ff61864fd0a-7ff61864fd16 1372->1375 1376 7ff61864fd60-7ff61864fd67 1372->1376 1373->1375 1377 7ff61864fc53-7ff61864fc5a 1373->1377 1382 7ff61864fd1c-7ff61864fd46 call 7ff618644540 * 3 1375->1382 1378 7ff61864fd7c-7ff61864fd89 1376->1378 1379 7ff61864fd69-7ff61864fd77 call 7ff618644540 1376->1379 1377->1375 1383 7ff61864fc60-7ff61864fcd5 call 7ff618644540 * 4 1377->1383 1385 7ff61864fd8b-7ff61864fdad call 7ff618644540 * 2 1378->1385 1386 7ff61864fdb2-7ff61864fdda 1378->1386 1394 7ff61864fcd8-7ff61864fcde 1379->1394 1396 7ff61864f812-7ff61864f880 ReadFile 1380->1396 1397 7ff61864fab5-7ff61864facf 1380->1397 1381->1380 1382->1367 1382->1370 1383->1394 1385->1394 1386->1382 1394->1367 1394->1370 1414 7ff61864f886-7ff61864f8a1 1396->1414 1415 7ff61864fbc8 1396->1415 1417 7ff61864fae0-7ff61864fafb 1397->1417 1416 7ff61864f8af-7ff61864f939 call 7ff618643f10 call 7ff61864bb80 call 7ff61864f490 1414->1416 1415->1358 1424 7ff61864f8a8-7ff61864f8ab 1416->1424 1425 7ff61864f93f-7ff61864f982 1416->1425 1424->1416 1425->1417 1426 7ff61864f988-7ff61864f9ca 1425->1426 1427 7ff61864f9fe-7ff61864fa13 1426->1427 1428 7ff61864fa15-7ff61864fa38 1427->1428 1429 7ff61864f9d0-7ff61864f9d3 1427->1429 1432 7ff61864fa3a-7ff61864fa45 1428->1432 1433 7ff61864fa49-7ff61864fa92 1428->1433 1430 7ff61864f9d5-7ff61864f9df strcmp 1429->1430 1431 7ff61864f9e1-7ff61864f9ed 1429->1431 1430->1428 1430->1431 1431->1417 1434 7ff61864f9f3-7ff61864f9fb 1431->1434 1432->1433 1437 7ff61864faa6-7ff61864faa9 1433->1437 1434->1427 1438 7ff61864faab-7ff61864faaf 1437->1438 1439 7ff61864fa98-7ff61864faa4 1437->1439 1438->1439 1441 7ff61864fab1-7ff61864fab3 1438->1441 1439->1437 1440 7ff61864fafc-7ff61864fafe 1439->1440 1442 7ff61864fb00-7ff61864fb63 1440->1442 1441->1442 1443 7ff61864fba6-7ff61864fba8 1442->1443 1444 7ff61864fb65-7ff61864fba1 1442->1444 1445 7ff61864fbb0-7ff61864fbc1 1443->1445 1444->1431 1445->1445 1446 7ff61864fbc3 1445->1446 1446->1431
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: File$CreateRead
                              • String ID:
                              • API String ID: 3388366904-0
                              • Opcode ID: fc99f619782d6e03273b2cb175ca60a22b8bb7caf5abc2e4a8bdbafcafb082da
                              • Instruction ID: 1e9692be2bc0d9b73ca08cb50a414dc457c8ff36398d15aa65f8ae88bf74ab1d
                              • Opcode Fuzzy Hash: fc99f619782d6e03273b2cb175ca60a22b8bb7caf5abc2e4a8bdbafcafb082da
                              • Instruction Fuzzy Hash: 6BF1EF22A09AC185EB11CF3AA8543BE7BA1FB85F94F458036DE8D83795DE3CD145E350

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 7ff61865d9e0-7ff61865e83f call 7ff618656347 call 7ff618642020 5 7ff61865e845-7ff61865ee79 call 7ff6186420f0 * 2 call 7ff6186417f0 0->5 6 7ff61866222f-7ff618662236 call 7ff618642050 0->6 20 7ff6186622bb-7ff6186622c0 call 7ff618641df0 5->20 21 7ff61865ee7f-7ff61865f1bf call 7ff6186417f0 call 7ff61864fde0 * 5 call 7ff61865cfc8 signal * 4 call 7ff618642020 5->21 9 7ff61866223b-7ff618662242 call 7ff618642050 6->9 14 7ff618662247-7ff61866224e call 7ff618642050 9->14 17 7ff618662253-7ff61866225a call 7ff618642050 14->17 22 7ff61866225f-7ff618662266 call 7ff618642050 17->22 21->9 56 7ff61865f1c5-7ff61865f1f1 call 7ff6186420f0 call 7ff618642020 21->56 28 7ff61866226b-7ff618662272 call 7ff618642050 22->28 32 7ff618662277-7ff61866227e call 7ff618642050 28->32 36 7ff618662283-7ff61866228a call 7ff618642050 32->36 40 7ff61866228f-7ff618662296 call 7ff618642050 36->40 44 7ff61866229b-7ff6186622a2 call 7ff618642050 40->44 49 7ff6186622a7-7ff6186622aa call 7ff618642050 44->49 52 7ff6186622af-7ff6186622b6 call 7ff618642050 49->52 52->20 56->14 61 7ff61865f1f7-7ff61865f223 call 7ff6186420f0 call 7ff618642020 56->61 66 7ff61865f229-7ff61865f289 call 7ff6186420f0 * 3 call 7ff618642020 61->66 67 7ff618662223-7ff61866222a call 7ff618642050 61->67 66->17 77 7ff61865f28f-7ff61865f3f3 call 7ff6186420f0 * 13 call 7ff618642020 66->77 67->6 77->22 106 7ff61865f3f9-7ff61865f52c call 7ff6186420f0 * 2 call 7ff618642020 77->106 106->28 113 7ff61865f532-7ff61866192e call 7ff6186420f0 * 2 call 7ff618642020 106->113 113->36 120 7ff618661934-7ff61866197a call 7ff6186420f0 * 2 call 7ff618642020 113->120 120->32 127 7ff618661980-7ff618661a2e call 7ff6186420f0 * 6 call 7ff618642020 120->127 127->40 142 7ff618661a34-7ff618661a60 call 7ff6186420f0 call 7ff618642020 127->142 142->44 147 7ff618661a66-7ff61866211f call 7ff6186420f0 * 3 call 7ff61864bb80 call 7ff618642020 142->147 147->49 158 7ff618662125-7ff618662151 call 7ff6186420f0 call 7ff618642020 147->158 158->52 163 7ff618662157-7ff6186621b2 call 7ff6186420f0 * 2 call 7ff618648c30 call 7ff6186417f0 call 7ff61864c240 158->163 171 7ff6186621b4-7ff618662222 163->171
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: signal$memcpy$AddressProcexit
                              • String ID: :state$AddRef$CLRCreateInstance$CoInitialize$CreateProcessW$CreateToolhelp32Snapshot$DispGetIDsOfNames$Field0$Field1$Field2$GetCommandLineW$GetCurrentProcess$GetCurrentThread$GetField$GetFieldNames$GetFieldNoCopy$GetFileAttributesW$GetForegroundWindow$GetGuid$GetIDsOfNames$GetModuleFileNameW$GetName$GetProcAddress$GetProcessHeap$GetSize$GetThreadContext$GetTypeInfo$GetTypeInfoCount$GetWindowThreadProcessId$HeapAlloc$HeapCreate$Hi32$InitializeProcThreadAttributeList$Invoke$IsEqualGUID$IsMatchingType$Lo32$Lo64$LoadLibraryA$Mid32$MultiByteToWideChar$NtFlushInstructionCache4$OpenProcess$PutField$PutFieldNoCopy$QueryInterface$RecordClear$RecordCopy$RecordCreate$RecordCreateCopy$RecordDestroy$RecordInit$Release$ResumeThread$RtlGetVersion$SafeArrayCreate$SafeArrayPutElement$SetConsoleCP$SetConsoleOutputCP$SysAllocString$SysFreeString$SysStringLen$Thread32First$Thread32Next$UpdateProcThreadAttribute$VariantClear$VariantCopy$WaitForSingleObject$WideCharToMultiByte$bCryptGenRandom$bVal$boolVal$bstrVal$byref$cDims$cElements$cLocks$cVal$cbElements$cipher$coresCount$counter$cyVal$data$date$dblVal$dctx6$decVal$fFeatures$filename$fltVal$hIntel$hresult$iVal$int64$intVal$key5$lLbound$lVal$line$llVal$lpVtbl$lstrlenW$msg$name$pRecInfo$parent$parray$pbVal$pboolVal$pbstrVal$pcVal$pcyVal$pdate$pdblVal$pdecVal$pdispVal$pfltVal$piVal$pintVal$plVal$pllVal$pparray$ppdispVal$ppunkVal$procname$pscode$puiVal$puintVal$pulVal$pullVal$punkVal$pvData$pvRecord$pvarVal$queryIdleProcessorCycleTime$queryProcessCycleTime$queryUnbiasedInterruptTime$raw$remoteProcID2$rgsabound$scale$scode$sign$signscale$skey$struct1$tProcess1$trace$treadHandle3$uiVal$uintVal$ulVal$ullVal$union1$union2$wReserved$wReserved1$wReserved2$wReserved3$zonedTimeFromAdjTimeImpl$zonedTimeFromTimeImpl
                              • API String ID: 1418167214-113516584
                              • Opcode ID: d47488d9ee190774b649e4c390b96226bbdbc17827aeb9eca4f7ffb4d63aa4df
                              • Instruction ID: 554a51feb9eeb01c70336332dbbe2f894c7b6adc596a80c6cfaec3c5fd1d7a15
                              • Opcode Fuzzy Hash: d47488d9ee190774b649e4c390b96226bbdbc17827aeb9eca4f7ffb4d63aa4df
                              • Instruction Fuzzy Hash: AA930E21C1CED295F7128B38A4653F573A1AFA1B28F005335C98C96665EF7EF149E388

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1192 7ff618648c30-7ff618648cb5 _fileno _setmode _fileno _setmode _fileno _setmode SetConsoleOutputCP SetConsoleCP LoadLibraryA 1196 7ff618648cb7-7ff618648cbe GetProcAddress 1192->1196 1197 7ff618648cc4-7ff618648cd1 1192->1197 1196->1197 1198 7ff618648cd7-7ff618648cfb 1197->1198 1199 7ff618648fb9 call 7ff618641df0 1197->1199 1198->1199 1200 7ff618648d01-7ff618648d1e 1198->1200 1203 7ff618648fbe-7ff618648fcf call 7ff618641e40 1199->1203 1200->1199 1202 7ff618648d24-7ff618648d41 1200->1202 1202->1199 1205 7ff618648d47-7ff618648d64 1202->1205 1205->1199 1207 7ff618648d6a-7ff618648d87 1205->1207 1207->1199 1208 7ff618648d8d-7ff618648db1 1207->1208 1208->1203 1209 7ff618648db7-7ff618648ddb 1208->1209 1209->1199 1210 7ff618648de1-7ff618648dfe 1209->1210 1210->1199 1211 7ff618648e04-7ff618648e57 1210->1211 1212 7ff618648e68-7ff618648e7f call 7ff618652480 1211->1212 1213 7ff618648e59-7ff618648e61 CoInitialize 1211->1213 1216 7ff618648e85-7ff618648e8f 1212->1216 1217 7ff618648f50-7ff618648f5b call 7ff618650300 1212->1217 1213->1212 1218 7ff618648f08-7ff618648f13 call 7ff618650300 1216->1218 1219 7ff618648e91-7ff618648ec3 call 7ff6186487d0 1216->1219 1225 7ff618648f5d 1217->1225 1226 7ff618648f62-7ff618648f6c 1217->1226 1232 7ff618648f1a-7ff618648f24 1218->1232 1233 7ff618648f15 1218->1233 1228 7ff618648edb-7ff618648eea 1219->1228 1229 7ff618648ec5-7ff618648ed9 1219->1229 1225->1226 1230 7ff618648f84 1226->1230 1231 7ff618648f6e-7ff618648f82 1226->1231 1229->1228 1234 7ff618648ef0-7ff618648f04 call 7ff618650240 1229->1234 1235 7ff618648f90-7ff618648f95 call 7ff618650240 1230->1235 1231->1230 1231->1235 1236 7ff618648f3c-7ff618648f43 1232->1236 1237 7ff618648f26-7ff618648f3a 1232->1237 1233->1232 1240 7ff618648fa8-7ff618648fb4 call 7ff618650240 1235->1240 1236->1219 1237->1236 1237->1240 1240->1219
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _fileno_setmode$Console$AddressInitializeLibraryLoadOutputProc
                              • String ID: Ws2_32.dll$inet_ntop
                              • API String ID: 1755878316-2739477577
                              • Opcode ID: e5f69b7beea4d2e17986bbdfd9c329ef1c06748a6842980b7fc6a90759a69aee
                              • Instruction ID: 864431bc3caf7dbc7822a435dff43cc953624673271bf1beb103368e20c25648
                              • Opcode Fuzzy Hash: e5f69b7beea4d2e17986bbdfd9c329ef1c06748a6842980b7fc6a90759a69aee
                              • Instruction Fuzzy Hash: 96913731A19F1681EB449B64F82837C67A1FB94FA0F840135DA8D83794DF7CE855E788

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1303 7ff618642260-7ff6186422a7 call 7ff618641db0 exit 1308 7ff6186422a9-7ff6186422af 1303->1308 1309 7ff618642300-7ff61864231c VirtualAlloc 1303->1309 1308->1309 1310 7ff6186422b1-7ff6186422fe 1308->1310 1311 7ff618642360-7ff618642386 call 7ff618642260 1309->1311 1312 7ff61864231e-7ff61864235b 1309->1312 1316 7ff6186425d8-7ff6186425df 1311->1316 1317 7ff61864238c-7ff618642399 1311->1317 1312->1310 1318 7ff618642450-7ff618642486 1317->1318 1319 7ff61864239f-7ff6186423aa 1317->1319 1320 7ff6186423af-7ff6186423be 1318->1320 1319->1320 1321 7ff6186425b8-7ff6186425c9 VirtualAlloc 1320->1321 1322 7ff6186423c4-7ff6186423d5 VirtualAlloc 1320->1322 1323 7ff6186425cf-7ff6186425d4 call 7ff618642260 1321->1323 1324 7ff6186423e2-7ff6186423f7 1321->1324 1325 7ff6186423db 1322->1325 1326 7ff6186425e4-7ff6186425fd VirtualAlloc 1322->1326 1323->1316 1328 7ff618642400-7ff618642407 1324->1328 1325->1324 1326->1323 1329 7ff6186425ff 1326->1329 1331 7ff61864240d-7ff618642417 1328->1331 1332 7ff61864248b-7ff6186424a1 1328->1332 1331->1328 1333 7ff618642419-7ff61864244a call 7ff618642290 1331->1333 1334 7ff6186424a4-7ff6186424cc 1332->1334 1333->1334 1335 7ff6186424d8-7ff6186424dc 1334->1335 1336 7ff6186424ce 1334->1336 1339 7ff6186424d0-7ff6186424d6 1335->1339 1340 7ff6186424de-7ff6186424fb 1335->1340 1338 7ff618642509-7ff618642516 1336->1338 1343 7ff618642518-7ff61864251d 1338->1343 1344 7ff618642522-7ff61864253d 1338->1344 1339->1335 1339->1338 1340->1338 1342 7ff6186424fd-7ff618642506 1340->1342 1342->1338 1343->1344 1345 7ff618642550-7ff618642554 1344->1345 1346 7ff61864253f 1344->1346 1348 7ff618642548-7ff61864254e 1345->1348 1349 7ff618642556-7ff61864257e 1345->1349 1347 7ff6186425a8 1346->1347 1350 7ff6186425ac-7ff6186425b2 1347->1350 1348->1345 1348->1347 1349->1350 1351 7ff618642580-7ff618642584 1349->1351 1352 7ff618642589-7ff6186425a0 1350->1352 1351->1350 1353 7ff618642586 1351->1353 1353->1352
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual$exitfwritestrlen
                              • String ID: out of memory
                              • API String ID: 4248889879-49810860
                              • Opcode ID: 572b70c8746dd87391455c9951a549d2fe058ef75a72fd209dbd6540cf9ebad6
                              • Instruction ID: 4101c6b4d47ea2220483c63e6e0d2144e11eccfb5b26fe57d0494d387376e551
                              • Opcode Fuzzy Hash: 572b70c8746dd87391455c9951a549d2fe058ef75a72fd209dbd6540cf9ebad6
                              • Instruction Fuzzy Hash: 5E218932B05F8182EB188B29E5583AEA7A0E748BE0F548235CB6D873C1CF3DE495D344

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1447 7ff618642290-7ff6186422a7 1448 7ff6186422a9-7ff6186422af 1447->1448 1449 7ff618642300-7ff61864231c VirtualAlloc 1447->1449 1448->1449 1450 7ff6186422b1-7ff6186422fe 1448->1450 1451 7ff618642360-7ff618642386 call 7ff618642260 1449->1451 1452 7ff61864231e-7ff61864235b 1449->1452 1456 7ff6186425d8-7ff6186425df 1451->1456 1457 7ff61864238c-7ff618642399 1451->1457 1452->1450 1458 7ff618642450-7ff618642486 1457->1458 1459 7ff61864239f-7ff6186423aa 1457->1459 1460 7ff6186423af-7ff6186423be 1458->1460 1459->1460 1461 7ff6186425b8-7ff6186425c9 VirtualAlloc 1460->1461 1462 7ff6186423c4-7ff6186423d5 VirtualAlloc 1460->1462 1463 7ff6186425cf-7ff6186425d4 call 7ff618642260 1461->1463 1464 7ff6186423e2-7ff6186423f7 1461->1464 1465 7ff6186423db 1462->1465 1466 7ff6186425e4-7ff6186425fd VirtualAlloc 1462->1466 1463->1456 1468 7ff618642400-7ff618642407 1464->1468 1465->1464 1466->1463 1469 7ff6186425ff 1466->1469 1471 7ff61864240d-7ff618642417 1468->1471 1472 7ff61864248b-7ff6186424a1 1468->1472 1471->1468 1473 7ff618642419-7ff61864244a call 7ff618642290 1471->1473 1474 7ff6186424a4-7ff6186424cc 1472->1474 1473->1474 1475 7ff6186424d8-7ff6186424dc 1474->1475 1476 7ff6186424ce 1474->1476 1479 7ff6186424d0-7ff6186424d6 1475->1479 1480 7ff6186424de-7ff6186424fb 1475->1480 1478 7ff618642509-7ff618642516 1476->1478 1483 7ff618642518-7ff61864251d 1478->1483 1484 7ff618642522-7ff61864253d 1478->1484 1479->1475 1479->1478 1480->1478 1482 7ff6186424fd-7ff618642506 1480->1482 1482->1478 1483->1484 1485 7ff618642550-7ff618642554 1484->1485 1486 7ff61864253f 1484->1486 1488 7ff618642548-7ff61864254e 1485->1488 1489 7ff618642556-7ff61864257e 1485->1489 1487 7ff6186425a8 1486->1487 1490 7ff6186425ac-7ff6186425b2 1487->1490 1488->1485 1488->1487 1489->1490 1491 7ff618642580-7ff618642584 1489->1491 1492 7ff618642589-7ff6186425a0 1490->1492 1491->1490 1493 7ff618642586 1491->1493 1493->1492
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: d291759a0de0c79898f6dbac63395a54edfacf35a98a0a029e5f5d299916318c
                              • Instruction ID: 2f70b944df992ffb1371c0cca6f670507ffda02558da083a2d958fe8d24f6050
                              • Opcode Fuzzy Hash: d291759a0de0c79898f6dbac63395a54edfacf35a98a0a029e5f5d299916318c
                              • Instruction Fuzzy Hash: E8519E32705B8580EB198B29E4683AD67A0EB89FE4F688135DE5D8B3C5DF39E085D344

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID:
                              • API String ID: 438689982-0
                              • Opcode ID: 3b4c29ced6fc8eeeec82797927dfcd0c7633041d78cfa8070d8ed1b799edb56f
                              • Instruction ID: 46969cec201093a4b8882caac8b36324a50f65ccc6ef379bbc8e328f9a740e8b
                              • Opcode Fuzzy Hash: 3b4c29ced6fc8eeeec82797927dfcd0c7633041d78cfa8070d8ed1b799edb56f
                              • Instruction Fuzzy Hash: E351AC72609F8582EB60DB65E4503AD77A0FB84F98F858532DA8C87795EF3CD408D384

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1526 7ff618645b50-7ff618645b75 1527 7ff618645b77-7ff618645b81 1526->1527 1528 7ff618645b84-7ff618645b88 1526->1528 1527->1528 1529 7ff618645b8a-7ff618645b8d 1528->1529 1530 7ff618645ba1-7ff618645bc7 call 7ff618645ac0 1528->1530 1529->1530 1531 7ff618645b8f call 7ff618643f10 1529->1531 1537 7ff618645cb8-7ff618645ccf call 7ff618645b50 1530->1537 1538 7ff618645bcd-7ff618645be1 1530->1538 1535 7ff618645b94-7ff618645ba0 1531->1535 1542 7ff618645be6-7ff618645bf7 1537->1542 1539 7ff618645c00-7ff618645c08 1538->1539 1540 7ff618645be3 1538->1540 1544 7ff618645c0a-7ff618645c1b 1539->1544 1545 7ff618645c21-7ff618645c3a 1539->1545 1540->1542 1544->1545 1546 7ff618645ca8-7ff618645cae 1544->1546 1547 7ff618645c46-7ff618645c4a 1545->1547 1548 7ff618645c3c-7ff618645c43 1545->1548 1546->1545 1549 7ff618645c50-7ff618645c53 1547->1549 1550 7ff618645cd4-7ff618645cda call 7ff618645ac0 1547->1550 1548->1547 1549->1550 1551 7ff618645c55-7ff618645c79 call 7ff618643f10 1549->1551 1556 7ff618645c7b-7ff618645c82 1551->1556 1557 7ff618645c85-7ff618645c9f memcpy 1551->1557 1556->1557 1557->1542
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: ReraiseDefect
                              • API String ID: 3510742995-3378185472
                              • Opcode ID: 3d8b739972ca8e438c50810a4c5b3cc62ed4dd1843d6bc16f41e52db819bbd6b
                              • Instruction ID: 2b83dc9c2756f8405541835e8a65b5133f6bb17ca8e55686c59d7b2bd7bf20e4
                              • Opcode Fuzzy Hash: 3d8b739972ca8e438c50810a4c5b3cc62ed4dd1843d6bc16f41e52db819bbd6b
                              • Instruction Fuzzy Hash: 28310092E09E8681EF049B6480153FE6361AF85FA8F84C336EE1C877D5DE2DE0419384

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1558 7ff618652af0-7ff618652b01 1559 7ff618652b03-7ff618652b20 call 7ff61864db40 1558->1559 1560 7ff618652b80-7ff618652b98 call 7ff61864db40 1558->1560 1563 7ff618652b25 1559->1563 1566 7ff618652ba0-7ff618652ba2 1560->1566 1565 7ff618652b27-7ff618652b2d 1563->1565 1567 7ff618652b4f-7ff618652b57 1565->1567 1568 7ff618652b2f-7ff618652b34 1565->1568 1566->1567 1569 7ff618652ba4-7ff618652bab 1566->1569 1570 7ff618652b36-7ff618652b42 fputc 1568->1570 1571 7ff618652b60-7ff618652b72 call 7ff61864db40 1568->1571 1572 7ff618652bcb-7ff618652bdf call 7ff61864db40 1569->1572 1573 7ff618652bad-7ff618652bb9 fputc 1569->1573 1570->1567 1576 7ff618652b44-7ff618652b4d 1570->1576 1571->1567 1582 7ff618652b74-7ff618652b76 1571->1582 1572->1567 1581 7ff618652be5-7ff618652be7 1572->1581 1573->1567 1574 7ff618652bbb-7ff618652bc0 1573->1574 1574->1567 1578 7ff618652bc2-7ff618652bc9 1574->1578 1576->1567 1576->1568 1578->1572 1578->1573 1581->1566 1582->1565
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fputc
                              • String ID:
                              • API String ID: 1992160199-0
                              • Opcode ID: 976687d18dcbde25fb2f27b54ea2ace063131402e174eac00e8739f934d84b60
                              • Instruction ID: 5e34e31fe80273933e8485c10af91263ba096884cb204f70d71a6e709634a9e5
                              • Opcode Fuzzy Hash: 976687d18dcbde25fb2f27b54ea2ace063131402e174eac00e8739f934d84b60
                              • Instruction Fuzzy Hash: 6B21AD91F08F4659FB245E3199A13B99742AF54FE8F480435ED4DC7397EE2CE044A2C8

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: strlen
                              • String ID: (null)
                              • API String ID: 39653677-3941151225
                              • Opcode ID: 60a14fea7312a30a1871a09b9c8ad1655b03cd16810d8fc01ab3535e0c4490f3
                              • Instruction ID: 729672d1cb0267ab0bb7c0a98f57e1a7630d8075dbcf27bb5b941b5c6cb78c7d
                              • Opcode Fuzzy Hash: 60a14fea7312a30a1871a09b9c8ad1655b03cd16810d8fc01ab3535e0c4490f3
                              • Instruction Fuzzy Hash: 5E01DA62A04B458ED700DF36D8812A827A4FB98FE8F004935EA1CC7B9ADF38D56193D4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1594 7ff618642370-7ff618642386 1595 7ff6186425d8-7ff6186425df 1594->1595 1596 7ff61864238c-7ff618642399 1594->1596 1597 7ff618642450-7ff618642486 1596->1597 1598 7ff61864239f-7ff6186423aa 1596->1598 1599 7ff6186423af-7ff6186423be 1597->1599 1598->1599 1600 7ff6186425b8-7ff6186425c9 VirtualAlloc 1599->1600 1601 7ff6186423c4-7ff6186423d5 VirtualAlloc 1599->1601 1602 7ff6186425cf-7ff6186425d4 call 7ff618642260 1600->1602 1603 7ff6186423e2-7ff6186423f7 1600->1603 1604 7ff6186423db 1601->1604 1605 7ff6186425e4-7ff6186425fd VirtualAlloc 1601->1605 1602->1595 1607 7ff618642400-7ff618642407 1603->1607 1604->1603 1605->1602 1608 7ff6186425ff 1605->1608 1610 7ff61864240d-7ff618642417 1607->1610 1611 7ff61864248b-7ff6186424a1 1607->1611 1610->1607 1612 7ff618642419-7ff61864244a call 7ff618642290 1610->1612 1613 7ff6186424a4-7ff6186424cc 1611->1613 1612->1613 1614 7ff6186424d8-7ff6186424dc 1613->1614 1615 7ff6186424ce 1613->1615 1618 7ff6186424d0-7ff6186424d6 1614->1618 1619 7ff6186424de-7ff6186424fb 1614->1619 1617 7ff618642509-7ff618642516 1615->1617 1622 7ff618642518-7ff61864251d 1617->1622 1623 7ff618642522-7ff61864253d 1617->1623 1618->1614 1618->1617 1619->1617 1621 7ff6186424fd-7ff618642506 1619->1621 1621->1617 1622->1623 1624 7ff618642550-7ff618642554 1623->1624 1625 7ff61864253f 1623->1625 1627 7ff618642548-7ff61864254e 1624->1627 1628 7ff618642556-7ff61864257e 1624->1628 1626 7ff6186425a8 1625->1626 1629 7ff6186425ac-7ff6186425b2 1626->1629 1627->1624 1627->1626 1628->1629 1630 7ff618642580-7ff618642584 1628->1630 1631 7ff618642589-7ff6186425a0 1629->1631 1630->1629 1632 7ff618642586 1630->1632 1632->1631
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: c860b48c35a084a74044e7cd34d00d18a6d3e2b853acf56c531b6c1780ca4de8
                              • Instruction ID: 526f7d5f4271846ed2cf437e98c257e43d4d5a4b2829445c42f588c5959ee3c6
                              • Opcode Fuzzy Hash: c860b48c35a084a74044e7cd34d00d18a6d3e2b853acf56c531b6c1780ca4de8
                              • Instruction Fuzzy Hash: 02517F72706F8580EF199B25D8683AD27A1EB94FD4F688536DE0D4B384EE39E441D344

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1633 7ff618657900-7ff61865791d 1634 7ff61865791f-7ff61865792f 1633->1634 1635 7ff618657931-7ff61865793f 1633->1635 1634->1635 1636 7ff61865796d-7ff618657984 1634->1636 1637 7ff618657955-7ff61865796b 1635->1637 1638 7ff618657941-7ff618657953 fputc 1635->1638 1637->1636 1638->1636
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fputc
                              • String ID:
                              • API String ID: 1992160199-0
                              • Opcode ID: 504284c848961401c03dab208bcdb2fd3e9e69f166b779f959cc6528fe2ed3ec
                              • Instruction ID: 99fb568d792e71f05de70d8efb6c90a9f1095987c70d15b936131f5e16ba8f11
                              • Opcode Fuzzy Hash: 504284c848961401c03dab208bcdb2fd3e9e69f166b779f959cc6528fe2ed3ec
                              • Instruction Fuzzy Hash: 0211ECB7A04B558ADB10CF3AC48259C3BB1E798FD4B048521EE1C87769DA38D8A1C7D4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1639 7ff618652bf0-7ff618652c34 call 7ff618652af0 fwrite 1644 7ff618652c3b-7ff618652c43 1639->1644
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fputcfwrite
                              • String ID:
                              • API String ID: 1748715138-0
                              • Opcode ID: 7e5f3e22f6477dcc98f07a37a3c497c4555276e6af354cbcff0d8c90c18582ba
                              • Instruction ID: c5e03ad5a61781b9ee626a2a381c79d2ac46752a89ba00f2ae2cd622fb4e4ac3
                              • Opcode Fuzzy Hash: 7e5f3e22f6477dcc98f07a37a3c497c4555276e6af354cbcff0d8c90c18582ba
                              • Instruction Fuzzy Hash: DAE04F20B0994145E704A372BC553B92211AB5DFE4F980034DD1ED73C7DC5E95C1E389

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1645 7ff618642ea0-7ff618642ec3 1646 7ff618642f30-7ff618642f3f 1645->1646 1647 7ff618642ec5-7ff618642ed0 1645->1647 1650 7ff618643098-7ff61864309d call 7ff6186429d0 1646->1650 1651 7ff618642f45-7ff618642f4c 1646->1651 1648 7ff618642ed6-7ff618642ed9 call 7ff6186429d0 1647->1648 1649 7ff618642fa0-7ff618642fbd VirtualAlloc 1647->1649 1660 7ff618642ede-7ff618642eed 1648->1660 1652 7ff61864315d-7ff61864316e call 7ff618642260 1649->1652 1653 7ff618642fc3-7ff618643001 1649->1653 1662 7ff6186430a2-7ff6186430de 1650->1662 1656 7ff618643148-7ff618643154 1651->1656 1657 7ff618642f52-7ff618642f68 1651->1657 1658 7ff61864301c-7ff618643020 1653->1658 1659 7ff618643003 1653->1659 1656->1652 1663 7ff618642f0d-7ff618642f2c 1657->1663 1664 7ff618642f6a-7ff618642f72 1657->1664 1666 7ff618643010-7ff618643016 1658->1666 1667 7ff618643022-7ff61864304b 1658->1667 1665 7ff618643118-7ff61864313c call 7ff618642290 1659->1665 1668 7ff618643051-7ff618643069 1660->1668 1669 7ff618642ef3-7ff618642f09 call 7ff618642d60 1660->1669 1671 7ff6186430e0 1662->1671 1672 7ff6186430e4-7ff6186430f0 1662->1672 1673 7ff618642f78-7ff618642f83 1664->1673 1674 7ff6186430f6-7ff618643101 1664->1674 1666->1658 1666->1665 1667->1668 1667->1669 1677 7ff61864306b-7ff618643072 1668->1677 1678 7ff618643080-7ff61864308e 1668->1678 1669->1663 1671->1672 1672->1663 1672->1674 1679 7ff618642f8d-7ff618642f95 1673->1679 1680 7ff618642f85-7ff618642f89 1673->1680 1674->1679 1681 7ff618643107-7ff61864310f 1674->1681 1677->1669 1678->1669 1679->1663 1680->1679 1681->1679
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 321835cd96ba8efe0387975720fab5ce3dd7b1d947ab60ff2c82da5e989755bf
                              • Instruction ID: 8d15e2b8716389fc2c1176eb5a4d467be44704e8015ca64d6d5ef8829de05730
                              • Opcode Fuzzy Hash: 321835cd96ba8efe0387975720fab5ce3dd7b1d947ab60ff2c82da5e989755bf
                              • Instruction Fuzzy Hash: 4B61CD72A05F4290EB198B25E5143AD63A0FF84FA4F288235DA5D87798EF38E4D0D394

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1684 7ff618643f10-7ff618643f2b 1685 7ff618643f31-7ff618643f3f 1684->1685 1686 7ff618643fb0-7ff618643fb8 1684->1686 1685->1686 1688 7ff618643f41-7ff618643f71 call 7ff618642ea0 1685->1688 1687 7ff618643fba-7ff618643fbf call 7ff618650460 1686->1687 1686->1688 1687->1688 1693 7ff618643f77-7ff618643f8a 1688->1693 1694 7ff618644060-7ff61864406c 1688->1694 1696 7ff618643fc8-7ff618643fd7 1693->1696 1697 7ff618643f8c-7ff618643f93 1693->1697 1695 7ff618643f96-7ff618643fae memset 1694->1695 1696->1697 1698 7ff618643fd9-7ff618643fe8 1696->1698 1697->1695 1698->1697 1699 7ff618643fea-7ff618643ff9 1698->1699 1699->1697 1700 7ff618643ffb-7ff61864400a 1699->1700 1700->1697 1701 7ff618644010-7ff61864401f 1700->1701 1701->1697 1702 7ff618644025-7ff618644034 1701->1702 1702->1697 1703 7ff61864403a-7ff618644049 1702->1703 1704 7ff61864404b-7ff618644055 1703->1704 1705 7ff618644071-7ff618644080 call 7ff618643bd0 1703->1705 1704->1695 1705->1695
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memset
                              • String ID:
                              • API String ID: 2221118986-0
                              • Opcode ID: 2174c3a5885be39917ec11d46805d78a43f914ca332ddcd8c608c9838d273810
                              • Instruction ID: 05fc0dd66cacc1dfc6aff751a3974e786029c3328441cdbd6d044bea2aeb5488
                              • Opcode Fuzzy Hash: 2174c3a5885be39917ec11d46805d78a43f914ca332ddcd8c608c9838d273810
                              • Instruction Fuzzy Hash: 15412AB6A08E4690EB44CF75D6606BC7365EB98FB0F940233DA1D83790DF39D8999384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: Handle$Thread$ByteCharCloseContextModuleMultiWidememcpy$AddressCreateCurrentExceptionFirstHandlerInitLoadOpenProcProcessSnapshotStringThread32Toolhelp32UnicodeVectoredmemset
                              • String ID: D|u
                              • API String ID: 3395284975-2768058641
                              • Opcode ID: 891aaf5d3fad9ee332ba8d6d8aa4939c2175d9e8edaee7be07ad7d3c740c9309
                              • Instruction ID: 1af051be9ba5f83094cf2cae80e73c08b0ce6060a4307d2cab30ac11fcacb8b3
                              • Opcode Fuzzy Hash: 891aaf5d3fad9ee332ba8d6d8aa4939c2175d9e8edaee7be07ad7d3c740c9309
                              • Instruction Fuzzy Hash: BCE18061E0DE8282EB149B71E4243BE6792AFE1FA4F444035DA4D87789DF7CE405E398
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: 29826dee93601c698e02eefa80bc21faf82cf4e88beceff3dc40afeec444d213
                              • Instruction ID: bdeaa9813366ad36a47fd89389a3ec67e0612b2128c0163cbe2186b7397b3c40
                              • Opcode Fuzzy Hash: 29826dee93601c698e02eefa80bc21faf82cf4e88beceff3dc40afeec444d213
                              • Instruction Fuzzy Hash: 42E2B0B2A05F4682EF549B25C0487B93366FB40FE4F859536CA2D8B386DF78E490D385
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmp
                              • String ID: ntime of$o get ru$unable t
                              • API String ID: 3051281561-3332830050
                              • Opcode ID: 801bcd6618d348d0d48273dd658ae449c06088d2ea006600bb12a2a67b10bcbd
                              • Instruction ID: 6a351d41a6e2384d4f47e5c229c050608aa27b95d4cb4e4b1fca237086930b0c
                              • Opcode Fuzzy Hash: 801bcd6618d348d0d48273dd658ae449c06088d2ea006600bb12a2a67b10bcbd
                              • Instruction Fuzzy Hash: 56523876A08F4681EB11CF2AE9503AA73A1FB85FA4F408132DA4D877A5EF3CD444D784
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: Infinity$NaN
                              • API String ID: 0-4285296124
                              • Opcode ID: 8eb6e90b40a522c83c16ab071c1b9b5d385b7e3e3b03d292f8c2849d7fb58425
                              • Instruction ID: 01bbd536fc90f56a09a3432b00703ef2b9dac2911fef451fbda7bff293bc5a46
                              • Opcode Fuzzy Hash: 8eb6e90b40a522c83c16ab071c1b9b5d385b7e3e3b03d292f8c2849d7fb58425
                              • Instruction Fuzzy Hash: 1EE21B32A04B858EE751CF79C4453AD37A1FB45BACF108225EA0D97B5ADF38E481DB84
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memset
                              • String ID: $@
                              • API String ID: 2221118986-1077428164
                              • Opcode ID: 13095dfd6ba0f7c0424704935cd0f62bc7e6940c9fd3d043ab4de0aeeb535895
                              • Instruction ID: faf4a577fa2a49647fd95749b47b7f35dd48c51e643923878c95caa40d99bed5
                              • Opcode Fuzzy Hash: 13095dfd6ba0f7c0424704935cd0f62bc7e6940c9fd3d043ab4de0aeeb535895
                              • Instruction Fuzzy Hash: 37D224A2718B9442FF10CBB1A9217ABA691FB98BD4F08A531EF9D57B49CE3CD501D340
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: """"""""$DDDDDDDD
                              • API String ID: 0-1621327129
                              • Opcode ID: b82ce2f4609bb53dc7f34ad5cedf9ba7fb6b3b45cd4dfa7873e0e52ba1bb3d2f
                              • Instruction ID: fe7ff751ab4165cbb3ee07afc59c5f080c6990b07d785057a3f8ccfe5439375b
                              • Opcode Fuzzy Hash: b82ce2f4609bb53dc7f34ad5cedf9ba7fb6b3b45cd4dfa7873e0e52ba1bb3d2f
                              • Instruction Fuzzy Hash: 4C425062718BD485E760CFA1B92179BB7A1F789BD4F04A226DE8C67F18DB3CD0518B04
                              Strings
                              • c, xrefs: 00007FF618644A9E
                              • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899, xrefs: 00007FF618644ABC, 00007FF618644D26
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$c
                              • API String ID: 0-131350621
                              • Opcode ID: b0f27cf25af07b8383b1ffa34ff7c3a2ffe019ecf41ebd58f2b556fdfcf10548
                              • Instruction ID: b877afe55bf308bc7a1cb28d04487f1d22f6518b330825161f526763b2b2d1a9
                              • Opcode Fuzzy Hash: b0f27cf25af07b8383b1ffa34ff7c3a2ffe019ecf41ebd58f2b556fdfcf10548
                              • Instruction Fuzzy Hash: E9C1A2A2B15A4A46EF608B29A8423BD6251EB98FB4F148331DF3D873D4EE3CE544D344
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: 33333333$UUUUUUUU
                              • API String ID: 0-3483174168
                              • Opcode ID: 441117c694ab834bf65894c7cf1b76a728a697286da176495cad2e6614abf1fb
                              • Instruction ID: ce635fbe03f273c4060d4f95008f9c0126ce9dda3d0ee2486fa34e039c3354eb
                              • Opcode Fuzzy Hash: 441117c694ab834bf65894c7cf1b76a728a697286da176495cad2e6614abf1fb
                              • Instruction Fuzzy Hash: 7D41C3E3B70BB895EA01CF559905AD56761F314FE8A19E026DF0E3BB0EC638DA47C241
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3714a5fb3d47062bea9f9d64224d3524031238b0c8af0a1b32fa3bc957e744aa
                              • Instruction ID: 32641a185d426d658a4cb74f74d4aa71ded881b12cba47820ad1e639b0cc8cf5
                              • Opcode Fuzzy Hash: 3714a5fb3d47062bea9f9d64224d3524031238b0c8af0a1b32fa3bc957e744aa
                              • Instruction Fuzzy Hash: 17023953F74FD540F713477CA802EA4AA009BB77F4B19A301FD62A2BE3DA5297178A44
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b07b2d952290f387382cc2f5e79bacd254f290a86a9c4c19ba8e67e474d8b6b4
                              • Instruction ID: 0758d3a5e5a8b5820bb402352e5ae51da366cbd56ed85a60f963719d4c0bd75f
                              • Opcode Fuzzy Hash: b07b2d952290f387382cc2f5e79bacd254f290a86a9c4c19ba8e67e474d8b6b4
                              • Instruction Fuzzy Hash: BFF0FE97D4EFD25AF3474A342C242182F905B92A20F4D41B7C6D8D27D7D90D99059355
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c16a24acacea60a84a0becf7496c6c670920c21d38291318871b6924ec32608f
                              • Instruction ID: 0d9e07492d293c1c24429e2c30c26ab9ba3d0326444f48163ccce00038a83bb4
                              • Opcode Fuzzy Hash: c16a24acacea60a84a0becf7496c6c670920c21d38291318871b6924ec32608f
                              • Instruction Fuzzy Hash: 24F0A597D4EBE21AE3031A342C3401C2FA05BA3D20B8E81B7C7D8C36D7990C9C08D366
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: String$CopyFreeInitializeVariant_setjmp
                              • String ID: hander:$VariantConversionError$com.nim$d except$de event$ion insi$newVariant$uncatche
                              • API String ID: 1008739868-602244300
                              • Opcode ID: c23ee155f59d934d9a68fdb77470885bf1cb3e8d75ddbd0a88825e00950ca865
                              • Instruction ID: 0cd3d0b5c92a97d2121a2b727fc533c7270522da7f27bd0e957dafbcf760aea3
                              • Opcode Fuzzy Hash: c23ee155f59d934d9a68fdb77470885bf1cb3e8d75ddbd0a88825e00950ca865
                              • Instruction Fuzzy Hash: 95024672A09F4681EB108F25E4A43AE77A1FB94FA4F444136DA4D877A9DF3CE444E384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CommandLine
                              • String ID: contain$ not in $ not in $ not in $0 ..$0 ..$IndexDefect$er is em$inde$index ou$nds, the$os.nim$paramStr$pty$t of bou
                              • API String ID: 3253501508-475797482
                              • Opcode ID: 74122c24c0382604b01f4cff30d2f2a8460fd49ea4f5a06927617e3ba1fdba9b
                              • Instruction ID: 66895255228c2b87f98095e921e41864ea209a74a888ce1f8b155334a2f0207b
                              • Opcode Fuzzy Hash: 74122c24c0382604b01f4cff30d2f2a8460fd49ea4f5a06927617e3ba1fdba9b
                              • Instruction Fuzzy Hash: 29A19532A09F4280EB048F25E96436D7BA5FB94FA4F448036DA5C87395EF3CE554E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ArrayByteCharInitializeMultiSafeStringWide$AllocCreateElementFree_setjmpmemcpy
                              • String ID: specifi$VariantConversionError$com.nim$ed membe$o invoke$r: $toVariant$unable t
                              • API String ID: 4234589578-1707675
                              • Opcode ID: df58db6be012ea270ca5ee00f32570b053bba1f68944712e992e1bbd43113879
                              • Instruction ID: 614af9e660fa2ae3b09c696be37adc0d243dcbc001854506f409226d34ca3a12
                              • Opcode Fuzzy Hash: df58db6be012ea270ca5ee00f32570b053bba1f68944712e992e1bbd43113879
                              • Instruction Fuzzy Hash: 73F16D32A09F8691EB208B25F4A43AE73A0FB94F90F544139DA8D87795DF7CD444D788
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpystrlen
                              • String ID: excepti$Error: u$ReraiseDefect$[[rerais$]]$ed from:$fatal.nim$nhandled$on: $sysFatal
                              • API String ID: 3412268980-331123295
                              • Opcode ID: 2d776e0bb831010b6c225a9819933063bf9a0751903a23d9f7593caf53276d09
                              • Instruction ID: 4ab4dad60c1c2699074dfccf92049197714798baa4b46cdeb3629adad1501c31
                              • Opcode Fuzzy Hash: 2d776e0bb831010b6c225a9819933063bf9a0751903a23d9f7593caf53276d09
                              • Instruction Fuzzy Hash: B522CD72A09F4281EB109F25E4587AE27A5FB85FA0F844136EE5C87B95DF3CE444E384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: H$VED|$VT_ARRAY$VT_ARRAY$VT_ARRAY$VT_BYREF$VT_RESER$VT_VECTO
                              • API String ID: 3510742995-1705348919
                              • Opcode ID: a86182c4fd8834cc737c5c4e5302b065617498eade09615eae6dd8b407819b28
                              • Instruction ID: eb9c66d3e65cf35ca8652c1f5ad5bd82d358f8b314dd59c4fb98ab6ef9031734
                              • Opcode Fuzzy Hash: a86182c4fd8834cc737c5c4e5302b065617498eade09615eae6dd8b407819b28
                              • Instruction Fuzzy Hash: A5818932A09F4681EB119B25E4543AD63A4FB94FA4F998132DF4D873A5EE3CD444E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: CLRError$ValueError$annot pa$format s$invalid $parseStandardFormatSpecifier$rse:$strformat.nim$tring, c
                              • API String ID: 3510742995-153200016
                              • Opcode ID: 4fade999f713cb9291008e8e771ea4e4e06678c9c79d51e3a30987be5e6c63ac
                              • Instruction ID: 8329354af60eb2d2427efe18ee3fcfefac10a8071c02efdbc750aeb21f00c501
                              • Opcode Fuzzy Hash: 4fade999f713cb9291008e8e771ea4e4e06678c9c79d51e3a30987be5e6c63ac
                              • Instruction Fuzzy Hash: 91714B72A09F4681EB10DF26E9543AD63A0FB85FA4F448135EA9C8B786EF3CD054D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmpmemcpy
                              • String ID: ValueError$gfffffff$integer:$invalid $parseInt$strutils.nim
                              • API String ID: 2721286225-831327929
                              • Opcode ID: 3f73189fa8d5455517717b45f601fd0b2f05e55adca86ad036159fdf831d08fb
                              • Instruction ID: 2b0fd9b3cafa8d4f0d3c1718d9171db7e9d9f1d68c34b7bf09eff5c7c7dcffa5
                              • Opcode Fuzzy Hash: 3f73189fa8d5455517717b45f601fd0b2f05e55adca86ad036159fdf831d08fb
                              • Instruction Fuzzy Hash: C691AE32A09F8A81EB618B25E4643AD73A0FB95FA4F444232DA5D87395DF3CD544E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitstrlen
                              • String ID: SIGABRT: Abnormal termination.$SIGFPE: Arithmetic error.$SIGILL: Illegal operation.$SIGINT: Interrupted by Ctrl-C.$SIGSEGV: Illegal storage access. (Attempt to read from nil?)$unknown signal
                              • API String ID: 4213389737-3987738871
                              • Opcode ID: 9915d26041e0ad20eabdf0160e6ea6c1bbb54fbb968086df6f4d2b90d2da5e54
                              • Instruction ID: 8cf743a47b8b310620c70333e8517d71d842f44f444e7c1d8844c2d71e539989
                              • Opcode Fuzzy Hash: 9915d26041e0ad20eabdf0160e6ea6c1bbb54fbb968086df6f4d2b90d2da5e54
                              • Instruction Fuzzy Hash: 18F0BB20D08C8390FB18A77468A507C5356AF81F64FF40039E41EC3A63CF1CA849E2C8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: to $convert $convert $convert $convert $convert $from
                              • API String ID: 3510742995-1950068461
                              • Opcode ID: 9304380911033293320c81f2acf6376005448f402ff89b2ee30c3c9f99823c00
                              • Instruction ID: 87fc6411cf33ddabbc838473a7aa84ab53adfa84f55fdbb9155edaf0dfee9403
                              • Opcode Fuzzy Hash: 9304380911033293320c81f2acf6376005448f402ff89b2ee30c3c9f99823c00
                              • Instruction Fuzzy Hash: 3161BD72A08F8681EB05CF51D4583AD3BA1FB98F84F498036EA0C87395EF78D905D385
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                              • API String ID: 384173800-1835852900
                              • Opcode ID: d15966665af7c63bfc69cf10254b49aa8a80bc0e5efb5ff61f34cf4ca4ebe78a
                              • Instruction ID: d102b2b08da03fb570ef5c8b7b9e32e2d77a20ec8170991d2db9b85d5a03411c
                              • Opcode Fuzzy Hash: d15966665af7c63bfc69cf10254b49aa8a80bc0e5efb5ff61f34cf4ca4ebe78a
                              • Instruction Fuzzy Hash: 1101CC24B49E47D0EB15DB65FC6057963A4BF45FA8F980532DD4D82210EE3CE149E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: strlen
                              • String ID: ,{lW$,{lW$DZ3$MZ$lcJ$lcJ
                              • API String ID: 39653677-2314944304
                              • Opcode ID: 79f6aedf410f87875a6a9b3bfdde9027fafa175417fa9fb1544a18631473e473
                              • Instruction ID: 19a3777862a9e930e41399151b81b136337add30a1a848f9a2fe246d37da3c57
                              • Opcode Fuzzy Hash: 79f6aedf410f87875a6a9b3bfdde9027fafa175417fa9fb1544a18631473e473
                              • Instruction Fuzzy Hash: 3CC18F61A08D8685E721DB35E8603BE6362BFC0B74F844031EA4D87799DF7CE549E784
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitlongjmp
                              • String ID: 5$ReraiseDefect$fatal.nim$sysFatal
                              • API String ID: 2266059207-1761478562
                              • Opcode ID: a6c7970276e8315dc3e21b04744d58606a569a86ae19e790ef2c0b0b35e27dc3
                              • Instruction ID: e55671148f0f03caff3e758b2aed497518041f0d19bc6e8a57b74c348c7a1ac4
                              • Opcode Fuzzy Hash: a6c7970276e8315dc3e21b04744d58606a569a86ae19e790ef2c0b0b35e27dc3
                              • Instruction Fuzzy Hash: BE314A35A09E06A0EB009B24E4982BD73A4FF94FA4F540436DA1C83392EF38E544E3D8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CopyInitializeVariant
                              • String ID: VariantConversionError$com.nim$toVariant
                              • API String ID: 633353902-3035603046
                              • Opcode ID: a4a9e674decf4443f4f046d4eab1aa7a00194a0de938a3e5601d8abe73fc4c3c
                              • Instruction ID: 36d0cc5df852142adc3d7a8c94db8a3e5ce0b50070a4ed0f83a56b304223b77f
                              • Opcode Fuzzy Hash: a4a9e674decf4443f4f046d4eab1aa7a00194a0de938a3e5601d8abe73fc4c3c
                              • Instruction Fuzzy Hash: CF915921A0AF4280EB109B75E8643BE63A0FF94FA4F940535DA4D87799DF7CE404E788
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: CCG
                              • API String ID: 0-1584390748
                              • Opcode ID: a4381fa92cb0d565006f9dfff1b99eef7e1d365cb7ea1ddf9efebcac2aa79064
                              • Instruction ID: 1fc4314baea558ae1293197643bde0afdc45d822699a79892980f7aa536beef9
                              • Opcode Fuzzy Hash: a4381fa92cb0d565006f9dfff1b99eef7e1d365cb7ea1ddf9efebcac2aa79064
                              • Instruction Fuzzy Hash: 52410672E09F0589F7208B74D55437C23A1AB45BB8F204A35D92DC7BEACE3CE941A385
                              APIs
                              Strings
                              • [GC] cannot register global variable; too many global variables, xrefs: 00007FF618641E5C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitfflushfwrite
                              • String ID: [GC] cannot register global variable; too many global variables
                              • API String ID: 3476253079-2146260042
                              • Opcode ID: f6d201c6bb657294f93126c72b70e15c6ccc17db40f33077b8880073670369d6
                              • Instruction ID: 4272ef23a561b587f934a18aa4c0591e944861dce32174515a312b896c59a25f
                              • Opcode Fuzzy Hash: f6d201c6bb657294f93126c72b70e15c6ccc17db40f33077b8880073670369d6
                              • Instruction Fuzzy Hash: 93516BB2B05E5181EF44CB28D0643BC27A1FB94F94F558631CA1E87392EF7EE5469384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AddressProcexit
                              • String ID: @$could not import:
                              • API String ID: 2129014486-260091680
                              • Opcode ID: ffafcb9df3c3e3d8a139c628257651b0e5f35b96b7a06be2ac633388f5863d0a
                              • Instruction ID: c4a56ba508c6b5748bafc265ca7209f7d873cfe7036ef82ba93ddf71c1da3526
                              • Opcode Fuzzy Hash: ffafcb9df3c3e3d8a139c628257651b0e5f35b96b7a06be2ac633388f5863d0a
                              • Instruction Fuzzy Hash: 35312552F09A8291EF25D739E9203BD5B52AB85BD4F584135CF0E47385DE2DD0069384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitlongjmp
                              • String ID: fatal.nim$sysFatal
                              • API String ID: 2266059207-2644091575
                              • Opcode ID: c24e095f600e90dd0071e4f52d71d25d6e3d9d32fe2a5d83d3d4b835c7dc1ab1
                              • Instruction ID: 6016670c031afd4bdfee767afd1fe5d401352b52084db3128634fe6527bcc251
                              • Opcode Fuzzy Hash: c24e095f600e90dd0071e4f52d71d25d6e3d9d32fe2a5d83d3d4b835c7dc1ab1
                              • Instruction Fuzzy Hash: F3417472A05E0691EF009B28D8A877D73A4FB98FE4F544535EA4C87790EF78D445D388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ErrorLastexitfwritestrlen
                              • String ID: (bad format; library may be wrong architecture)$could not load:
                              • API String ID: 671075621-2754783905
                              • Opcode ID: 51cbf49d1914b27e1f1b5dfa9d7d0e78acbbf09de8430b78a8be3013a6eed925
                              • Instruction ID: 8aa0e071a75e1ca80512bd772d9fd2a198c1d5d3e89d8d2ce41442d936af29f5
                              • Opcode Fuzzy Hash: 51cbf49d1914b27e1f1b5dfa9d7d0e78acbbf09de8430b78a8be3013a6eed925
                              • Instruction Fuzzy Hash: B2014450B09E5381FB04B771E8653B852A6AF94FA0F540035DD0EC73C7EE2DA441D399
                              APIs
                              Strings
                              • [GC] cannot register thread local variable; too many thread local variables, xrefs: 00007FF618641E0C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitfflushfwrite
                              • String ID: [GC] cannot register thread local variable; too many thread local variables
                              • API String ID: 3476253079-685140759
                              • Opcode ID: b0b8e0b35887b2fe47ecad4396eab2e2ac4f058f9d5d47144fdd08601c8bd8f4
                              • Instruction ID: 7c016e40807b1a637b9a24bddbe56de7df40422fda87856fb7041b1c98f0c97b
                              • Opcode Fuzzy Hash: b0b8e0b35887b2fe47ecad4396eab2e2ac4f058f9d5d47144fdd08601c8bd8f4
                              • Instruction Fuzzy Hash: 9EE08C20A04A814AE3006BB2A4153B86650FF97F90F401034D90E973C3CE2D90429388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID: CLRError$clr.nim$clrError
                              • API String ID: 438689982-2830349459
                              • Opcode ID: e048558dc86e6f5a9352b3e37d4a831861b57ce832144c4fdce3ff389ed0c927
                              • Instruction ID: 06c78d002ca072f97161da44ba19796811ac4b373146f5cba75e83525047d9ab
                              • Opcode Fuzzy Hash: e048558dc86e6f5a9352b3e37d4a831861b57ce832144c4fdce3ff389ed0c927
                              • Instruction Fuzzy Hash: B491E362A08F8255EB158B25A9102BD2B61FF84FB4F440231EF6D8B3C2DF2CE550E394
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocInitializeString
                              • String ID:
                              • API String ID: 1889743751-0
                              • Opcode ID: e0bb64149f93d728e33b5e0fbb6459ea89275909b76d61481fabf21199463d14
                              • Instruction ID: 265b1ecc6406499e316111c48663d00cf411d4df90e3a842864f0a4313cfbb6a
                              • Opcode Fuzzy Hash: e0bb64149f93d728e33b5e0fbb6459ea89275909b76d61481fabf21199463d14
                              • Instruction Fuzzy Hash: 7D51AF62B0AF4690FB109B35A82437E67A0BF94FA4F584135DA0D87395EF3CE445E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: FreeVirtualexit
                              • String ID: virtualFree failing!
                              • API String ID: 1212090140-3108117800
                              • Opcode ID: 68b8d1335d4262310ceacde46beb014e5e86bd410c41983fcf449f0e24c4c635
                              • Instruction ID: c0a654b4bf5fbd7d27de5657561ea2011eeff32b78b79107cbd5d79d896bfdd2
                              • Opcode Fuzzy Hash: 68b8d1335d4262310ceacde46beb014e5e86bd410c41983fcf449f0e24c4c635
                              • Instruction Fuzzy Hash: AF51C2B2A05F8180EF05CB25C569BAD33A5FB94BA0F51C235C65D87384EF3AD584D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-3474627141
                              • Opcode ID: f5ed3b677f2f48d0590d541834f8938872b46eabe71cd71ba44e55bff7287e57
                              • Instruction ID: c0565396ea39fcefbfda1a7b0e3cb648e662b32f21e44c31f051f1c6f411da7f
                              • Opcode Fuzzy Hash: f5ed3b677f2f48d0590d541834f8938872b46eabe71cd71ba44e55bff7287e57
                              • Instruction Fuzzy Hash: 27217926A04F849AD711CF69E8403EA7371FF59BA8F444622EE8C57724EF38C24AC300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2187435201
                              • Opcode ID: 2dbb23b2c733bdc5e2c88e864f8e4be43479ddb640e3ee14439bc3aa9eb47380
                              • Instruction ID: 681872378f8b6965354e993a2fccc59937e916cb7d1391e2763be282fc752f8b
                              • Opcode Fuzzy Hash: 2dbb23b2c733bdc5e2c88e864f8e4be43479ddb640e3ee14439bc3aa9eb47380
                              • Instruction Fuzzy Hash: B5017C26A04F848AD711CF69D8402AA7771FF5DBA8F044722EF8D27765DF28C189D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4273532761
                              • Opcode ID: 224748f1aa114ad75b1f1ac9416724a679c86d711bcf6c7fa56f51eb8680cdc8
                              • Instruction ID: b8a7bd9c511dfc30071d2d231488d7bc4f7f50a11415dc56549139907e78d974
                              • Opcode Fuzzy Hash: 224748f1aa114ad75b1f1ac9416724a679c86d711bcf6c7fa56f51eb8680cdc8
                              • Instruction Fuzzy Hash: 9C017C26A04F888AD711CF69D8402AA7771FF5DBA8F044722EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4064033741
                              • Opcode ID: 2ccf02da138a7f67b759a146aa06823c0007208c8fea492fe6df19dd1a8d4ce2
                              • Instruction ID: 3d7cf50a8b13dd009eac55de7e61bc2674518e2fee46bf8573463a5d05a59b90
                              • Opcode Fuzzy Hash: 2ccf02da138a7f67b759a146aa06823c0007208c8fea492fe6df19dd1a8d4ce2
                              • Instruction Fuzzy Hash: 41017C26A04F848AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4283191376
                              • Opcode ID: b8127e0a148a3f2144de23711edacc057c0f970e361e3f338bc60eb4b9e6ada2
                              • Instruction ID: 91763f853cdfd93e27d15687f58216b8973e5e8b89cd145c08e6cc80bdc146e2
                              • Opcode Fuzzy Hash: b8127e0a148a3f2144de23711edacc057c0f970e361e3f338bc60eb4b9e6ada2
                              • Instruction Fuzzy Hash: 0C017C26A04F848AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2468659920
                              • Opcode ID: 041973ba09f51f5bbe3c4b1c88ac10a69af53ca7432e29cfd1701aba7b0af9e6
                              • Instruction ID: 1b65328334aecc317225a61fbe5a9ad0f448309576b0de1484abe1593fcc8d38
                              • Opcode Fuzzy Hash: 041973ba09f51f5bbe3c4b1c88ac10a69af53ca7432e29cfd1701aba7b0af9e6
                              • Instruction Fuzzy Hash: 07015A26A04F888AD711CF69D8402AA7771FB5DBA8F044722EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2148776122.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000000.00000002.2148757452.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148804598.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148824012.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148872460.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148894285.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148955029.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148973424.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2148991435.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2713391170
                              • Opcode ID: a146f8cdcdf8742bd3899f7bf3c1021d3d1a80d061f4e761973d6a360533c67e
                              • Instruction ID: 5712630d364b0a5830d1c4483717d1c32082dd7ed30d3e5b69a8c5f8bce2d20b
                              • Opcode Fuzzy Hash: a146f8cdcdf8742bd3899f7bf3c1021d3d1a80d061f4e761973d6a360533c67e
                              • Instruction Fuzzy Hash: 8F017C26A04F888AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D340

                              Execution Graph

                              Execution Coverage:10.7%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1042
                              Total number of Limit Nodes:70
                              execution_graph 22496 25906cb1ba8 22498 25906cb1bc6 22496->22498 22497 25906cb1bcc NtCreateSection 22499 25906cb1c21 22497->22499 22498->22497 21253 25906cb1b10 21254 25906cb1b5d 21253->21254 21255 25906cb1b6f NtProtectVirtualMemory 21254->21255 21257 25906cb1bc6 21255->21257 21256 25906cb1bcc NtCreateSection 21258 25906cb1c21 21256->21258 21257->21256 21259 7ff618641125 21262 7ff618641154 21259->21262 21263 7ff618641188 21262->21263 21264 7ff618641249 21263->21264 21265 7ff61864123d _amsg_exit 21263->21265 21266 7ff61864127e 21264->21266 21267 7ff618641256 _initterm 21264->21267 21265->21266 21268 7ff618641296 _initterm 21266->21268 21271 7ff6186412bc 21266->21271 21267->21266 21268->21271 21270 7ff61864140e 21283 7ff61865d9e0 21270->21283 21278 7ff618641591 21271->21278 21274 7ff618641455 exit 21275 7ff618641462 21274->21275 21276 7ff61864146c _cexit 21275->21276 21277 7ff618641146 21275->21277 21276->21277 21279 7ff6186415b7 21278->21279 21280 7ff61864166a 21279->21280 21281 7ff6186415d2 21279->21281 21280->21270 21282 7ff6186415f1 malloc memcpy 21281->21282 21282->21279 21284 7ff61865da88 21283->21284 21285 7ff61866222f 21284->21285 21419 7ff6186420f0 GetProcAddress 21284->21419 21797 7ff618642050 strlen fwrite fflush GetLastError exit 21285->21797 21288 7ff61866223b 21798 7ff618642050 strlen fwrite fflush GetLastError exit 21288->21798 21291 7ff6186420f0 5 API calls 21297 7ff61865e86b 21291->21297 21292 7ff618662247 21799 7ff618642050 strlen fwrite fflush GetLastError exit 21292->21799 21294 7ff618662253 21800 7ff618642050 strlen fwrite fflush GetLastError exit 21294->21800 21296 7ff6186622bb 21809 7ff618641df0 fwrite fflush exit 21296->21809 21297->21296 21425 7ff61864fde0 21297->21425 21298 7ff61866225f 21801 7ff618642050 strlen fwrite fflush GetLastError exit 21298->21801 21303 7ff61866226b 21802 7ff618642050 strlen fwrite fflush GetLastError exit 21303->21802 21306 7ff618662277 21803 7ff618642050 strlen fwrite fflush GetLastError exit 21306->21803 21307 7ff61864fde0 15 API calls 21309 7ff61865ef15 21307->21309 21311 7ff61864fde0 15 API calls 21309->21311 21310 7ff618662283 21804 7ff618642050 strlen fwrite fflush GetLastError exit 21310->21804 21313 7ff61865ef28 21311->21313 21315 7ff61864fde0 15 API calls 21313->21315 21314 7ff61866228f 21805 7ff618642050 strlen fwrite fflush GetLastError exit 21314->21805 21317 7ff61865ef34 21315->21317 21319 7ff61864fde0 15 API calls 21317->21319 21318 7ff61866229b 21806 7ff618642050 strlen fwrite fflush GetLastError exit 21318->21806 21321 7ff61865ef61 21319->21321 21324 7ff61865ef8e signal signal signal signal 21321->21324 21322 7ff6186622a7 21807 7ff618642050 strlen fwrite fflush GetLastError exit 21322->21807 21326 7ff61865f1b2 21324->21326 21325 7ff6186622af 21808 7ff618642050 strlen fwrite fflush GetLastError exit 21325->21808 21326->21288 21328 7ff6186420f0 5 API calls 21326->21328 21329 7ff61865f1d1 21328->21329 21329->21292 21330 7ff6186420f0 5 API calls 21329->21330 21331 7ff61865f203 21330->21331 21332 7ff61865f229 21331->21332 21333 7ff618662223 21331->21333 21335 7ff6186420f0 5 API calls 21332->21335 21796 7ff618642050 strlen fwrite fflush GetLastError exit 21333->21796 21336 7ff61865f235 21335->21336 21337 7ff6186420f0 5 API calls 21336->21337 21338 7ff61865f24f 21337->21338 21339 7ff6186420f0 5 API calls 21338->21339 21340 7ff61865f269 21339->21340 21340->21294 21341 7ff61865f28f 21340->21341 21342 7ff6186420f0 5 API calls 21341->21342 21343 7ff61865f29b 21342->21343 21344 7ff6186420f0 5 API calls 21343->21344 21345 7ff61865f2b5 21344->21345 21346 7ff6186420f0 5 API calls 21345->21346 21347 7ff61865f2cf 21346->21347 21348 7ff6186420f0 5 API calls 21347->21348 21349 7ff61865f2e9 21348->21349 21350 7ff6186420f0 5 API calls 21349->21350 21351 7ff61865f303 21350->21351 21352 7ff6186420f0 5 API calls 21351->21352 21353 7ff61865f31d 21352->21353 21354 7ff6186420f0 5 API calls 21353->21354 21355 7ff61865f337 21354->21355 21356 7ff6186420f0 5 API calls 21355->21356 21357 7ff61865f351 21356->21357 21358 7ff6186420f0 5 API calls 21357->21358 21359 7ff61865f36b 21358->21359 21360 7ff6186420f0 5 API calls 21359->21360 21361 7ff61865f385 21360->21361 21362 7ff6186420f0 5 API calls 21361->21362 21363 7ff61865f39f 21362->21363 21364 7ff6186420f0 5 API calls 21363->21364 21365 7ff61865f3b9 21364->21365 21366 7ff6186420f0 5 API calls 21365->21366 21367 7ff61865f3d3 21366->21367 21367->21298 21368 7ff61865f3f9 21367->21368 21369 7ff6186420f0 5 API calls 21368->21369 21370 7ff61865f40c 21369->21370 21371 7ff6186420f0 5 API calls 21370->21371 21372 7ff61865f426 21371->21372 21372->21303 21373 7ff61865f532 21372->21373 21374 7ff6186420f0 5 API calls 21373->21374 21375 7ff61865f53e 21374->21375 21376 7ff6186420f0 5 API calls 21375->21376 21377 7ff61865f558 21376->21377 21377->21310 21378 7ff6186420f0 5 API calls 21377->21378 21379 7ff618661940 21378->21379 21380 7ff6186420f0 5 API calls 21379->21380 21381 7ff61866195a 21380->21381 21381->21306 21382 7ff618661980 21381->21382 21383 7ff6186420f0 5 API calls 21382->21383 21384 7ff61866198c 21383->21384 21385 7ff6186420f0 5 API calls 21384->21385 21386 7ff6186619a6 21385->21386 21387 7ff6186420f0 5 API calls 21386->21387 21388 7ff6186619c0 21387->21388 21389 7ff6186420f0 5 API calls 21388->21389 21390 7ff6186619da 21389->21390 21391 7ff6186420f0 5 API calls 21390->21391 21392 7ff6186619f4 21391->21392 21393 7ff6186420f0 5 API calls 21392->21393 21394 7ff618661a0e 21393->21394 21394->21314 21395 7ff618661a34 21394->21395 21396 7ff6186420f0 5 API calls 21395->21396 21397 7ff618661a40 21396->21397 21397->21318 21398 7ff618661a66 21397->21398 21399 7ff6186420f0 5 API calls 21398->21399 21400 7ff618661a79 21399->21400 21401 7ff6186420f0 5 API calls 21400->21401 21402 7ff618661a93 21401->21402 21403 7ff6186420f0 5 API calls 21402->21403 21404 7ff618661aad 21403->21404 21433 7ff61864bb80 21404->21433 21406 7ff618662107 21406->21322 21407 7ff618662125 21406->21407 21408 7ff6186420f0 5 API calls 21407->21408 21409 7ff618662131 21408->21409 21409->21325 21410 7ff618662157 21409->21410 21411 7ff6186420f0 5 API calls 21410->21411 21412 7ff618662163 21411->21412 21413 7ff6186420f0 5 API calls 21412->21413 21414 7ff61866217d 21413->21414 21445 7ff618648c30 21414->21445 21415 7ff61866218e 21475 7ff61864c240 21415->21475 21416 7ff618641445 21416->21274 21416->21275 21420 7ff618642115 21419->21420 21422 7ff618642127 21419->21422 21420->21291 21421 7ff618641db0 strlen fwrite fflush 21421->21422 21422->21420 21422->21421 21810 7ff618641db0 strlen fwrite 21422->21810 21424 7ff61864223a exit 21424->21422 21813 7ff6186429d0 21425->21813 21428 7ff61864fe50 21432 7ff61864fe60 21428->21432 21823 7ff618642d60 12 API calls 21428->21823 21429 7ff61864ff3a 21429->21432 21824 7ff618642290 21429->21824 21432->21307 21880 7ff61864b420 21433->21880 21435 7ff61864bce2 21435->21406 21437 7ff61864b420 37 API calls 21438 7ff61864bbb1 21437->21438 21438->21435 21438->21437 21439 7ff618643f10 37 API calls 21438->21439 21441 7ff618643f10 37 API calls 21438->21441 21444 7ff61864bc94 memcpy 21438->21444 21884 7ff618643f10 21438->21884 21893 7ff618646370 37 API calls 21438->21893 21442 7ff61864bd6d memcpy 21439->21442 21441->21438 21442->21438 21443 7ff61864bc5f memcpy 21443->21444 21444->21438 21446 7ff618648c43 _fileno _setmode 21445->21446 21447 7ff618648c67 _fileno _setmode 21446->21447 21448 7ff618648c7d _fileno _setmode SetConsoleOutputCP SetConsoleCP LoadLibraryA 21447->21448 21449 7ff618648cb7 GetProcAddress 21448->21449 21455 7ff618648cc4 21448->21455 21449->21455 21450 7ff618648fb9 22036 7ff618641df0 fwrite fflush exit 21450->22036 21452 7ff618648fbe 22037 7ff618641e40 fwrite fflush exit VariantClear 21452->22037 21455->21450 21455->21452 21456 7ff618648e04 21455->21456 21457 7ff618648e68 21456->21457 21458 7ff618648e59 CoInitialize 21456->21458 21994 7ff618652480 21457->21994 21458->21457 21461 7ff618648e85 21463 7ff618648e91 21461->21463 22020 7ff618650300 21461->22020 21462 7ff618648f50 21464 7ff618650300 57 API calls 21462->21464 22002 7ff6186487d0 21463->22002 21469 7ff618648f55 21464->21469 21468 7ff618648edb 21468->21415 22034 7ff618650240 20 API calls 21469->22034 21470 7ff618648f0d 21470->21463 22035 7ff618650240 20 API calls 21470->22035 21474 7ff618648ef5 21474->21415 21476 7ff61864c25c 21475->21476 21770 7ff61864d1d2 21475->21770 21486 7ff61864c3c1 RtlGetVersion 21476->21486 21476->21770 21479 7ff618654230 21480 7ff618643f10 37 API calls 21479->21480 21481 7ff618654254 21480->21481 21482 7ff61864b420 37 API calls 21481->21482 21483 7ff618654273 21482->21483 21484 7ff61864bb80 41 API calls 21483->21484 21485 7ff618654280 HeapCreate 21484->21485 21487 7ff6186542aa 21485->21487 21503 7ff61864c3f3 21486->21503 21488 7ff61864b420 37 API calls 21487->21488 21490 7ff6186542e6 21488->21490 21489 7ff61864b420 37 API calls 21489->21503 21491 7ff61864bb80 41 API calls 21490->21491 21492 7ff6186542f3 21491->21492 22148 7ff61864f6d0 21492->22148 21493 7ff61864bb80 41 API calls 21493->21503 21495 7ff61864ccc0 21497 7ff61864cce7 21495->21497 22355 7ff618650240 20 API calls 21495->22355 21506 7ff61864b420 37 API calls 21497->21506 21498 7ff61864b420 37 API calls 21501 7ff618654324 21498->21501 21499 7ff61864cb80 22353 7ff618651ec0 37 API calls 21499->22353 21500 7ff618650240 20 API calls 21500->21503 21505 7ff61864bb80 41 API calls 21501->21505 21503->21489 21503->21493 21503->21495 21503->21499 21503->21500 21507 7ff618645b50 57 API calls 21503->21507 21509 7ff618654331 21505->21509 21510 7ff61864cd13 21506->21510 21511 7ff61864c4af memcpy 21507->21511 21508 7ff61864cb98 memcpy 21508->21503 21513 7ff61864f6d0 65 API calls 21509->21513 21514 7ff618643f10 37 API calls 21510->21514 21531 7ff61864cda7 21510->21531 21745 7ff61864c4d9 21511->21745 21512 7ff618645b50 57 API calls 21512->21745 21516 7ff618654351 21513->21516 21517 7ff61864cd4d 21514->21517 21515 7ff618643f10 37 API calls 21515->21531 21518 7ff61864b420 37 API calls 21516->21518 21519 7ff61864cd6c memcpy 21517->21519 21520 7ff61864cd8d memcpy 21517->21520 21522 7ff618654362 21518->21522 21519->21520 21520->21531 21521 7ff61864d159 memcpy 21521->21531 21523 7ff61864bb80 41 API calls 21522->21523 21524 7ff61865436f 21523->21524 21527 7ff61864f6d0 65 API calls 21524->21527 21525 7ff61864b420 37 API calls 21525->21531 21529 7ff61865438f 21527->21529 21528 7ff61864bb80 41 API calls 21528->21531 21530 7ff61864b420 37 API calls 21529->21530 21532 7ff6186543a0 21530->21532 21531->21515 21531->21521 21531->21525 21531->21528 22145 7ff618644090 21531->22145 22358 7ff618650240 20 API calls 21531->22358 21535 7ff61864bb80 41 API calls 21532->21535 21534 7ff618650240 20 API calls 21534->21745 21537 7ff6186543ad 21535->21537 21539 7ff61864f6d0 65 API calls 21537->21539 21538 7ff61864b420 37 API calls 21547 7ff61864ce39 21538->21547 21540 7ff6186543d1 21539->21540 21542 7ff61864b420 37 API calls 21540->21542 21541 7ff61864b420 37 API calls 21541->21547 21543 7ff6186543e2 21542->21543 21545 7ff61864bb80 41 API calls 21543->21545 21544 7ff61864bb80 41 API calls 21544->21547 21546 7ff6186543f6 21545->21546 21548 7ff61864f6d0 65 API calls 21546->21548 21547->21541 21547->21544 21549 7ff618644090 37 API calls 21547->21549 21550 7ff61865441a 21548->21550 21551 7ff61864ce8b GetFileAttributesW 21549->21551 21553 7ff61864bb80 41 API calls 21550->21553 21554 7ff61864ce9d OpenProcess 21551->21554 21555 7ff61864d0f0 21551->21555 21552 7ff61864b420 37 API calls 21552->21745 21557 7ff61865442b 21553->21557 21558 7ff61864d07c 21554->21558 21559 7ff61864cebd 21554->21559 21560 7ff618644090 37 API calls 21555->21560 21565 7ff61864f6d0 65 API calls 21557->21565 21561 7ff61864b420 37 API calls 21558->21561 21562 7ff61864b420 37 API calls 21559->21562 21563 7ff61864d111 GetFileAttributesW 21560->21563 21564 7ff61864d08d 21561->21564 21566 7ff61864cece 21562->21566 21563->21531 21567 7ff61864bb80 41 API calls 21564->21567 21568 7ff61865444b VirtualProtect 21565->21568 21569 7ff61864bb80 41 API calls 21566->21569 21571 7ff61864d09a 21567->21571 21572 7ff61864bb80 41 API calls 21568->21572 21577 7ff61864cedb 21569->21577 21570 7ff618646670 39 API calls 21570->21745 22359 7ff618641d60 20 API calls 21571->22359 21574 7ff61865447b 21572->21574 21583 7ff6186544ca 21574->21583 21584 7ff6186544a4 21574->21584 21575 7ff61864cf0e 21578 7ff61864b420 37 API calls 21575->21578 21576 7ff61864d0a9 22360 7ff618644270 38 API calls 21576->22360 21577->21575 22357 7ff618650240 20 API calls 21577->22357 21580 7ff61864cf26 21578->21580 21585 7ff61864bb80 41 API calls 21580->21585 21581 7ff61864d0bc 21581->21559 22361 7ff618650240 20 API calls 21581->22361 21587 7ff61864bb80 41 API calls 21583->21587 21586 7ff61864bb80 41 API calls 21584->21586 21588 7ff61864cf33 21585->21588 21589 7ff6186544b5 21586->21589 21597 7ff6186544db 21587->21597 21590 7ff61864cf4b GetModuleHandleA 21588->21590 21591 7ff61864cf3f 21588->21591 22363 7ff618652bf0 fputc fputc fwrite fputc 21589->22363 21594 7ff61864b420 37 API calls 21590->21594 21591->21590 21595 7ff61864cf65 21594->21595 21596 7ff61864bb80 41 API calls 21595->21596 21599 7ff61864cf72 GetProcAddress 21596->21599 21598 7ff618655848 21597->21598 22173 7ff618648350 21597->22173 21601 7ff61864bb80 41 API calls 21598->21601 21599->21479 21604 7ff618655869 21601->21604 22382 7ff618652bf0 fputc fputc fwrite fputc 21604->22382 21605 7ff61864bb80 41 API calls 21605->21745 21606 7ff618654577 21609 7ff618644090 37 API calls 21606->21609 21712 7ff6186549ab 21606->21712 21613 7ff618654648 21609->21613 21610 7ff61865456f 22365 7ff61864d1f0 59 API calls 21610->22365 21612 7ff618648350 60 API calls 21616 7ff618654a21 21612->21616 21614 7ff618654680 21613->21614 21615 7ff618655840 21613->21615 21619 7ff618644090 37 API calls 21613->21619 21617 7ff61864b420 37 API calls 21614->21617 22381 7ff61864fbe0 38 API calls 21615->22381 21621 7ff618654a38 21616->21621 22373 7ff6186483f0 62 API calls 21616->22373 21653 7ff61865469a 21617->21653 21618 7ff618643f10 37 API calls 21674 7ff618654dd5 21618->21674 21619->21613 21622 7ff61864bb80 41 API calls 21621->21622 21621->21674 21624 7ff618654a51 21622->21624 21627 7ff618654a5d 21624->21627 21628 7ff618654a69 LoadLibraryA 21624->21628 21625 7ff618648350 60 API calls 21625->21653 21626 7ff618654a30 22374 7ff61864d1f0 59 API calls 21626->22374 21627->21628 21630 7ff61864bb80 41 API calls 21628->21630 21636 7ff618654a83 GetProcAddress 21630->21636 21631 7ff61865478b 21633 7ff61864b420 37 API calls 21631->21633 21632 7ff61864b420 37 API calls 21632->21653 21637 7ff6186547a4 21633->21637 21634 7ff618648350 60 API calls 21634->21674 21639 7ff618645b50 57 API calls 21636->21639 22367 7ff618644a80 39 API calls 21637->22367 21640 7ff618654abb 21639->21640 21641 7ff618654fdd exit 21640->21641 21645 7ff618645b50 57 API calls 21640->21645 21641->21674 21643 7ff618652af0 fputc fputc fputc 21656 7ff618654d83 21643->21656 21644 7ff618643f10 37 API calls 21644->21653 21648 7ff618654be0 21645->21648 21646 7ff6186547e6 21647 7ff61864b420 37 API calls 21646->21647 21655 7ff6186547ff 21647->21655 21654 7ff618656050 21648->21654 21659 7ff618654c8a 21648->21659 21649 7ff61864f3c0 37 API calls 21649->21745 21650 7ff618654719 memcpy 21650->21653 21651 7ff618654738 memcpy 21651->21653 21652 7ff61865475b memcpy 21652->21653 21653->21625 21653->21631 21653->21632 21653->21644 21653->21650 21653->21651 21653->21652 22366 7ff6186483f0 62 API calls 21653->22366 21657 7ff61864bb80 41 API calls 21654->21657 21663 7ff618643f10 37 API calls 21655->21663 21656->21641 21656->21643 21660 7ff6186559dc fwrite 21656->21660 21656->21674 21683 7ff61864bb80 41 API calls 21656->21683 21717 7ff618654e64 fwrite 21656->21717 22378 7ff618651ec0 37 API calls 21656->22378 22380 7ff618651ec0 37 API calls 21656->22380 22383 7ff618652bf0 fputc fputc fwrite fputc 21656->22383 21658 7ff618656061 21657->21658 21661 7ff618643f10 37 API calls 21658->21661 21662 7ff61864bb80 41 API calls 21659->21662 21659->21674 21666 7ff6186559fe fflush 21660->21666 21692 7ff618656094 21661->21692 21664 7ff618654cc7 21662->21664 21665 7ff618654850 21663->21665 22375 7ff618652bf0 fputc fputc fwrite fputc 21664->22375 21668 7ff61865486a memcpy 21665->21668 21669 7ff618654885 21665->21669 21666->21674 21668->21669 21670 7ff6186548aa 21669->21670 21671 7ff61865488a memcpy 21669->21671 21672 7ff6186548af memcpy 21670->21672 21673 7ff6186548d1 21670->21673 21671->21670 21672->21673 21675 7ff6186548f6 21673->21675 21676 7ff6186548d6 memcpy 21673->21676 21674->21618 21674->21634 21674->21641 21674->21656 21677 7ff61864bb80 41 API calls 21674->21677 21682 7ff61864bb80 41 API calls 21674->21682 21693 7ff618650300 57 API calls 21674->21693 21699 7ff618655ec9 21674->21699 21709 7ff6186525f0 36 API calls 21674->21709 21714 7ff618649280 44 API calls 21674->21714 21718 7ff6186487d0 57 API calls 21674->21718 21719 7ff618645a20 57 API calls 21674->21719 21722 7ff6186556f5 21674->21722 21725 7ff618652480 36 API calls 21674->21725 21727 7ff618648fd0 40 API calls 21674->21727 21728 7ff6186487d0 57 API calls 21674->21728 21729 7ff618650420 20 API calls 21674->21729 21730 7ff6186483f0 62 API calls 21674->21730 21732 7ff618650240 20 API calls 21674->21732 21734 7ff61864d1f0 59 API calls 21674->21734 21737 7ff618656270 21674->21737 21739 7ff618645b50 57 API calls 21674->21739 22246 7ff618646970 21674->22246 22260 7ff61864e630 21674->22260 22270 7ff61864adb0 21674->22270 22287 7ff618652ca0 _setjmp 21674->22287 22376 7ff61864a3e0 62 API calls 21674->22376 22377 7ff618645bb0 57 API calls 21674->22377 22379 7ff61864a080 61 API calls 21674->22379 21678 7ff61865491b 21675->21678 21679 7ff6186548fb memcpy 21675->21679 21676->21675 21681 7ff6186550bc SleepEx 21677->21681 21684 7ff618644090 37 API calls 21678->21684 21679->21678 22181 7ff61864d570 21681->22181 21682->21674 21683->21656 21694 7ff618654942 21684->21694 21691 7ff618652af0 fputc fputc fputc 21691->21692 21692->21691 21706 7ff6186561d6 fwrite 21692->21706 21693->21674 21702 7ff61864b420 37 API calls 21694->21702 21699->21416 21707 7ff6186549a3 21702->21707 21711 7ff6186561f7 fflush 21706->21711 22368 7ff618646670 21707->22368 21709->21674 21711->21692 21712->21612 21714->21674 21721 7ff618654e85 fflush 21717->21721 21720 7ff618655202 SafeArrayCreate 21718->21720 21719->21674 21720->21674 21721->21656 21724 7ff61864adb0 99 API calls 21722->21724 21726 7ff61865573d 21724->21726 21725->21674 21726->21416 21727->21674 21728->21674 21729->21674 21730->21674 21732->21674 21733 7ff61864e020 41 API calls 21733->21745 21734->21674 21736 7ff6186554b5 memcpy 21736->21674 21738 7ff618645b50 57 API calls 21737->21738 21740 7ff618656283 21738->21740 21739->21674 21742 7ff61865580c memcpy 21742->21674 21743 7ff61864e170 43 API calls 21743->21745 21744 7ff61864c0f0 41 API calls 21744->21745 21745->21512 21745->21534 21745->21552 21745->21570 21745->21605 21745->21649 21745->21733 21745->21743 21745->21744 21746 7ff61864caa0 21745->21746 21747 7ff61864ca71 GetProcessHeap GetProcessHeap 21745->21747 21748 7ff61864ca91 exit 21745->21748 21750 7ff61864cbca 21745->21750 21749 7ff61864b420 37 API calls 21746->21749 22352 7ff618652bf0 fputc fputc fwrite fputc 21746->22352 21747->21745 21747->21748 21748->21746 21749->21746 22066 7ff61864be00 GetCurrentThread GetThreadContext 21750->22066 21753 7ff61864cbcf 21755 7ff61864cbd7 21753->21755 21756 7ff61864cfb0 21753->21756 21758 7ff61864b420 37 API calls 21755->21758 21757 7ff61864b420 37 API calls 21756->21757 21759 7ff61864cfc3 21757->21759 21760 7ff61864cbe8 21758->21760 21762 7ff61864d178 21759->21762 21763 7ff61864cfde 21759->21763 21761 7ff61864bb80 41 API calls 21760->21761 21771 7ff61864cbf5 21761->21771 21765 7ff618643f10 37 API calls 21762->21765 21764 7ff618643f10 37 API calls 21763->21764 21766 7ff61864cffd 21764->21766 21768 7ff61864d194 21765->21768 21769 7ff61864d01b memcpy memcpy 21766->21769 21766->21770 21767 7ff61864cc29 22075 7ff61864f3c0 21767->22075 21772 7ff61864d1b2 memcpy 21768->21772 21773 7ff61864d054 21768->21773 21769->21773 22362 7ff618641e40 fwrite fflush exit VariantClear 21770->22362 21771->21767 22354 7ff618650240 20 API calls 21771->22354 21772->21773 22356 7ff618641d60 20 API calls 21773->22356 21778 7ff61864d063 21778->21577 21783 7ff61864f3c0 37 API calls 21784 7ff61864cc54 21783->21784 21785 7ff61864e020 41 API calls 21784->21785 21786 7ff61864cc5c 21785->21786 21787 7ff61864e170 43 API calls 21786->21787 21788 7ff61864cc6e 21787->21788 21789 7ff61864f3c0 37 API calls 21788->21789 21790 7ff61864cc73 21789->21790 21791 7ff61864e020 41 API calls 21790->21791 21792 7ff61864cc7b 21791->21792 21793 7ff61864e170 43 API calls 21792->21793 21794 7ff61864cc8d GetTickCount Sleep SleepEx 21793->21794 21794->21497 21795 7ff61864ccaf exit 21794->21795 21795->21495 21811 7ff61865d018 fflush 21810->21811 21811->21424 21812 7ff6187073bc 21811->21812 21814 7ff6186429ed 21813->21814 21822 7ff618642b96 21813->21822 21815 7ff618642cf4 21814->21815 21816 7ff618642370 15 API calls 21814->21816 21819 7ff618642b46 21814->21819 21814->21822 21815->21822 21846 7ff618642370 21815->21846 21816->21815 21818 7ff618642290 12 API calls 21820 7ff618642bea 21818->21820 21819->21822 21842 7ff618642610 21819->21842 21820->21428 21820->21429 21822->21818 21822->21820 21823->21432 21825 7ff6186422a9 21824->21825 21826 7ff618642300 VirtualAlloc 21824->21826 21825->21826 21827 7ff6186422b1 21825->21827 21826->21827 21828 7ff618642360 21826->21828 21827->21432 21829 7ff618642260 8 API calls 21828->21829 21831 7ff618642365 21829->21831 21830 7ff6186425d4 21830->21432 21831->21830 21832 7ff6186425b8 VirtualAlloc 21831->21832 21833 7ff6186423c4 VirtualAlloc 21831->21833 21834 7ff6186425cf 21832->21834 21839 7ff6186423e2 21832->21839 21835 7ff6186423db 21833->21835 21836 7ff6186425e4 VirtualAlloc 21833->21836 21838 7ff618642260 8 API calls 21834->21838 21835->21839 21836->21834 21837 7ff6186425ff 21836->21837 21838->21830 21840 7ff618642290 8 API calls 21839->21840 21841 7ff618642426 21839->21841 21840->21841 21841->21432 21843 7ff618642666 21842->21843 21844 7ff6186426e6 21843->21844 21845 7ff618642290 12 API calls 21843->21845 21844->21822 21845->21844 21847 7ff6186425d4 21846->21847 21848 7ff61864238c 21846->21848 21847->21819 21849 7ff6186425b8 VirtualAlloc 21848->21849 21850 7ff6186423c4 VirtualAlloc 21848->21850 21851 7ff6186425cf 21849->21851 21856 7ff6186423e2 21849->21856 21852 7ff6186423db 21850->21852 21853 7ff6186425e4 VirtualAlloc 21850->21853 21859 7ff618642260 21851->21859 21852->21856 21853->21851 21854 7ff6186425ff 21853->21854 21857 7ff618642290 12 API calls 21856->21857 21858 7ff618642426 21856->21858 21857->21858 21858->21819 21860 7ff61864226f 21859->21860 21861 7ff618641db0 3 API calls 21860->21861 21862 7ff61864227e exit 21861->21862 21863 7ff618642290 21862->21863 21864 7ff618642300 VirtualAlloc 21863->21864 21865 7ff6186422b1 21863->21865 21864->21865 21866 7ff618642360 21864->21866 21865->21847 21867 7ff618642260 7 API calls 21866->21867 21869 7ff618642365 21867->21869 21868 7ff6186425d4 21868->21847 21869->21868 21870 7ff6186425b8 VirtualAlloc 21869->21870 21871 7ff6186423c4 VirtualAlloc 21869->21871 21872 7ff6186425cf 21870->21872 21877 7ff6186423e2 21870->21877 21873 7ff6186423db 21871->21873 21874 7ff6186425e4 VirtualAlloc 21871->21874 21876 7ff618642260 7 API calls 21872->21876 21873->21877 21874->21872 21875 7ff6186425ff 21874->21875 21876->21868 21878 7ff618642290 7 API calls 21877->21878 21879 7ff618642426 21877->21879 21878->21879 21879->21847 21881 7ff61864b471 21880->21881 21883 7ff61864b47c 21880->21883 21881->21883 21894 7ff618646370 37 API calls 21881->21894 21883->21438 21885 7ff618643f31 21884->21885 21888 7ff618643f41 21885->21888 21914 7ff618650460 21885->21914 21895 7ff618642ea0 21888->21895 21889 7ff618643f8c memset 21889->21443 21891 7ff618643f51 21891->21889 21969 7ff618643bd0 20 API calls 21891->21969 21893->21438 21894->21883 21896 7ff618642f30 21895->21896 21897 7ff618642ec5 21895->21897 21898 7ff618643098 21896->21898 21899 7ff618642f45 21896->21899 21900 7ff618642ed6 21897->21900 21901 7ff618642fa0 VirtualAlloc 21897->21901 21902 7ff6186429d0 15 API calls 21898->21902 21905 7ff618642260 12 API calls 21899->21905 21906 7ff618642f09 21899->21906 21904 7ff6186429d0 15 API calls 21900->21904 21901->21899 21903 7ff618642fc3 21901->21903 21902->21906 21907 7ff618643003 21903->21907 21910 7ff618643022 21903->21910 21908 7ff618642ede 21904->21908 21909 7ff618643162 21905->21909 21906->21891 21912 7ff618642290 12 API calls 21907->21912 21970 7ff618642d60 12 API calls 21908->21970 21910->21908 21913 7ff618643125 21912->21913 21913->21891 21916 7ff618650478 21914->21916 21915 7ff618651ac9 21915->21888 21916->21915 21930 7ff618642ea0 16 API calls 21916->21930 21931 7ff618642ea0 16 API calls 21916->21931 21932 7ff618650c69 21916->21932 21933 7ff618642ea0 16 API calls 21916->21933 21939 7ff618642ea0 16 API calls 21916->21939 21940 7ff618642ea0 16 API calls 21916->21940 21943 7ff618642ea0 16 API calls 21916->21943 21951 7ff618642ea0 16 API calls 21916->21951 21952 7ff618642ea0 16 API calls 21916->21952 21955 7ff618642ea0 16 API calls 21916->21955 21960 7ff618642ea0 16 API calls 21916->21960 21963 7ff618642ea0 16 API calls 21916->21963 21918 7ff618650cd5 21918->21888 21919 7ff618650c8f 21920 7ff618651622 21919->21920 21921 7ff618650ca4 21919->21921 21922 7ff61864ddd0 23 API calls 21919->21922 21923 7ff618651649 21920->21923 21986 7ff618643170 VirtualFree exit fputc 21920->21986 21921->21918 21977 7ff618650240 20 API calls 21921->21977 21922->21919 21987 7ff618643170 VirtualFree exit fputc 21923->21987 21927 7ff61865166b 21928 7ff618642ea0 16 API calls 21927->21928 21929 7ff61865168e 21928->21929 21937 7ff61865170f 21929->21937 21988 7ff61864fff0 22 API calls 21929->21988 21935 7ff618651016 memcpy 21930->21935 21936 7ff618651080 memcpy 21931->21936 21971 7ff61864ddd0 21932->21971 21938 7ff61865159b memcpy 21933->21938 21979 7ff618643170 VirtualFree exit fputc 21935->21979 21980 7ff618643170 VirtualFree exit fputc 21936->21980 21967 7ff618651788 21937->21967 21989 7ff61864fff0 22 API calls 21937->21989 21985 7ff618643170 VirtualFree exit fputc 21938->21985 21945 7ff618651a15 memcpy 21939->21945 21946 7ff618651a7a memcpy 21940->21946 21948 7ff618651217 memcpy 21943->21948 21991 7ff618643170 VirtualFree exit fputc 21945->21991 21992 7ff618643170 VirtualFree exit fputc 21946->21992 21981 7ff618643170 VirtualFree exit fputc 21948->21981 21954 7ff6186513aa memcpy 21951->21954 21956 7ff618651474 memcpy 21952->21956 21982 7ff618643170 VirtualFree exit fputc 21954->21982 21958 7ff61865140f memcpy 21955->21958 21984 7ff618643170 VirtualFree exit fputc 21956->21984 21983 7ff618643170 VirtualFree exit fputc 21958->21983 21962 7ff618650ea5 memcpy 21960->21962 21978 7ff618643170 VirtualFree exit fputc 21962->21978 21965 7ff6186519b0 memcpy 21963->21965 21990 7ff618643170 VirtualFree exit fputc 21965->21990 21967->21921 21968 7ff618643170 VirtualFree exit fputc 21967->21968 21968->21967 21969->21889 21970->21906 21976 7ff61864ddf0 21971->21976 21972 7ff61864df00 21972->21919 21973 7ff61864de50 VariantClear 21973->21976 21974 7ff618643c70 22 API calls 21974->21976 21976->21972 21976->21973 21976->21974 21993 7ff618643170 VirtualFree exit fputc 21976->21993 21977->21921 21978->21916 21979->21916 21980->21916 21981->21916 21982->21916 21983->21916 21984->21916 21985->21916 21986->21920 21987->21927 21988->21929 21989->21937 21990->21916 21991->21916 21992->21916 21993->21976 21995 7ff61865249f 21994->21995 21996 7ff6186524ac 21995->21996 21997 7ff618650460 35 API calls 21995->21997 21998 7ff618642ea0 16 API calls 21996->21998 21997->21996 21999 7ff6186524ba 21998->21999 22000 7ff618648e74 21999->22000 22038 7ff618643bd0 20 API calls 21999->22038 22000->21461 22000->21462 22005 7ff6186487ed 22002->22005 22003 7ff618648852 22011 7ff6186488a7 22003->22011 22040 7ff618645b50 22003->22040 22004 7ff618648c13 22061 7ff618645ac0 57 API calls 22004->22061 22005->22003 22005->22004 22008 7ff618643f10 37 API calls 22005->22008 22009 7ff618648834 22005->22009 22008->22009 22009->22003 22039 7ff618650240 20 API calls 22009->22039 22012 7ff618645b50 57 API calls 22011->22012 22017 7ff6186488f2 22011->22017 22015 7ff618648a65 22012->22015 22013 7ff618648992 22013->22011 22059 7ff618650240 20 API calls 22013->22059 22015->22004 22016 7ff618648a80 22015->22016 22015->22017 22016->22017 22060 7ff618650240 20 API calls 22016->22060 22017->21468 22019 7ff618650240 20 API calls 22017->22019 22019->21474 22021 7ff618643f10 37 API calls 22020->22021 22022 7ff618650318 22021->22022 22027 7ff61865034d 22022->22027 22063 7ff618650240 20 API calls 22022->22063 22023 7ff618650414 22065 7ff618645ac0 57 API calls 22023->22065 22026 7ff618650397 22029 7ff618643f10 37 API calls 22026->22029 22027->22023 22027->22026 22030 7ff61865039f 22029->22030 22031 7ff6186503e0 22030->22031 22064 7ff618650240 20 API calls 22030->22064 22031->21470 22033 7ff618650405 22033->21470 22034->21470 22035->21463 22038->22000 22039->22003 22041 7ff618645b77 22040->22041 22042 7ff618645ba1 22041->22042 22044 7ff618645b8f 22041->22044 22062 7ff618645ac0 57 API calls 22042->22062 22046 7ff618643f10 37 API calls 22044->22046 22047 7ff618645b94 22046->22047 22047->22013 22059->22011 22060->22017 22063->22027 22064->22033 22067 7ff61864be3a 22066->22067 22068 7ff61864bea0 22066->22068 22069 7ff61864b420 37 API calls 22067->22069 22068->21753 22070 7ff61864be4b 22069->22070 22071 7ff61864bb80 41 API calls 22070->22071 22073 7ff61864be58 22071->22073 22072 7ff61864be87 22072->21753 22073->22072 22384 7ff618650240 20 API calls 22073->22384 22076 7ff61864f40a 22075->22076 22077 7ff618643f10 37 API calls 22076->22077 22078 7ff61864cc35 22077->22078 22079 7ff61864e020 22078->22079 22080 7ff61864b420 37 API calls 22079->22080 22081 7ff61864e03e 22080->22081 22082 7ff61864bb80 41 API calls 22081->22082 22083 7ff61864e04b 22082->22083 22084 7ff61864b420 37 API calls 22083->22084 22085 7ff61864bb80 41 API calls 22083->22085 22086 7ff61864cc3d 22083->22086 22084->22083 22085->22083 22087 7ff61864e170 22086->22087 22088 7ff61864e1a3 22087->22088 22107 7ff61864cc4f 22087->22107 22089 7ff61864b420 37 API calls 22088->22089 22088->22107 22090 7ff61864e1e8 22089->22090 22091 7ff61864bb80 41 API calls 22090->22091 22092 7ff61864e1f5 22091->22092 22093 7ff61864b420 37 API calls 22092->22093 22092->22107 22094 7ff61864e20c 22093->22094 22095 7ff61864bb80 41 API calls 22094->22095 22096 7ff61864e219 22095->22096 22097 7ff61864b420 37 API calls 22096->22097 22096->22107 22098 7ff61864e2be 22097->22098 22099 7ff61864bb80 41 API calls 22098->22099 22100 7ff61864e2cb 22099->22100 22101 7ff61864e540 22100->22101 22113 7ff61864e301 22100->22113 22102 7ff61864bb80 41 API calls 22101->22102 22104 7ff61864e4ae 22102->22104 22103 7ff61864e4f1 22105 7ff61864bb80 41 API calls 22103->22105 22106 7ff61864bb80 41 API calls 22104->22106 22105->22107 22106->22107 22107->21783 22108 7ff61864b420 37 API calls 22108->22113 22109 7ff61864bb80 41 API calls 22109->22113 22110 7ff61864e39c strlen 22110->22113 22111 7ff61864e612 22112 7ff61864e3ed strlen 22112->22113 22113->22103 22113->22108 22113->22109 22113->22110 22113->22111 22113->22112 22114 7ff61864e415 22113->22114 22115 7ff61864e42e 22114->22115 22116 7ff61864e560 22114->22116 22117 7ff61864bb80 41 API calls 22115->22117 22118 7ff61864e583 22116->22118 22121 7ff61864bb80 41 API calls 22116->22121 22119 7ff61864e448 22117->22119 22120 7ff61864bb80 41 API calls 22118->22120 22122 7ff61864bb80 41 API calls 22119->22122 22123 7ff61864e59e 22120->22123 22121->22118 22124 7ff61864e459 22122->22124 22125 7ff61864bb80 41 API calls 22123->22125 22126 7ff61864bb80 41 API calls 22124->22126 22127 7ff61864e5af 22125->22127 22128 7ff61864e46a 22126->22128 22129 7ff61864bb80 41 API calls 22127->22129 22130 7ff61864bb80 41 API calls 22128->22130 22131 7ff61864e5c0 22129->22131 22132 7ff61864e47b 22130->22132 22133 7ff61864bb80 41 API calls 22131->22133 22134 7ff61864bb80 41 API calls 22132->22134 22135 7ff61864e5d1 22133->22135 22136 7ff61864e48c 22134->22136 22137 7ff61864bb80 41 API calls 22135->22137 22138 7ff61864bb80 41 API calls 22136->22138 22139 7ff61864e5e2 22137->22139 22140 7ff61864e49d 22138->22140 22141 7ff61864bb80 41 API calls 22139->22141 22142 7ff61864bb80 41 API calls 22140->22142 22143 7ff61864e5f3 22141->22143 22142->22104 22144 7ff61864bb80 41 API calls 22143->22144 22144->22104 22146 7ff618643f10 37 API calls 22145->22146 22147 7ff6186440b5 GetFileAttributesW 22146->22147 22147->21538 22149 7ff61864f71f 22148->22149 22150 7ff61864fbc8 22149->22150 22153 7ff618643f10 37 API calls 22149->22153 22386 7ff618645ac0 57 API calls 22150->22386 22155 7ff61864f74b 22153->22155 22157 7ff61864b420 37 API calls 22155->22157 22158 7ff61864f78c 22157->22158 22159 7ff61864bb80 41 API calls 22158->22159 22160 7ff61864f799 CreateFileA 22159->22160 22162 7ff61864f7fd 22160->22162 22164 7ff61864f82c ReadFile 22162->22164 22166 7ff61864fab5 22162->22166 22164->22150 22170 7ff61864f886 22164->22170 22166->21498 22167 7ff618643f10 37 API calls 22167->22170 22168 7ff61864bb80 41 API calls 22168->22170 22170->22167 22170->22168 22172 7ff61864f93f 22170->22172 22385 7ff61864f490 strstr 22170->22385 22171 7ff61864f9d5 strcmp 22171->22172 22172->22166 22172->22171 22174 7ff618648365 GetCommandLineW 22173->22174 22178 7ff6186483af 22173->22178 22387 7ff61864fbe0 38 API calls 22174->22387 22176 7ff618648378 22388 7ff618645ce0 59 API calls 22176->22388 22178->21606 22364 7ff6186483f0 62 API calls 22178->22364 22179 7ff618648380 22179->22178 22389 7ff618650240 20 API calls 22179->22389 22182 7ff61864d586 22181->22182 22183 7ff61864d5ac RtlAddVectoredExceptionHandler memset 22182->22183 22184 7ff61864d971 22182->22184 22185 7ff61864d5e8 CreateToolhelp32Snapshot 22183->22185 22186 7ff61864b420 37 API calls 22184->22186 22193 7ff61864d63c 22185->22193 22194 7ff61864d658 Thread32First 22185->22194 22187 7ff61864d982 22186->22187 22188 7ff61864bb80 41 API calls 22187->22188 22189 7ff61864d98f 22188->22189 22191 7ff61864d99b 22189->22191 22192 7ff61864d9a7 GetModuleHandleA 22189->22192 22191->22192 22223 7ff61864d9b7 22192->22223 22193->21674 22195 7ff61864dac8 22194->22195 22196 7ff61864d6a5 Thread32Next 22194->22196 22199 7ff61864b420 37 API calls 22195->22199 22197 7ff61864d6db CloseHandle 22196->22197 22198 7ff61864d6b3 GetCurrentProcessId 22196->22198 22202 7ff61864d6ec 22197->22202 22203 7ff61864d7b0 22197->22203 22198->22196 22201 7ff61864d6bf 22198->22201 22204 7ff61864dad9 22199->22204 22200 7ff61864b420 37 API calls 22200->22223 22201->22197 22201->22198 22207 7ff61864d702 OpenThread 22202->22207 22206 7ff61864b420 37 API calls 22203->22206 22205 7ff61864bb80 41 API calls 22204->22205 22209 7ff61864dae6 22205->22209 22210 7ff61864d7c1 22206->22210 22207->22193 22208 7ff61864d71e GetThreadContext 22207->22208 22208->22193 22211 7ff61864d732 22208->22211 22217 7ff61864b420 37 API calls 22209->22217 22212 7ff61864bb80 41 API calls 22210->22212 22215 7ff61864d793 CloseHandle 22211->22215 22216 7ff61864bb80 41 API calls 22211->22216 22214 7ff61864d7ce 22212->22214 22213 7ff61864d9fa GetProcAddress 22213->22223 22218 7ff61864d7da 22214->22218 22219 7ff61864d7e6 GetModuleHandleA 22214->22219 22215->22203 22215->22207 22221 7ff61864d750 SetThreadContext 22216->22221 22222 7ff61864dafc 22217->22222 22218->22219 22220 7ff61864b420 37 API calls 22219->22220 22224 7ff61864d807 22220->22224 22221->22193 22225 7ff61864d786 22221->22225 22226 7ff61864bb80 41 API calls 22222->22226 22223->22200 22223->22213 22227 7ff618646670 39 API calls 22223->22227 22232 7ff61864bb80 41 API calls 22223->22232 22228 7ff61864bb80 41 API calls 22224->22228 22229 7ff61864bb80 41 API calls 22225->22229 22230 7ff61864db09 22226->22230 22231 7ff61864da98 RtlInitUnicodeString LdrLoadDll 22227->22231 22236 7ff61864d814 22228->22236 22229->22215 22231->22223 22232->22223 22233 7ff618643f10 37 API calls 22233->22236 22234 7ff61864b420 37 API calls 22234->22236 22235 7ff61864bb80 41 API calls 22235->22236 22236->22209 22236->22233 22236->22234 22236->22235 22238 7ff61864d8e1 22236->22238 22390 7ff61864f490 strstr 22236->22390 22239 7ff61864b420 37 API calls 22238->22239 22240 7ff61864d904 22239->22240 22241 7ff61864bb80 41 API calls 22240->22241 22243 7ff61864d917 22241->22243 22242 7ff61864b420 37 API calls 22242->22243 22243->22230 22243->22242 22244 7ff61864bb80 41 API calls 22243->22244 22245 7ff61864d965 22243->22245 22244->22243 22245->22230 22247 7ff6186469a3 22246->22247 22256 7ff618646a6e 22246->22256 22249 7ff618643f10 37 API calls 22247->22249 22248 7ff618643f10 37 API calls 22258 7ff618646abc 22248->22258 22252 7ff6186469d4 22249->22252 22250 7ff618643f10 37 API calls 22250->22258 22251 7ff61864833b 22391 7ff618645ac0 57 API calls 22251->22391 22252->22251 22253 7ff618646a5f 22252->22253 22252->22258 22255 7ff618643f10 37 API calls 22253->22255 22255->22256 22256->22248 22256->22258 22257 7ff618645b50 57 API calls 22257->22258 22258->22250 22258->22257 22259 7ff618646e72 22258->22259 22259->21674 22261 7ff61864e65c _setjmp 22260->22261 22262 7ff61864e7d0 22260->22262 22267 7ff61864e6b2 22261->22267 22451 7ff61864a3e0 62 API calls 22262->22451 22269 7ff61864e7b7 22267->22269 22392 7ff61864a740 22267->22392 22449 7ff61864a3e0 62 API calls 22267->22449 22450 7ff618646540 52 API calls 22267->22450 22269->21674 22271 7ff61864adea _setjmp 22270->22271 22285 7ff61864b000 22270->22285 22272 7ff61864ae5c 22271->22272 22275 7ff61864aeb0 22271->22275 22277 7ff61864ae9f 22272->22277 22467 7ff618646540 52 API calls 22272->22467 22274 7ff61864b031 22466 7ff61864a3e0 62 API calls 22274->22466 22279 7ff61864af76 22275->22279 22280 7ff61864b080 98 API calls 22275->22280 22281 7ff61864b055 22275->22281 22464 7ff61864a3e0 62 API calls 22275->22464 22277->21674 22279->22274 22284 7ff61864a740 79 API calls 22279->22284 22280->22275 22468 7ff61864b080 99 API calls 22281->22468 22283 7ff61864b062 22284->22285 22465 7ff61864a3e0 62 API calls 22285->22465 22288 7ff618652d2f CLRCreateInstance 22287->22288 22299 7ff618652eb3 22287->22299 22289 7ff618653038 22288->22289 22290 7ff618652d5f 22288->22290 22471 7ff61864a3e0 62 API calls 22289->22471 22292 7ff618653046 22290->22292 22319 7ff618652d86 22290->22319 22472 7ff61864a3e0 62 API calls 22292->22472 22295 7ff618652f26 _setjmp 22297 7ff618653230 22295->22297 22295->22299 22300 7ff618653267 22297->22300 22475 7ff61864a3e0 62 API calls 22297->22475 22298 7ff618652db6 _setjmp 22298->22319 22299->22295 22305 7ff61865301b 22299->22305 22469 7ff618646540 52 API calls 22299->22469 22470 7ff61864a3e0 62 API calls 22299->22470 22304 7ff618646670 39 API calls 22300->22304 22301 7ff618652e19 _setjmp 22301->22319 22302 7ff618643f10 37 API calls 22302->22319 22306 7ff618653271 22304->22306 22305->21674 22307 7ff61865360e 22306->22307 22308 7ff618643f10 37 API calls 22306->22308 22314 7ff618653346 22306->22314 22307->21674 22309 7ff6186532e6 22308->22309 22311 7ff61865333c 22309->22311 22312 7ff61865331d memcpy 22309->22312 22310 7ff6186535db 22478 7ff61864a3e0 62 API calls 22310->22478 22476 7ff61864a3e0 62 API calls 22311->22476 22312->22311 22314->22310 22321 7ff6186533ac 22314->22321 22477 7ff61864a3e0 62 API calls 22314->22477 22319->22298 22319->22299 22319->22301 22319->22302 22319->22307 22319->22319 22320 7ff618653696 22319->22320 22473 7ff618646580 39 API calls 22319->22473 22474 7ff6186461c0 37 API calls 22319->22474 22322 7ff618650300 57 API calls 22320->22322 22323 7ff61865347f 22321->22323 22324 7ff618653640 22321->22324 22335 7ff618653410 22321->22335 22330 7ff6186536cd 22322->22330 22327 7ff618652480 36 API calls 22323->22327 22480 7ff61864a3e0 62 API calls 22324->22480 22326 7ff61865364e 22481 7ff61864a3e0 62 API calls 22326->22481 22329 7ff6186534d3 22327->22329 22328 7ff618653704 22336 7ff618650300 57 API calls 22328->22336 22329->22320 22333 7ff6186534e7 22329->22333 22330->22328 22484 7ff618650240 20 API calls 22330->22484 22331 7ff61865367e 22483 7ff61864a3e0 62 API calls 22331->22483 22333->22328 22338 7ff6186534fa 22333->22338 22335->22323 22335->22326 22335->22331 22339 7ff618653666 22335->22339 22345 7ff61865371d 22336->22345 22340 7ff6186487d0 57 API calls 22338->22340 22482 7ff61864a3e0 62 API calls 22339->22482 22342 7ff61865350b 22340->22342 22343 7ff61864adb0 93 API calls 22342->22343 22344 7ff618653555 22343->22344 22346 7ff61864adb0 93 API calls 22344->22346 22345->22307 22485 7ff618650240 20 API calls 22345->22485 22348 7ff618653581 22346->22348 22349 7ff61864adb0 93 API calls 22348->22349 22350 7ff6186535a9 22349->22350 22350->22310 22479 7ff618650240 20 API calls 22350->22479 22353->21508 22354->21767 22355->21497 22356->21778 22357->21575 22358->21531 22359->21576 22360->21581 22361->21559 22364->21610 22365->21606 22366->21653 22367->21646 22369 7ff61864668a MultiByteToWideChar 22368->22369 22371 7ff618643f10 37 API calls 22369->22371 22372 7ff618646700 MultiByteToWideChar 22371->22372 22372->21712 22373->21626 22374->21621 22377->21674 22378->21736 22379->21674 22380->21742 22381->21598 22384->22072 22385->22170 22387->22176 22388->22179 22389->22178 22390->22236 22393 7ff618646670 39 API calls 22392->22393 22394 7ff61864a77c SysAllocString _setjmp 22393->22394 22395 7ff61864a7ef 22394->22395 22430 7ff61864a906 SysFreeString 22394->22430 22397 7ff61864aa35 22395->22397 22405 7ff61864a88f 22395->22405 22406 7ff61864a970 22395->22406 22398 7ff61864aa50 22397->22398 22399 7ff61864aa41 CoInitialize 22397->22399 22402 7ff618652480 36 API calls 22398->22402 22399->22398 22400 7ff61864a95b 22400->22267 22401 7ff61864aa2e 22453 7ff618646540 52 API calls 22401->22453 22404 7ff61864aa5c 22402->22404 22411 7ff61864aced 22404->22411 22414 7ff6186487d0 57 API calls 22404->22414 22437 7ff61864abf1 22404->22437 22408 7ff61864a8c8 22405->22408 22409 7ff61864a8b9 CoInitialize 22405->22409 22407 7ff618643f10 37 API calls 22406->22407 22412 7ff61864a9aa memcpy 22407->22412 22413 7ff618652480 36 API calls 22408->22413 22409->22408 22410 7ff618650300 57 API calls 22420 7ff61864ac02 22410->22420 22416 7ff618650300 57 API calls 22411->22416 22452 7ff61864a3e0 62 API calls 22412->22452 22419 7ff61864a8d4 22413->22419 22417 7ff61864aa8e SafeArrayCreate 22414->22417 22429 7ff61864acf2 22416->22429 22421 7ff61864ac36 22417->22421 22422 7ff61864aadf 22417->22422 22418 7ff61864aba9 22425 7ff618650300 57 API calls 22418->22425 22419->22418 22424 7ff6186487d0 57 API calls 22419->22424 22432 7ff61864ab0e 22419->22432 22420->22421 22456 7ff618650240 20 API calls 22420->22456 22457 7ff6186525f0 36 API calls 22421->22457 22426 7ff61864aae0 SafeArrayPutElement 22422->22426 22423 7ff618650300 57 API calls 22436 7ff61864ab75 22423->22436 22424->22430 22440 7ff61864abbd 22425->22440 22426->22426 22426->22432 22428 7ff61864ad26 22429->22428 22463 7ff618650240 20 API calls 22429->22463 22430->22400 22430->22401 22432->22423 22433 7ff61864ac4e 22458 7ff618649280 44 API calls 22433->22458 22436->22418 22454 7ff618650240 20 API calls 22436->22454 22437->22410 22438 7ff61864ac77 22459 7ff618648fd0 40 API calls 22438->22459 22440->22437 22455 7ff618650240 20 API calls 22440->22455 22443 7ff61864acb8 22461 7ff618650420 20 API calls 22443->22461 22444 7ff61864ac86 22444->22443 22460 7ff618650240 20 API calls 22444->22460 22447 7ff61864acc7 22462 7ff618645a20 57 API calls 22447->22462 22454->22418 22455->22437 22456->22421 22457->22433 22458->22438 22459->22444 22460->22443 22461->22447 22463->22428 22468->22283 22473->22319 22474->22319 22479->22310 22484->22328 22485->22307 22486 7ff61864bee0 22487 7ff61864bef6 22486->22487 22495 7ff61864bf03 22486->22495 22488 7ff61864b420 37 API calls 22487->22488 22487->22495 22489 7ff61864bf1d 22488->22489 22490 7ff61864bb80 41 API calls 22489->22490 22491 7ff61864bf2a 22490->22491 22492 7ff61864b420 37 API calls 22491->22492 22493 7ff61864bf50 22492->22493 22494 7ff61864bb80 41 API calls 22493->22494 22494->22495 22500 7ff61864bf80 22501 7ff61864b420 37 API calls 22500->22501 22502 7ff61864bfad 22501->22502 22503 7ff61864bb80 41 API calls 22502->22503 22504 7ff61864bfbd GetThreadContext 22503->22504 22505 7ff61864bfe3 22504->22505 22506 7ff61864c040 BaseThreadInitThunk 22504->22506 22507 7ff61864b420 37 API calls 22505->22507 22508 7ff61864bff4 22507->22508 22509 7ff61864bb80 41 API calls 22508->22509 22510 7ff61864c001 SetThreadContext 22509->22510 22510->22506
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitmemcpy$ByteCharHeapMultiProcessSleepWide$CountTickVersion
                              • String ID: ,$6U$,{lW$CloseHandle$CreateFileA$GetComputerNameExA$GetCurrentProcessId$GetCurrentThreadId$GetDiskFreeSpaceExA$GetFileSize$GetModuleHandleA$GetProcAddress$GetProcessHeap$GetThreadContext$GetTickCount$GlobalMemoryStatusEx$LdrLoadDll$MultiByteToWideChar$OpenProcess$OpenThread$ReadFile$RtlAddVectoredExceptionHandler$RtlAllocateHeap$RtlInitUnicodeString$SetThreadContext$Sleep$VariantConversionError$VirtualProtect$WaitForSingleObject$com.nim$p$toVariant
                              • API String ID: 4036915570-2294705820
                              • Opcode ID: 75185cecd4f4cd0ff8ff1251ed288e3ec12cfa21fc9c39858dd0f71e78f13bd5
                              • Instruction ID: 9c0f3513cb83aa3e4ee680be0ef3a9bae2c8db332dd3c05c8bb51f1e506becd4
                              • Opcode Fuzzy Hash: 75185cecd4f4cd0ff8ff1251ed288e3ec12cfa21fc9c39858dd0f71e78f13bd5
                              • Instruction Fuzzy Hash: 56435B61A09F8681EB10DB25E8683BD63A1FF84FA0F444535DA5D8779ADF3CE504E388

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1192 7ff61864d570-7ff61864d5a6 call 7ff618657860 1195 7ff61864d5ac-7ff61864d5e5 RtlAddVectoredExceptionHandler memset 1192->1195 1196 7ff61864d971-7ff61864d999 call 7ff61864b420 call 7ff61864bb80 1192->1196 1197 7ff61864d5e8-7ff61864d5eb 1195->1197 1205 7ff61864d99b-7ff61864d9a3 1196->1205 1206 7ff61864d9a7-7ff61864d9b5 GetModuleHandleA 1196->1206 1199 7ff61864d5f0-7ff61864d5fa 1197->1199 1199->1199 1201 7ff61864d5fc-7ff61864d617 1199->1201 1201->1197 1204 7ff61864d619-7ff61864d63a CreateToolhelp32Snapshot 1201->1204 1207 7ff61864d63c-7ff61864d657 1204->1207 1208 7ff61864d658-7ff61864d69f Thread32First 1204->1208 1205->1206 1209 7ff61864d9b7-7ff61864d9bf 1206->1209 1210 7ff61864da2f-7ff61864daba call 7ff61864b420 call 7ff61864bb80 call 7ff61864b420 call 7ff61864bb80 call 7ff618646670 RtlInitUnicodeString LdrLoadDll 1206->1210 1211 7ff61864dac8-7ff61864dae6 call 7ff61864b420 call 7ff61864bb80 1208->1211 1212 7ff61864d6a5-7ff61864d6b1 Thread32Next 1208->1212 1214 7ff61864d9c4-7ff61864d9ec call 7ff61864b420 call 7ff61864bb80 1209->1214 1250 7ff61864da0c-7ff61864da2a call 7ff61864b420 call 7ff61864bb80 1210->1250 1270 7ff61864dac0 1210->1270 1241 7ff61864daeb-7ff61864db04 call 7ff61864b420 call 7ff61864bb80 1211->1241 1215 7ff61864d6db-7ff61864d6e6 CloseHandle 1212->1215 1216 7ff61864d6b3-7ff61864d6bd GetCurrentProcessId 1212->1216 1243 7ff61864d9fa-7ff61864da05 GetProcAddress 1214->1243 1244 7ff61864d9ee-7ff61864d9f6 1214->1244 1221 7ff61864d6ec-7ff61864d6fb 1215->1221 1222 7ff61864d7b0-7ff61864d7d8 call 7ff61864b420 call 7ff61864bb80 1215->1222 1216->1212 1220 7ff61864d6bf-7ff61864d6d9 1216->1220 1220->1215 1220->1216 1228 7ff61864d702-7ff61864d718 OpenThread 1221->1228 1251 7ff61864d7da-7ff61864d7e2 1222->1251 1252 7ff61864d7e6-7ff61864d81d GetModuleHandleA call 7ff61864b420 call 7ff61864bb80 1222->1252 1228->1207 1229 7ff61864d71e-7ff61864d72c GetThreadContext 1228->1229 1229->1207 1235 7ff61864d732-7ff61864d739 1229->1235 1239 7ff61864d73b-7ff61864d741 1235->1239 1240 7ff61864d743-7ff61864d780 call 7ff61864bb80 SetThreadContext 1235->1240 1239->1240 1246 7ff61864d793-7ff61864d7aa CloseHandle 1239->1246 1240->1207 1259 7ff61864d786-7ff61864d78e call 7ff61864bb80 1240->1259 1265 7ff61864db09 1241->1265 1243->1250 1244->1243 1246->1222 1246->1228 1250->1210 1251->1252 1252->1241 1272 7ff61864d823-7ff61864d83e 1252->1272 1259->1246 1269 7ff61864db10 1265->1269 1273 7ff61864db17-7ff61864db1e 1269->1273 1270->1214 1274 7ff61864d856-7ff61864d8db call 7ff618643f10 call 7ff61864b420 call 7ff61864bb80 call 7ff61864f490 1272->1274 1283 7ff61864d840-7ff61864d850 1274->1283 1284 7ff61864d8e1-7ff61864d91a call 7ff61864b420 call 7ff61864bb80 1274->1284 1283->1241 1283->1274 1284->1265 1289 7ff61864d920-7ff61864d929 1284->1289 1290 7ff61864d93c-7ff61864d963 call 7ff61864b420 call 7ff61864bb80 1289->1290 1295 7ff61864d92b-7ff61864d936 1290->1295 1296 7ff61864d965-7ff61864d96c 1290->1296 1295->1269 1295->1290 1296->1273
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: Handle$Thread$ByteCharCloseContextModuleMultiThread32Widememcpy$AddressCreateCurrentExceptionFirstHandlerInitLoadNextOpenProcProcessSnapshotStringToolhelp32UnicodeVectoredmemset
                              • String ID: D|u
                              • API String ID: 902128316-2768058641
                              • Opcode ID: 09e4555b71253e80de3682f4f7e29e5f6c8c6ad04570e4f0c2753624d62e8bf0
                              • Instruction ID: 1af051be9ba5f83094cf2cae80e73c08b0ce6060a4307d2cab30ac11fcacb8b3
                              • Opcode Fuzzy Hash: 09e4555b71253e80de3682f4f7e29e5f6c8c6ad04570e4f0c2753624d62e8bf0
                              • Instruction Fuzzy Hash: BCE18061E0DE8282EB149B71E4243BE6792AFE1FA4F444035DA4D87789DF7CE405E398
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: cdfd9fea71167d7d99881b81844c1dd756b5e3768975750ad13c3514bfd5f960
                              • Instruction ID: bdeaa9813366ad36a47fd89389a3ec67e0612b2128c0163cbe2186b7397b3c40
                              • Opcode Fuzzy Hash: cdfd9fea71167d7d99881b81844c1dd756b5e3768975750ad13c3514bfd5f960
                              • Instruction Fuzzy Hash: 42E2B0B2A05F4682EF549B25C0487B93366FB40FE4F859536CA2D8B386DF78E490D385

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1871 7ff618652ca0-7ff618652d29 _setjmp 1872 7ff618652d2f-7ff618652d59 CLRCreateInstance 1871->1872 1873 7ff618652ec0-7ff618652eca 1871->1873 1874 7ff618653038-7ff618653046 call 7ff61864a3e0 1872->1874 1875 7ff618652d5f-7ff618652d6f 1872->1875 1876 7ff618652ecd-7ff618652ee2 1873->1876 1885 7ff618653050-7ff61865305e call 7ff61864a3e0 1874->1885 1881 7ff618652d75-7ff618652d80 1875->1881 1878 7ff618652eea-7ff618652ef5 1876->1878 1879 7ff618652ee4 1876->1879 1882 7ff618652efd-7ff618652f06 1878->1882 1883 7ff618652ef7 1878->1883 1879->1878 1884 7ff618652d86-7ff618652db0 1881->1884 1881->1885 1886 7ff618652f08-7ff618652f10 1882->1886 1887 7ff618652eb3-7ff618652eb8 call 7ff618646540 1882->1887 1883->1882 1899 7ff618652db6-7ff618652ded _setjmp 1884->1899 1900 7ff618653068-7ff61865306b 1884->1900 1885->1900 1890 7ff618652f18-7ff618652f21 call 7ff61864a3e0 1886->1890 1891 7ff618652f12-7ff618652f16 1886->1891 1887->1873 1892 7ff618652f26-7ff618652faf _setjmp 1890->1892 1891->1890 1891->1892 1897 7ff618652fb5-7ff618652fd4 1892->1897 1898 7ff618653230-7ff618653257 1892->1898 1901 7ff618652fdc-7ff618652fe4 1897->1901 1902 7ff618652fd6 1897->1902 1912 7ff618653267-7ff618653296 call 7ff618646670 1898->1912 1913 7ff618653259-7ff618653262 call 7ff61864a3e0 1898->1913 1903 7ff618652df3-7ff618652e17 1899->1903 1904 7ff618653070-7ff618653073 1899->1904 1900->1876 1905 7ff618652fec-7ff618652ff4 1901->1905 1906 7ff618652fe6 1901->1906 1902->1901 1914 7ff618652e19-7ff618652e49 _setjmp 1903->1914 1915 7ff618652e7f-7ff618652ead 1903->1915 1911 7ff618653080-7ff6186530c6 call 7ff618643f10 1904->1911 1908 7ff618652ffc-7ff618653004 1905->1908 1909 7ff618652ff6 1905->1909 1906->1905 1916 7ff61865300c-7ff618653015 1908->1916 1917 7ff618653006 1908->1917 1909->1908 1923 7ff618652e4f-7ff618652e7d 1911->1923 1929 7ff6186530cc-7ff618653123 call 7ff618643f10 1911->1929 1930 7ff61865329c-7ff6186532a4 1912->1930 1931 7ff618653346-7ff618653361 1912->1931 1913->1912 1914->1911 1914->1923 1915->1884 1915->1887 1916->1887 1921 7ff61865301b-7ff618653032 1916->1921 1917->1916 1923->1887 1923->1915 1948 7ff618653129-7ff618653137 1929->1948 1949 7ff618653205-7ff61865320f 1929->1949 1932 7ff6186532aa-7ff61865331b call 7ff618643f10 1930->1932 1933 7ff618653768-7ff61865376d 1930->1933 1939 7ff618653367-7ff61865336d 1931->1939 1940 7ff618653600-7ff61865360e call 7ff61864a3e0 1931->1940 1943 7ff61865333c-7ff618653341 call 7ff61864a3e0 1932->1943 1944 7ff61865331d-7ff618653338 memcpy 1932->1944 1941 7ff618653777-7ff61865377a 1933->1941 1939->1940 1946 7ff618653373-7ff61865339c 1939->1946 1954 7ff618653618-7ff618653620 1940->1954 1947 7ff618653782-7ff618653786 1941->1947 1943->1931 1944->1943 1958 7ff6186533ac-7ff6186533d5 1946->1958 1959 7ff61865339e-7ff6186533a7 call 7ff61864a3e0 1946->1959 1953 7ff618653626-7ff61865362d 1947->1953 1948->1947 1956 7ff61865313d-7ff61865314b 1948->1956 1949->1954 1955 7ff618653215-7ff61865322a call 7ff618646580 call 7ff6186461c0 1949->1955 1954->1953 1957 7ff61865378b 1954->1957 1955->1923 1961 7ff61865369b-7ff6186536a2 1956->1961 1962 7ff618653151-7ff618653155 1956->1962 1971 7ff6186533d7-7ff6186533ee 1958->1971 1972 7ff6186533f4-7ff61865340a 1958->1972 1959->1958 1964 7ff6186536a8-7ff6186536ba 1961->1964 1962->1961 1966 7ff61865315b-7ff618653166 1962->1966 1964->1964 1968 7ff6186536bc 1964->1968 1966->1941 1970 7ff61865316c-7ff618653176 1966->1970 1975 7ff6186536c8-7ff6186536d3 call 7ff618650300 1968->1975 1974 7ff618653180-7ff618653191 1970->1974 1971->1972 1982 7ff61865347f-7ff6186534b7 1971->1982 1984 7ff618653640-7ff61865364e call 7ff61864a3e0 1972->1984 1985 7ff618653410-7ff618653439 1972->1985 1974->1974 1976 7ff618653193-7ff6186531a0 1974->1976 1992 7ff6186536da-7ff6186536e7 1975->1992 1993 7ff6186536d5 1975->1993 1980 7ff618653202 1976->1980 1981 7ff6186531a2-7ff6186531b1 1976->1981 1980->1949 1986 7ff6186531cb-7ff6186531e1 1981->1986 1987 7ff6186531b3-7ff6186531c9 1981->1987 1990 7ff6186534c7-7ff6186534e1 call 7ff618652480 1982->1990 1991 7ff6186534b9-7ff6186534c4 1982->1991 2007 7ff618653658-7ff618653666 call 7ff61864a3e0 1984->2007 2003 7ff618653688-7ff618653696 call 7ff61864a3e0 1985->2003 2004 7ff61865343f-7ff618653455 1985->2004 1986->1980 1988 7ff6186531e3-7ff6186531f6 1986->1988 1987->1980 1987->1986 1988->1980 1994 7ff6186531f8-7ff6186531fd 1988->1994 1990->1975 2008 7ff6186534e7-7ff6186534f4 1990->2008 1991->1990 1997 7ff6186536e9-7ff6186536fd 1992->1997 1998 7ff618653704-7ff61865370b 1992->1998 1993->1992 1994->1980 1997->1998 2002 7ff6186536ff call 7ff618650240 1997->2002 2006 7ff618653718-7ff618653723 call 7ff618650300 1998->2006 2002->1998 2003->1961 2015 7ff61865345b-7ff618653468 2004->2015 2016 7ff618653670-7ff61865367e call 7ff61864a3e0 2004->2016 2020 7ff61865372a-7ff618653737 2006->2020 2021 7ff618653725 2006->2021 2007->2016 2008->2006 2014 7ff6186534fa-7ff6186535a4 call 7ff6186487d0 call 7ff61864adb0 * 3 2008->2014 2035 7ff6186535a9-7ff6186535af 2014->2035 2025 7ff61865346e-7ff618653479 2015->2025 2016->2003 2026 7ff618653739-7ff61865374d 2020->2026 2027 7ff618653754-7ff61865375b 2020->2027 2021->2020 2025->1982 2025->2007 2026->2027 2030 7ff61865374f call 7ff618650240 2026->2030 2027->1933 2030->2027 2036 7ff6186535b6-7ff6186535c3 2035->2036 2037 7ff6186535b1 2035->2037 2038 7ff6186535db-7ff6186535ef 2036->2038 2039 7ff6186535c5-7ff6186535d9 2036->2039 2037->2036 2038->1940 2039->2038 2040 7ff618653638-7ff61865363d call 7ff618650240 2039->2040 2040->2038
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmp$CreateInstance
                              • String ID: ntime of$o get ru$unable t
                              • API String ID: 1775370524-3332830050
                              • Opcode ID: ac211fbf096da5d0da3a4762ae46cb72a1d791a0f9595435f5d7eb76b5508b96
                              • Instruction ID: 6a351d41a6e2384d4f47e5c229c050608aa27b95d4cb4e4b1fca237086930b0c
                              • Opcode Fuzzy Hash: ac211fbf096da5d0da3a4762ae46cb72a1d791a0f9595435f5d7eb76b5508b96
                              • Instruction Fuzzy Hash: 56523876A08F4681EB11CF2AE9503AA73A1FB85FA4F408132DA4D877A5EF3CD444D784

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2043 7ff618641154-7ff618641193 call 7ff61865cfd0 2046 7ff6186411a8-7ff6186411d5 2043->2046 2047 7ff618641195-7ff61864119f 2043->2047 2048 7ff6186411f8-7ff61864122d 2046->2048 2047->2046 2049 7ff6186411d7-7ff6186411df 2048->2049 2050 7ff61864122f-7ff61864123b 2048->2050 2051 7ff6186411ea-7ff6186411ef 2049->2051 2052 7ff6186411e1-7ff6186411e8 2049->2052 2053 7ff618641249-7ff618641254 2050->2053 2054 7ff61864123d-7ff618641247 _amsg_exit 2050->2054 2051->2048 2052->2050 2056 7ff618641256-7ff61864127c _initterm 2053->2056 2057 7ff61864127e 2053->2057 2055 7ff618641288-7ff618641294 2054->2055 2058 7ff618641296-7ff6186412b6 _initterm 2055->2058 2059 7ff6186412bc-7ff6186412c0 2055->2059 2056->2055 2057->2055 2058->2059 2060 7ff6186412e1-7ff6186412ee 2059->2060 2061 7ff6186412c2-7ff6186412e0 2059->2061 2062 7ff61864130c-7ff618641364 call 7ff618656d3d call 7ff61865d760 call 7ff6186565d0 call 7ff61865d8c0 2060->2062 2063 7ff6186412f0-7ff618641305 2060->2063 2061->2060 2073 7ff618641366 2062->2073 2074 7ff6186413cc-7ff6186413d7 2062->2074 2063->2062 2075 7ff618641385-7ff61864138e 2073->2075 2076 7ff6186413d9-7ff6186413e4 2074->2076 2077 7ff6186413fa-7ff618641453 call 7ff618641591 call 7ff618656347 call 7ff61865d9e0 2074->2077 2079 7ff618641368-7ff618641371 2075->2079 2080 7ff618641390-7ff618641399 2075->2080 2081 7ff6186413e6-7ff6186413ed 2076->2081 2082 7ff6186413ef 2076->2082 2097 7ff618641455-7ff61864145d exit 2077->2097 2098 7ff618641462-7ff61864146a 2077->2098 2084 7ff618641380 2079->2084 2085 7ff618641373-7ff61864137d 2079->2085 2087 7ff6186413a8-7ff6186413b1 2080->2087 2088 7ff61864139b-7ff61864139f 2080->2088 2083 7ff6186413f4 2081->2083 2082->2083 2083->2077 2084->2075 2085->2084 2091 7ff6186413be-7ff6186413c9 2087->2091 2092 7ff6186413b3-7ff6186413bc 2087->2092 2088->2079 2090 7ff6186413a1 2088->2090 2090->2087 2091->2074 2092->2091 2094 7ff6186413a3 2092->2094 2094->2087 2097->2098 2099 7ff61864146c _cexit 2098->2099 2100 7ff618641471-7ff61864147f 2098->2100 2099->2100
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _initterm$_amsg_exit_cexitexit
                              • String ID: 0
                              • API String ID: 602970348-4108050209
                              • Opcode ID: 50d41e5def3bf9c16f3af7bdd17e1943794a521b4815a992c7d3667bf630053a
                              • Instruction ID: b0f595149582cd307fd3e98c512ac78ff56565fd87b2458c0bdf45a073660d42
                              • Opcode Fuzzy Hash: 50d41e5def3bf9c16f3af7bdd17e1943794a521b4815a992c7d3667bf630053a
                              • Instruction Fuzzy Hash: 3CA1D225B08F0689EB50CB76E89036C37A1AB44FA8F404075DE4DD77A5DE3CE581A798

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2101 7ff848e6c6de-7ff848e6c8f5 call 7ff848e68fb0 call 7ff848e6b260 2131 7ff848e6c8f7-7ff848e6c90a 2101->2131 2133 7ff848e6c90c-7ff848e6c927 2131->2133 2134 7ff848e6c958-7ff848e6c963 call 7ff848e6b238 2131->2134 2133->2131 2136 7ff848e6c929-7ff848e6c92d 2133->2136 2141 7ff848e6c968-7ff848e6c97a 2134->2141 2136->2134 2138 7ff848e6c92f-7ff848e6c950 2136->2138 2138->2134 2142 7ff848e6c952-7ff848e6c956 2138->2142 2142->2134 2143 7ff848e6c97b-7ff848e6c98b 2142->2143 2144 7ff848e6c98d-7ff848e6c9ba 2143->2144 2145 7ff848e6c9e1-7ff848e6ca04 call 7ff848e6adf8 call 7ff848e6b1f0 2143->2145 2148 7ff848e6c9bc-7ff848e6c9df 2144->2148 2149 7ff848e6ca31-7ff848e6ca48 2144->2149 2158 7ff848e6ca0a-7ff848e6ca1c call 7ff848e6ac90 2145->2158 2159 7ff848e6cab4-7ff848e6cabf 2145->2159 2148->2145 2156 7ff848e6ca9e-7ff848e6caaf call 7ff848e63758 2149->2156 2157 7ff848e6ca4a-7ff848e6ca5b 2149->2157 2156->2159 2163 7ff848e6ca5d-7ff848e6ca93 call 7ff848e63750 2157->2163 2164 7ff848e6ca96-7ff848e6ca9c 2157->2164 2158->2159 2181 7ff848e6ca22-7ff848e6ca2b call 7ff848e6ac90 2158->2181 2161 7ff848e6cac5-7ff848e6cad7 call 7ff848e6ac90 2159->2161 2162 7ff848e6cb72-7ff848e6cb7d 2159->2162 2161->2162 2193 7ff848e6cadd-7ff848e6cb27 call 7ff848e6ac90 2161->2193 2167 7ff848e6cb7f-7ff848e6cb91 call 7ff848e6ac90 2162->2167 2168 7ff848e6cbab-7ff848e6cbaf 2162->2168 2163->2164 2164->2159 2167->2168 2202 7ff848e6cb93-7ff848e6cba4 call 7ff848e6ac90 2167->2202 2170 7ff848e6cc22-7ff848e6cc2d 2168->2170 2171 7ff848e6cbb1-7ff848e6cbbc call 7ff848e6ac90 2168->2171 2179 7ff848e6cc2f-7ff848e6cc37 2170->2179 2180 7ff848e6cc3d-7ff848e6cc48 2170->2180 2191 7ff848e6cbbe-7ff848e6cbc8 2171->2191 2192 7ff848e6cbca 2171->2192 2179->2180 2182 7ff848e6cc4e-7ff848e6cca8 call 7ff848e6ac90 2180->2182 2183 7ff848e6cd99-7ff848e6cda4 2180->2183 2181->2149 2228 7ff848e6ccae-7ff848e6ccbb 2182->2228 2229 7ff848e6cd58-7ff848e6cd63 2182->2229 2189 7ff848e6cdaa-7ff848e6cdb5 2183->2189 2190 7ff848e6ceb8-7ff848e6cec3 2183->2190 2206 7ff848e6ce0e-7ff848e6ce2a 2189->2206 2207 7ff848e6cdb7-7ff848e6cdde 2189->2207 2195 7ff848e6cec5-7ff848e6cec9 2190->2195 2196 7ff848e6ced0-7ff848e6cedb 2190->2196 2200 7ff848e6cbcf-7ff848e6cbd1 2191->2200 2192->2200 2268 7ff848e6cb39-7ff848e6cb6d call 7ff848e6ac90 call 7ff848e63750 2193->2268 2269 7ff848e6cb29-7ff848e6cb37 2193->2269 2195->2196 2203 7ff848e6cedd-7ff848e6ceed call 7ff848e6aef0 2196->2203 2204 7ff848e6cef3-7ff848e6cf36 2196->2204 2200->2170 2208 7ff848e6cbd3-7ff848e6cc1d call 7ff848e6ac90 call 7ff848e63748 2200->2208 2202->2168 2203->2204 2212 7ff848e6cf5e-7ff848e6cf69 2204->2212 2213 7ff848e6cf38-7ff848e6cf4f 2204->2213 2225 7ff848e6ce2c-7ff848e6ce2d 2206->2225 2226 7ff848e6ce80-7ff848e6ceb1 2206->2226 2230 7ff848e6ce2e-7ff848e6ce7e 2207->2230 2231 7ff848e6cde0-7ff848e6cdfd call 7ff848e6ac90 2207->2231 2208->2170 2222 7ff848e6cf6b-7ff848e6cfb0 call 7ff848e6ac90 call 7ff848e63748 2212->2222 2223 7ff848e6cfb5-7ff848e6cfed call 7ff848e63748 2212->2223 2213->2212 2220 7ff848e6cf51-7ff848e6cf55 2213->2220 2220->2212 2222->2223 2245 7ff848e6cfef-7ff848e6cffe call 7ff848e6ac90 2223->2245 2246 7ff848e6d061-7ff848e6d06c 2223->2246 2225->2230 2226->2190 2235 7ff848e6ccbd-7ff848e6cce8 2228->2235 2236 7ff848e6ccfb-7ff848e6cd00 2228->2236 2240 7ff848e6d53f-7ff848e6d54a 2229->2240 2241 7ff848e6cd69-7ff848e6cd92 call 7ff848e6ac90 2229->2241 2230->2226 2286 7ff848e6d578-7ff848e6d597 call 7ff848e6ac90 2231->2286 2287 7ff848e6ce03-7ff848e6ce0a call 7ff848e6ac90 2231->2287 2261 7ff848e6cd01-7ff848e6cd15 2235->2261 2272 7ff848e6ccea-7ff848e6ccf9 2235->2272 2236->2261 2249 7ff848e6d54c-7ff848e6d561 2240->2249 2250 7ff848e6d59b-7ff848e6d5ad 2240->2250 2241->2183 2276 7ff848e6d6ae 2245->2276 2277 7ff848e6d004-7ff848e6d010 2245->2277 2256 7ff848e6d06e-7ff848e6d07d call 7ff848e6ac90 2246->2256 2257 7ff848e6d0e2-7ff848e6d0ed 2246->2257 2275 7ff848e6d530-7ff848e6d53e 2249->2275 2296 7ff848e6d5ae-7ff848e6d606 call 7ff848e6ac90 2250->2296 2297 7ff848e6d683-7ff848e6d6a9 call 7ff848e6ac90 2250->2297 2294 7ff848e6d6b8 2256->2294 2295 7ff848e6d083-7ff848e6d091 2256->2295 2270 7ff848e6d0ef-7ff848e6d10b call 7ff848e63748 2257->2270 2271 7ff848e6d110-7ff848e6d11b 2257->2271 2302 7ff848e6cd3d-7ff848e6cd52 2261->2302 2303 7ff848e6cd17-7ff848e6cd3b 2261->2303 2268->2162 2269->2162 2270->2271 2284 7ff848e6d1d6-7ff848e6d1e1 2271->2284 2285 7ff848e6d121-7ff848e6d14b call 7ff848e6ac90 * 2 2271->2285 2272->2302 2275->2240 2276->2294 2277->2246 2289 7ff848e6d012-7ff848e6d040 call 7ff848e6ac90 2277->2289 2291 7ff848e6d248-7ff848e6d253 2284->2291 2292 7ff848e6d1e3-7ff848e6d243 call 7ff848e6b000 call 7ff848e63748 2284->2292 2342 7ff848e6d17e-7ff848e6d1b5 call 7ff848e63748 2285->2342 2343 7ff848e6d14d-7ff848e6d179 call 7ff848e6ac90 2285->2343 2286->2250 2287->2206 2289->2246 2309 7ff848e6d26c-7ff848e6d277 2291->2309 2310 7ff848e6d255-7ff848e6d266 call 7ff848e6b000 2291->2310 2292->2291 2318 7ff848e6d6c2-7ff848e6d6d6 2294->2318 2295->2257 2308 7ff848e6d093-7ff848e6d0c1 call 7ff848e6ac90 2295->2308 2378 7ff848e6d65e-7ff848e6d67e 2296->2378 2379 7ff848e6d608-7ff848e6d65d 2296->2379 2297->2276 2302->2228 2302->2229 2303->2302 2308->2257 2322 7ff848e6d279-7ff848e6d2cd call 7ff848e6aef0 call 7ff848e63748 2309->2322 2323 7ff848e6d2d2-7ff848e6d2dd 2309->2323 2310->2309 2318->2342 2322->2323 2332 7ff848e6d2df-7ff848e6d342 call 7ff848e6aef0 * 2 call 7ff848e63748 2323->2332 2333 7ff848e6d347-7ff848e6d352 2323->2333 2332->2333 2336 7ff848e6d358-7ff848e6d368 call 7ff848e6ac90 2333->2336 2337 7ff848e6d3e6-7ff848e6d3ee 2333->2337 2365 7ff848e6d36e-7ff848e6d6ec call 7ff848e6ac90 2336->2365 2366 7ff848e6d47b-7ff848e6d4bb call 7ff848e63758 2336->2366 2349 7ff848e6d73b-7ff848e6d746 2337->2349 2350 7ff848e6d3f4-7ff848e6d43f call 7ff848e6ac90 2337->2350 2342->2284 2343->2318 2359 7ff848e6d748-7ff848e6d753 2349->2359 2360 7ff848e6d759-7ff848e6d765 2349->2360 2350->2366 2359->2360 2368 7ff848e6d4dd-7ff848e6d52f call 7ff848e63758 2359->2368 2369 7ff848e6d76b-7ff848e6d77a 2360->2369 2370 7ff848e6d994-7ff848e6d9b4 call 7ff848e63b78 2360->2370 2366->2368 2368->2275 2395 7ff848e6d896-7ff848e6d916 2369->2395 2396 7ff848e6d780-7ff848e6d7f2 2369->2396 2378->2297 2379->2378 2416 7ff848e6d918-7ff848e6d960 2395->2416 2417 7ff848e6d962-7ff848e6d98c 2395->2417 2419 7ff848e6d85f-7ff848e6d87c 2396->2419 2420 7ff848e6d7f4-7ff848e6d817 2396->2420 2416->2417 2417->2370 2419->2395
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: I$VUUU$rN_H
                              • API String ID: 0-2068014598
                              • Opcode ID: 3f848d36996e867e7d150d907c668f9348c0a67e3d81637418267700b70ee42a
                              • Instruction ID: 099adb10d47bf626130d125386d177e08d70b9783d0c3bb6520e05eaf92d6dc2
                              • Opcode Fuzzy Hash: 3f848d36996e867e7d150d907c668f9348c0a67e3d81637418267700b70ee42a
                              • Instruction Fuzzy Hash: 66C29E30A1D9499FEB99E7288455BB9B7E1FF59350F9800BDC04DD7292CE39B882CB44

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2480 7ff61864f6d0-7ff61864f71d 2481 7ff61864f729-7ff61864f72d 2480->2481 2482 7ff61864f71f-7ff61864f726 2480->2482 2483 7ff61864f733-7ff61864f736 2481->2483 2484 7ff61864fbd0-7ff61864fc0d call 7ff618645ac0 2481->2484 2482->2481 2483->2484 2486 7ff61864f73c-7ff61864f7a4 call 7ff618643f10 call 7ff61864b420 call 7ff61864bb80 2483->2486 2489 7ff61864fc16-7ff61864fc2a 2484->2489 2490 7ff61864fc11 call 7ff618643f10 2484->2490 2504 7ff61864f7bc-7ff61864f80c CreateFileA 2486->2504 2505 7ff61864f7a6-7ff61864f7b9 2486->2505 2492 7ff61864fd48-7ff61864fd57 2489->2492 2493 7ff61864fc30-7ff61864fc33 2489->2493 2490->2489 2495 7ff61864fce0-7ff61864fcf8 2493->2495 2498 7ff61864fcfe-7ff61864fd08 2495->2498 2499 7ff61864fc40-7ff61864fc4d 2495->2499 2500 7ff61864fd0a-7ff61864fd16 2498->2500 2501 7ff61864fd60-7ff61864fd67 2498->2501 2499->2500 2502 7ff61864fc53-7ff61864fc5a 2499->2502 2506 7ff61864fd1c-7ff61864fd46 call 7ff618644540 * 3 2500->2506 2508 7ff61864fd7c-7ff61864fd89 2501->2508 2509 7ff61864fd69-7ff61864fd77 call 7ff618644540 2501->2509 2502->2500 2507 7ff61864fc60-7ff61864fcd5 call 7ff618644540 * 4 2502->2507 2521 7ff61864f812-7ff61864f880 ReadFile 2504->2521 2522 7ff61864fab5-7ff61864facf 2504->2522 2505->2504 2506->2492 2506->2495 2525 7ff61864fcd8-7ff61864fcde 2507->2525 2513 7ff61864fd8b-7ff61864fdad call 7ff618644540 * 2 2508->2513 2514 7ff61864fdb2-7ff61864fdda 2508->2514 2509->2525 2513->2525 2514->2506 2539 7ff61864f886-7ff61864f8a1 2521->2539 2540 7ff61864fbc8 2521->2540 2543 7ff61864fae0-7ff61864fafb 2522->2543 2525->2492 2525->2495 2542 7ff61864f8af-7ff61864f939 call 7ff618643f10 call 7ff61864bb80 call 7ff61864f490 2539->2542 2540->2484 2550 7ff61864f8a8-7ff61864f8ab 2542->2550 2551 7ff61864f93f-7ff61864f982 2542->2551 2550->2542 2551->2543 2552 7ff61864f988-7ff61864f9ca 2551->2552 2553 7ff61864f9fe-7ff61864fa13 2552->2553 2554 7ff61864fa15-7ff61864fa38 2553->2554 2555 7ff61864f9d0-7ff61864f9d3 2553->2555 2558 7ff61864fa3a-7ff61864fa45 2554->2558 2559 7ff61864fa49-7ff61864fa92 2554->2559 2556 7ff61864f9d5-7ff61864f9df strcmp 2555->2556 2557 7ff61864f9e1-7ff61864f9ed 2555->2557 2556->2554 2556->2557 2557->2543 2560 7ff61864f9f3-7ff61864f9fb 2557->2560 2558->2559 2563 7ff61864faa6-7ff61864faa9 2559->2563 2560->2553 2564 7ff61864faab-7ff61864faaf 2563->2564 2565 7ff61864fa98-7ff61864faa4 2563->2565 2564->2565 2567 7ff61864fab1-7ff61864fab3 2564->2567 2565->2563 2566 7ff61864fafc-7ff61864fafe 2565->2566 2568 7ff61864fb00-7ff61864fb63 2566->2568 2567->2568 2569 7ff61864fba6-7ff61864fba8 2568->2569 2570 7ff61864fb65-7ff61864fba1 2568->2570 2571 7ff61864fbb0-7ff61864fbc1 2569->2571 2570->2557 2571->2571 2572 7ff61864fbc3 2571->2572 2572->2557
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: File$CreateRead
                              • String ID:
                              • API String ID: 3388366904-0
                              • Opcode ID: ec7523323d8522bed43e5f29889f388af1469c161f64491dd7193ab5dd99971d
                              • Instruction ID: 7d2bb30d76cea22cc928cefb03153a0b1ef0aa994233e4260ff9d95dcef88965
                              • Opcode Fuzzy Hash: ec7523323d8522bed43e5f29889f388af1469c161f64491dd7193ab5dd99971d
                              • Instruction Fuzzy Hash: 46F1EF22A09AC185EB11CF3AA8543BE7BA1FB85F94F458036DE8D83795DE3CD145E350

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: Thread$Contextmemcpy$BaseInitThunk
                              • String ID:
                              • API String ID: 2238238550-0
                              • Opcode ID: 367616483b3a5feb9ccb286755c9a34a301c0049ecf4f422587df0ba8695a429
                              • Instruction ID: 208ed8d271ebdb7973b5c48ec8011c7d49f8ba50814be58b7976912183925dbe
                              • Opcode Fuzzy Hash: 367616483b3a5feb9ccb286755c9a34a301c0049ecf4f422587df0ba8695a429
                              • Instruction Fuzzy Hash: 1421A161609E8645EB109B35F82037A6391BFD8FB4F544231DD6D873D9CE3CD0489788

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2713 7ff848e61930-7ff848e61a41 2735 7ff848e61a6d-7ff848e61cbd 2713->2735 2736 7ff848e61a43-7ff848e61a6a 2713->2736 2776 7ff848e61cbf-7ff848e61cdd call 7ff848e606c0 2735->2776 2736->2735 2778 7ff848e61ce2-7ff848e61d03 2776->2778 2779 7ff848e61d09-7ff848e61d17 2778->2779 2780 7ff848e62273-7ff848e62276 2778->2780 2783 7ff848e61d1d-7ff848e61d37 call 7ff848e60638 2779->2783 2784 7ff848e62304-7ff848e62319 2779->2784 2781 7ff848e6227c 2780->2781 2782 7ff848e61dc5-7ff848e61ddd 2780->2782 2785 7ff848e62222-7ff848e6225c call 7ff848e60708 * 2 2781->2785 2782->2784 2786 7ff848e61de3-7ff848e61df6 call 7ff848e60638 2782->2786 2793 7ff848e61d3d-7ff848e61d61 call 7ff848e618c8 call 7ff848e607f0 2783->2793 2794 7ff848e6227e-7ff848e622b0 2783->2794 2796 7ff848e6231b-7ff848e62322 2784->2796 2797 7ff848e62323-7ff848e6232f 2784->2797 2800 7ff848e61dfc-7ff848e61e08 2786->2800 2801 7ff848e61f8e-7ff848e61f99 2786->2801 2793->2784 2824 7ff848e61d67-7ff848e61d6f 2793->2824 2827 7ff848e622b7-7ff848e62303 2794->2827 2796->2797 2807 7ff848e61e0d-7ff848e61e14 2800->2807 2808 7ff848e61e0a 2800->2808 2801->2784 2806 7ff848e61f9f-7ff848e61fb7 call 7ff848e60638 2801->2806 2822 7ff848e61fbd-7ff848e61fc8 2806->2822 2823 7ff848e62134-7ff848e6215b call 7ff848e607c8 2806->2823 2807->2784 2813 7ff848e61e1a-7ff848e61e28 2807->2813 2808->2807 2817 7ff848e61e2a-7ff848e61e40 2813->2817 2818 7ff848e61ea1-7ff848e61ecd 2813->2818 2819 7ff848e61e45-7ff848e61e4c 2817->2819 2820 7ff848e61e42 2817->2820 2818->2784 2821 7ff848e61ed3-7ff848e61edc 2818->2821 2819->2784 2826 7ff848e61e52-7ff848e61e80 2819->2826 2820->2819 2828 7ff848e61ee1-7ff848e61ee9 2821->2828 2822->2784 2829 7ff848e61fce-7ff848e61fe5 call 7ff848e60638 2822->2829 2837 7ff848e6215d-7ff848e62162 2823->2837 2838 7ff848e62164 2823->2838 2825 7ff848e61d74-7ff848e61d7b 2824->2825 2825->2784 2831 7ff848e61d81-7ff848e61da5 call 7ff848e60638 2825->2831 2826->2784 2832 7ff848e61e86-7ff848e61e9c call 7ff848e60840 2826->2832 2827->2784 2828->2784 2834 7ff848e61eef-7ff848e61f1f call 7ff848e60638 2828->2834 2848 7ff848e62098-7ff848e620a3 2829->2848 2849 7ff848e61feb-7ff848e61ffc 2829->2849 2831->2825 2852 7ff848e61da7-7ff848e61db0 call 7ff848e60718 2831->2852 2853 7ff848e61f25-7ff848e61f3d 2832->2853 2834->2828 2855 7ff848e61f21-7ff848e61f22 2834->2855 2843 7ff848e62169-7ff848e62176 2837->2843 2838->2843 2850 7ff848e62178 2843->2850 2851 7ff848e6217a 2843->2851 2848->2784 2856 7ff848e620a9-7ff848e620c0 call 7ff848e60638 2848->2856 2849->2784 2857 7ff848e62002-7ff848e62015 call 7ff848e60638 2849->2857 2858 7ff848e6217f-7ff848e62182 2850->2858 2851->2858 2864 7ff848e61db5-7ff848e61dbf 2852->2864 2853->2784 2860 7ff848e61f43-7ff848e61f51 2853->2860 2855->2853 2874 7ff848e620c4-7ff848e620cf 2856->2874 2875 7ff848e620c2 2856->2875 2876 7ff848e620ff-7ff848e6211f call 7ff848e607c8 2857->2876 2877 7ff848e6201b-7ff848e62025 2857->2877 2858->2784 2863 7ff848e62188-7ff848e621a0 call 7ff848e60680 2858->2863 2865 7ff848e61f58-7ff848e61f5d 2860->2865 2866 7ff848e61f53 call 7ff848e60708 2860->2866 2889 7ff848e621ff 2863->2889 2890 7ff848e621a2-7ff848e621be 2863->2890 2864->2782 2864->2785 2872 7ff848e61f5f-7ff848e61f65 2865->2872 2873 7ff848e61f67-7ff848e61f6c 2865->2873 2866->2865 2885 7ff848e61f86-7ff848e61f89 2872->2885 2878 7ff848e61f6e-7ff848e61f79 2873->2878 2879 7ff848e61f7b-7ff848e61f82 2873->2879 2874->2784 2880 7ff848e620d5-7ff848e620ec call 7ff848e60638 2874->2880 2886 7ff848e620fc-7ff848e620fd 2875->2886 2898 7ff848e62128 2876->2898 2899 7ff848e62121-7ff848e62126 2876->2899 2881 7ff848e6202e 2877->2881 2882 7ff848e62027-7ff848e6202c 2877->2882 2878->2885 2879->2885 2900 7ff848e620ee-7ff848e620f0 2880->2900 2901 7ff848e620f2-7ff848e620f6 2880->2901 2888 7ff848e62033-7ff848e62047 2881->2888 2882->2888 2885->2780 2886->2876 2893 7ff848e6204c-7ff848e62053 2888->2893 2894 7ff848e62049 2888->2894 2895 7ff848e62201-7ff848e62212 2889->2895 2896 7ff848e621d7-7ff848e621fd call 7ff848e60770 call 7ff848e60688 2890->2896 2897 7ff848e621c0-7ff848e621d5 call 7ff848e60690 2890->2897 2893->2784 2904 7ff848e62059-7ff848e62075 2893->2904 2894->2893 2902 7ff848e62219-7ff848e6221c 2895->2902 2903 7ff848e62214-7ff848e62217 2895->2903 2896->2895 2897->2895 2906 7ff848e6212d-7ff848e6212f 2898->2906 2899->2906 2908 7ff848e620f8-7ff848e620fa 2900->2908 2901->2908 2902->2785 2902->2827 2903->2902 2909 7ff848e6225d-7ff848e62271 call 7ff848e60710 2903->2909 2904->2784 2910 7ff848e6207b-7ff848e62089 2904->2910 2906->2895 2908->2886 2909->2780 2914 7ff848e6208b call 7ff848e60708 2910->2914 2915 7ff848e62090-7ff848e62093 2910->2915 2914->2915 2915->2780
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: *O_^$,O_
                              • API String ID: 0-4213225396
                              • Opcode ID: 8337539af23001a403c551130e114e8505c5d94886f7dd87f0016cf33ae3a9b7
                              • Instruction ID: 649fe0f440468bb655bb6f73affc0f06a5f13d9455cf9d3ba286bc708e7bb2fa
                              • Opcode Fuzzy Hash: 8337539af23001a403c551130e114e8505c5d94886f7dd87f0016cf33ae3a9b7
                              • Instruction Fuzzy Hash: 6F722431A0CA565FE759FB28D0405F973A1FF90364F58467ED08A8B183DB34B886C798

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2920 7ff848e618d3-7ff848e6192e
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: *O_^$,O_
                              • API String ID: 0-4213225396
                              • Opcode ID: 7ad664ccd177a1373235057406b77f0213281d9ec89046caf1f7625b3bbf0a28
                              • Instruction ID: 8c9373e3b8c0d7a6d7e26341014ca809dd621a8ac35e1879cb90def21aed63d6
                              • Opcode Fuzzy Hash: 7ad664ccd177a1373235057406b77f0213281d9ec89046caf1f7625b3bbf0a28
                              • Instruction Fuzzy Hash: 75226662A4DA566ED70DBB78F4910F57790FF91364F0C85BBD0C98A083DB24B486C7A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: *O_^$,O_
                              • API String ID: 0-4213225396
                              • Opcode ID: dfde3c76f3497144372e61798c4f99482ea8b58ca3026caa969939ccd63ecffb
                              • Instruction ID: 923d173dc7b1241a915f4018984d586769b18416d1d940614bb4873fbe020ae3
                              • Opcode Fuzzy Hash: dfde3c76f3497144372e61798c4f99482ea8b58ca3026caa969939ccd63ecffb
                              • Instruction Fuzzy Hash: 07226862A4DA566ED30DBB78F4510F57790FF91364F4C85BBD0C98A083DB24B486C7A8
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2135060377.0000025906CB0000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000025906CB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_25906cb0000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CreateMemoryProtectSectionVirtual
                              • String ID:
                              • API String ID: 1366966015-0
                              • Opcode ID: f6b47d1aec46e1e957693d9d0c8cb924439d4d7cbf412633b4b44180241d7493
                              • Instruction ID: 913f9e3206f21df91e453f11517a2f95d8bbbd86895d32feb5fcd34ff4369e32
                              • Opcode Fuzzy Hash: f6b47d1aec46e1e957693d9d0c8cb924439d4d7cbf412633b4b44180241d7493
                              • Instruction Fuzzy Hash: 25310C7061CF1C8FE758A66C9C5D66A72D5EBD8322F004B2FE58AC32D1EB70D845468A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: *O_^$,O_
                              • API String ID: 0-4213225396
                              • Opcode ID: fbc78f5fc06a38311a50a2f5f4e4c9c36b3bfac2d6e4741a36c7a0b6ef8ad760
                              • Instruction ID: 623ecd6bac3ad7188dbe327704f5248e390b0fc2d232586b634d871027404aa2
                              • Opcode Fuzzy Hash: fbc78f5fc06a38311a50a2f5f4e4c9c36b3bfac2d6e4741a36c7a0b6ef8ad760
                              • Instruction Fuzzy Hash: 12029972A0DA565FD70DBB28E4810F97790FF91364F58867AD0898A183DF34B887C798
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2135060377.0000025906CB0000.00000020.00000400.00020000.00000000.sdmp, Offset: 0000025906CB0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_25906cb0000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CreateSection
                              • String ID:
                              • API String ID: 2449625523-0
                              • Opcode ID: 9e7362a58a991fd67ed60abdc4631b05ef3ffe28a9eadedd5685242ff6fa6018
                              • Instruction ID: e4010ca8a906d580a8f1b91ddaa9b3814f223874acbb76fac17af5502e89a253
                              • Opcode Fuzzy Hash: 9e7362a58a991fd67ed60abdc4631b05ef3ffe28a9eadedd5685242ff6fa6018
                              • Instruction Fuzzy Hash: C501C87170CF284FE758995CEC4977572C1D7C5332F405B2FD989C36D2DA619841468A
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da86cb59786d56773fb3877b9788db1b05f2c599f03f6e8ac4c0b50eab3a11a1
                              • Instruction ID: e0f8ca36c2edfdaeb89898ea30d1a2f4ff06786ee6626fa32e748af566a4db08
                              • Opcode Fuzzy Hash: da86cb59786d56773fb3877b9788db1b05f2c599f03f6e8ac4c0b50eab3a11a1
                              • Instruction Fuzzy Hash: A802F36061D9892FE74DB77884137EABBD1FF49340F6841BDD089CB687CD28A882C795

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 7ff61865d9e0-7ff61865e83f call 7ff618656347 call 7ff618642020 5 7ff61865e845-7ff61865ee79 call 7ff6186420f0 * 2 call 7ff6186417f0 0->5 6 7ff61866222f-7ff618662236 call 7ff618642050 0->6 20 7ff6186622bb-7ff6186622c0 call 7ff618641df0 5->20 21 7ff61865ee7f-7ff61865f1bf call 7ff6186417f0 call 7ff61864fde0 * 5 call 7ff61865cfc8 signal * 4 call 7ff618642020 5->21 9 7ff61866223b-7ff618662242 call 7ff618642050 6->9 13 7ff618662247-7ff61866224e call 7ff618642050 9->13 17 7ff618662253-7ff61866225a call 7ff618642050 13->17 22 7ff61866225f-7ff618662266 call 7ff618642050 17->22 21->9 56 7ff61865f1c5-7ff61865f1f1 call 7ff6186420f0 call 7ff618642020 21->56 29 7ff61866226b-7ff618662272 call 7ff618642050 22->29 32 7ff618662277-7ff61866227e call 7ff618642050 29->32 36 7ff618662283-7ff61866228a call 7ff618642050 32->36 40 7ff61866228f-7ff618662296 call 7ff618642050 36->40 44 7ff61866229b-7ff6186622a2 call 7ff618642050 40->44 48 7ff6186622a7-7ff6186622aa call 7ff618642050 44->48 52 7ff6186622af-7ff6186622b6 call 7ff618642050 48->52 52->20 56->13 61 7ff61865f1f7-7ff61865f223 call 7ff6186420f0 call 7ff618642020 56->61 66 7ff61865f229-7ff61865f289 call 7ff6186420f0 * 3 call 7ff618642020 61->66 67 7ff618662223-7ff61866222a call 7ff618642050 61->67 66->17 77 7ff61865f28f-7ff61865f3f3 call 7ff6186420f0 * 13 call 7ff618642020 66->77 67->6 77->22 106 7ff61865f3f9-7ff61865f52c call 7ff6186420f0 * 2 call 7ff618642020 77->106 106->29 113 7ff61865f532-7ff61866192e call 7ff6186420f0 * 2 call 7ff618642020 106->113 113->36 120 7ff618661934-7ff61866197a call 7ff6186420f0 * 2 call 7ff618642020 113->120 120->32 127 7ff618661980-7ff618661a2e call 7ff6186420f0 * 6 call 7ff618642020 120->127 127->40 142 7ff618661a34-7ff618661a60 call 7ff6186420f0 call 7ff618642020 127->142 142->44 147 7ff618661a66-7ff61866211f call 7ff6186420f0 * 3 call 7ff61864bb80 call 7ff618642020 142->147 147->48 158 7ff618662125-7ff618662151 call 7ff6186420f0 call 7ff618642020 147->158 158->52 163 7ff618662157-7ff618662222 call 7ff6186420f0 * 2 call 7ff618648c30 call 7ff6186417f0 call 7ff61864c240 158->163
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: signal$memcpy$AddressProcexit
                              • String ID: :state$AddRef$CLRCreateInstance$CoInitialize$CreateProcessW$CreateToolhelp32Snapshot$DispGetIDsOfNames$Field0$Field1$Field2$GetCommandLineW$GetCurrentProcess$GetCurrentThread$GetField$GetFieldNames$GetFieldNoCopy$GetFileAttributesW$GetForegroundWindow$GetGuid$GetIDsOfNames$GetModuleFileNameW$GetName$GetProcAddress$GetProcessHeap$GetSize$GetThreadContext$GetTypeInfo$GetTypeInfoCount$GetWindowThreadProcessId$HeapAlloc$HeapCreate$Hi32$InitializeProcThreadAttributeList$Invoke$IsEqualGUID$IsMatchingType$Lo32$Lo64$LoadLibraryA$Mid32$MultiByteToWideChar$NtFlushInstructionCache4$OpenProcess$PutField$PutFieldNoCopy$QueryInterface$RecordClear$RecordCopy$RecordCreate$RecordCreateCopy$RecordDestroy$RecordInit$Release$ResumeThread$RtlGetVersion$SafeArrayCreate$SafeArrayPutElement$SetConsoleCP$SetConsoleOutputCP$SysAllocString$SysFreeString$SysStringLen$Thread32First$Thread32Next$UpdateProcThreadAttribute$VariantClear$VariantCopy$WaitForSingleObject$WideCharToMultiByte$bCryptGenRandom$bVal$boolVal$bstrVal$byref$cDims$cElements$cLocks$cVal$cbElements$cipher$coresCount$counter$cyVal$data$date$dblVal$dctx6$decVal$fFeatures$filename$fltVal$hIntel$hresult$iVal$int64$intVal$key5$lLbound$lVal$line$llVal$lpVtbl$lstrlenW$msg$name$pRecInfo$parent$parray$pbVal$pboolVal$pbstrVal$pcVal$pcyVal$pdate$pdblVal$pdecVal$pdispVal$pfltVal$piVal$pintVal$plVal$pllVal$pparray$ppdispVal$ppunkVal$procname$pscode$puiVal$puintVal$pulVal$pullVal$punkVal$pvData$pvRecord$pvarVal$queryIdleProcessorCycleTime$queryProcessCycleTime$queryUnbiasedInterruptTime$raw$remoteProcID2$rgsabound$scale$scode$sign$signscale$skey$struct1$tProcess1$trace$treadHandle3$uiVal$uintVal$ulVal$ullVal$union1$union2$wReserved$wReserved1$wReserved2$wReserved3$zonedTimeFromAdjTimeImpl$zonedTimeFromTimeImpl
                              • API String ID: 1418167214-113516584
                              • Opcode ID: 15dc9790d4c75831ed325ac1702396702ec7717f66dea5cc2fa71ba48d86f2b3
                              • Instruction ID: 554a51feb9eeb01c70336332dbbe2f894c7b6adc596a80c6cfaec3c5fd1d7a15
                              • Opcode Fuzzy Hash: 15dc9790d4c75831ed325ac1702396702ec7717f66dea5cc2fa71ba48d86f2b3
                              • Instruction Fuzzy Hash: AA930E21C1CED295F7128B38A4653F573A1AFA1B28F005335C98C96665EF7EF149E388

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1297 7ff61864a740-7ff61864a7e9 call 7ff618646670 SysAllocString _setjmp 1300 7ff61864a7ef-7ff61864a7f8 1297->1300 1301 7ff61864a930-7ff61864a937 1297->1301 1303 7ff61864aa38-7ff61864aa3f 1300->1303 1304 7ff61864a7fe-7ff61864a876 1300->1304 1302 7ff61864a93a-7ff61864a955 SysFreeString 1301->1302 1307 7ff61864a95b-7ff61864a96b 1302->1307 1308 7ff61864aa30-7ff61864aa35 call 7ff618646540 1302->1308 1305 7ff61864aa50-7ff61864aa67 call 7ff618652480 1303->1305 1306 7ff61864aa41-7ff61864aa49 CoInitialize 1303->1306 1310 7ff61864a881-7ff61864a889 1304->1310 1316 7ff61864abfd-7ff61864ac08 call 7ff618650300 1305->1316 1317 7ff61864aa6d-7ff61864aa77 1305->1317 1306->1305 1308->1303 1313 7ff61864a88f-7ff61864a8b7 1310->1313 1314 7ff61864a970-7ff61864aa2e call 7ff618643f10 memcpy call 7ff61864a3e0 1310->1314 1319 7ff61864a8c8-7ff61864a8df call 7ff618652480 1313->1319 1320 7ff61864a8b9-7ff61864a8c1 CoInitialize 1313->1320 1314->1308 1333 7ff61864ac0a 1316->1333 1334 7ff61864ac0f-7ff61864ac19 1316->1334 1322 7ff61864aced-7ff61864acf8 call 7ff618650300 1317->1322 1323 7ff61864aa7d-7ff61864aad9 call 7ff6186487d0 SafeArrayCreate 1317->1323 1331 7ff61864a8e5-7ff61864a8ef 1319->1331 1332 7ff61864ab70-7ff61864ab7b call 7ff618650300 1319->1332 1320->1319 1345 7ff61864acfa 1322->1345 1346 7ff61864acff-7ff61864ad09 1322->1346 1342 7ff61864ac42-7ff61864ac8c call 7ff6186525f0 call 7ff618649280 call 7ff618648fd0 1323->1342 1343 7ff61864aadf 1323->1343 1338 7ff61864abb8-7ff61864abc3 call 7ff618650300 1331->1338 1339 7ff61864a8f5-7ff61864a92d call 7ff6186487d0 1331->1339 1361 7ff61864ab7d 1332->1361 1362 7ff61864ab82-7ff61864ab8c 1332->1362 1333->1334 1340 7ff61864ac1b-7ff61864ac2f 1334->1340 1341 7ff61864ac36 1334->1341 1366 7ff61864abca-7ff61864abd4 1338->1366 1367 7ff61864abc5 1338->1367 1339->1302 1340->1341 1348 7ff61864ac31 call 7ff618650240 1340->1348 1341->1342 1378 7ff61864ac93-7ff61864ac9b 1342->1378 1379 7ff61864ac8e 1342->1379 1350 7ff61864aae0-7ff61864ab0c SafeArrayPutElement 1343->1350 1345->1346 1353 7ff61864ad0b-7ff61864ad1f 1346->1353 1354 7ff61864ad26 1346->1354 1348->1341 1350->1350 1359 7ff61864ab0e-7ff61864ab60 1350->1359 1353->1354 1355 7ff61864ad21 call 7ff618650240 1353->1355 1355->1354 1359->1332 1361->1362 1364 7ff61864aba9 1362->1364 1365 7ff61864ab8e-7ff61864aba2 1362->1365 1364->1338 1365->1364 1369 7ff61864aba4 call 7ff618650240 1365->1369 1370 7ff61864abd6-7ff61864abea 1366->1370 1371 7ff61864abf1 1366->1371 1367->1366 1369->1364 1370->1371 1374 7ff61864abec call 7ff618650240 1370->1374 1371->1316 1374->1371 1380 7ff61864ac9d-7ff61864acb1 1378->1380 1381 7ff61864acb8-7ff61864ace8 call 7ff618650420 call 7ff618645a20 1378->1381 1379->1378 1380->1381 1382 7ff61864acb3 call 7ff618650240 1380->1382 1381->1322 1382->1381
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ArrayByteCharInitializeMultiSafeStringWide$AllocCreateElementFree_setjmpmemcpy
                              • String ID: specifi$VariantConversionError$com.nim$ed membe$o invoke$r: $toVariant$unable t
                              • API String ID: 4234589578-1707675
                              • Opcode ID: df58db6be012ea270ca5ee00f32570b053bba1f68944712e992e1bbd43113879
                              • Instruction ID: 614af9e660fa2ae3b09c696be37adc0d243dcbc001854506f409226d34ca3a12
                              • Opcode Fuzzy Hash: df58db6be012ea270ca5ee00f32570b053bba1f68944712e992e1bbd43113879
                              • Instruction Fuzzy Hash: 73F16D32A09F8691EB208B25F4A43AE73A0FB94F90F544139DA8D87795DF7CD444D788

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1387 7ff618648c30-7ff618648cb5 _fileno _setmode _fileno _setmode _fileno _setmode SetConsoleOutputCP SetConsoleCP LoadLibraryA 1391 7ff618648cb7-7ff618648cbe GetProcAddress 1387->1391 1392 7ff618648cc4-7ff618648cd1 1387->1392 1391->1392 1393 7ff618648cd7-7ff618648cfb 1392->1393 1394 7ff618648fb9 call 7ff618641df0 1392->1394 1393->1394 1396 7ff618648d01-7ff618648d1e 1393->1396 1397 7ff618648fbe-7ff618648fcf call 7ff618641e40 1394->1397 1396->1394 1398 7ff618648d24-7ff618648d41 1396->1398 1398->1394 1400 7ff618648d47-7ff618648d64 1398->1400 1400->1394 1402 7ff618648d6a-7ff618648d87 1400->1402 1402->1394 1403 7ff618648d8d-7ff618648db1 1402->1403 1403->1397 1404 7ff618648db7-7ff618648ddb 1403->1404 1404->1394 1405 7ff618648de1-7ff618648dfe 1404->1405 1405->1394 1406 7ff618648e04-7ff618648e57 1405->1406 1407 7ff618648e68-7ff618648e7f call 7ff618652480 1406->1407 1408 7ff618648e59-7ff618648e61 CoInitialize 1406->1408 1411 7ff618648e85-7ff618648e8f 1407->1411 1412 7ff618648f50-7ff618648f5b call 7ff618650300 1407->1412 1408->1407 1413 7ff618648f08-7ff618648f13 call 7ff618650300 1411->1413 1414 7ff618648e91-7ff618648ec3 call 7ff6186487d0 1411->1414 1421 7ff618648f5d 1412->1421 1422 7ff618648f62-7ff618648f6c 1412->1422 1423 7ff618648f1a-7ff618648f24 1413->1423 1424 7ff618648f15 1413->1424 1425 7ff618648edb-7ff618648eea 1414->1425 1426 7ff618648ec5-7ff618648ed9 1414->1426 1421->1422 1427 7ff618648f84 1422->1427 1428 7ff618648f6e-7ff618648f82 1422->1428 1429 7ff618648f3c-7ff618648f43 1423->1429 1430 7ff618648f26-7ff618648f3a 1423->1430 1424->1423 1426->1425 1431 7ff618648ef0-7ff618648f04 call 7ff618650240 1426->1431 1432 7ff618648f90-7ff618648f95 call 7ff618650240 1427->1432 1428->1427 1428->1432 1429->1414 1430->1429 1433 7ff618648fa8-7ff618648fb4 call 7ff618650240 1430->1433 1432->1433 1433->1414
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _fileno_setmode$Console$AddressInitializeLibraryLoadOutputProc
                              • String ID: Ws2_32.dll$inet_ntop
                              • API String ID: 1755878316-2739477577
                              • Opcode ID: 1986d8a1d44493f4ea220e76b038f6538c9eb1048286d2816647634d0045ad1a
                              • Instruction ID: 864431bc3caf7dbc7822a435dff43cc953624673271bf1beb103368e20c25648
                              • Opcode Fuzzy Hash: 1986d8a1d44493f4ea220e76b038f6538c9eb1048286d2816647634d0045ad1a
                              • Instruction Fuzzy Hash: 96913731A19F1681EB449B64F82837C67A1FB94FA0F840135DA8D83794DF7CE855E788

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2429 7ff618642260-7ff6186422a7 call 7ff618641db0 exit 2434 7ff6186422a9-7ff6186422af 2429->2434 2435 7ff618642300-7ff61864231c VirtualAlloc 2429->2435 2434->2435 2436 7ff6186422b1-7ff6186422fe 2434->2436 2437 7ff618642360-7ff618642386 call 7ff618642260 2435->2437 2438 7ff61864231e-7ff61864235b 2435->2438 2442 7ff6186425d8-7ff6186425df 2437->2442 2443 7ff61864238c-7ff618642399 2437->2443 2438->2436 2444 7ff618642450-7ff618642486 2443->2444 2445 7ff61864239f-7ff6186423aa 2443->2445 2446 7ff6186423af-7ff6186423be 2444->2446 2445->2446 2447 7ff6186425b8-7ff6186425c9 VirtualAlloc 2446->2447 2448 7ff6186423c4-7ff6186423d5 VirtualAlloc 2446->2448 2449 7ff6186425cf-7ff6186425d4 call 7ff618642260 2447->2449 2450 7ff6186423e2-7ff6186423f7 2447->2450 2451 7ff6186423db 2448->2451 2452 7ff6186425e4-7ff6186425fd VirtualAlloc 2448->2452 2449->2442 2453 7ff618642400-7ff618642407 2450->2453 2451->2450 2452->2449 2454 7ff6186425ff 2452->2454 2457 7ff61864240d-7ff618642417 2453->2457 2458 7ff61864248b-7ff6186424a1 2453->2458 2457->2453 2459 7ff618642419-7ff61864244a call 7ff618642290 2457->2459 2460 7ff6186424a4-7ff6186424cc 2458->2460 2459->2460 2462 7ff6186424d8-7ff6186424dc 2460->2462 2463 7ff6186424ce 2460->2463 2466 7ff6186424d0-7ff6186424d6 2462->2466 2467 7ff6186424de-7ff6186424fb 2462->2467 2465 7ff618642509-7ff618642516 2463->2465 2468 7ff618642518-7ff61864251d 2465->2468 2469 7ff618642522-7ff61864253d 2465->2469 2466->2462 2466->2465 2467->2465 2470 7ff6186424fd-7ff618642506 2467->2470 2468->2469 2471 7ff618642550-7ff618642554 2469->2471 2472 7ff61864253f 2469->2472 2470->2465 2473 7ff618642548-7ff61864254e 2471->2473 2474 7ff618642556-7ff61864257e 2471->2474 2475 7ff6186425a8 2472->2475 2473->2471 2473->2475 2476 7ff6186425ac-7ff6186425b2 2474->2476 2477 7ff618642580-7ff618642584 2474->2477 2475->2476 2479 7ff618642589-7ff6186425a0 2476->2479 2477->2476 2478 7ff618642586 2477->2478 2478->2479
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual$exitfwritestrlen
                              • String ID: out of memory
                              • API String ID: 4248889879-49810860
                              • Opcode ID: 8f4efc17e4d4406187837a353f8bf2edd9edcfca3123a05e085200c912c04911
                              • Instruction ID: 4101c6b4d47ea2220483c63e6e0d2144e11eccfb5b26fe57d0494d387376e551
                              • Opcode Fuzzy Hash: 8f4efc17e4d4406187837a353f8bf2edd9edcfca3123a05e085200c912c04911
                              • Instruction Fuzzy Hash: 5E218932B05F8182EB188B29E5583AEA7A0E748BE0F548235CB6D873C1CF3DE495D344

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2584 7ff848e607d0-7ff848e61307 2586 7ff848e6133c 2584->2586 2587 7ff848e61309-7ff848e6133b 2584->2587 2588 7ff848e61346-7ff848e61359 2586->2588 2587->2588 2592 7ff848e6135b-7ff848e6138d call 7ff848e612b0 2588->2592 2593 7ff848e613b2-7ff848e613c6 2588->2593 2596 7ff848e613cc-7ff848e613d0 2593->2596 2597 7ff848e61486-7ff848e614b8 2593->2597 2598 7ff848e614f9-7ff848e61529 2596->2598 2599 7ff848e613d6-7ff848e61424 2596->2599 2603 7ff848e614bf-7ff848e614f8 2597->2603 2619 7ff848e6152b-7ff848e61534 2598->2619 2620 7ff848e61585-7ff848e6158b 2598->2620 2599->2603 2604 7ff848e6142a-7ff848e6142c 2599->2604 2603->2598 2608 7ff848e6142e-7ff848e61435 2604->2608 2608->2598 2611 7ff848e6143b-7ff848e61455 2608->2611 2611->2608 2615 7ff848e61457-7ff848e61467 call 7ff848e606a8 call 7ff848e606b0 2611->2615 2630 7ff848e6146c-7ff848e61484 2615->2630 2622 7ff848e6153d-7ff848e61549 2619->2622 2623 7ff848e61536-7ff848e6153b 2619->2623 2624 7ff848e6154b-7ff848e61550 2622->2624 2625 7ff848e61552-7ff848e6155b 2622->2625 2623->2622 2624->2625 2628 7ff848e6155d-7ff848e61573 2625->2628 2629 7ff848e6157a-7ff848e61582 2625->2629 2628->2629 2629->2620 2630->2597
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: :CH$:CH$gfff
                              • API String ID: 0-3902490275
                              • Opcode ID: b65f5727c6d8f626c3dcc003cd786b49a115a6ae2ce3621aecb021ccb63fd2fc
                              • Instruction ID: 028182b0757772ae23d86175913238ef9a5ceae5eb89c4958c23de21663428e6
                              • Opcode Fuzzy Hash: b65f5727c6d8f626c3dcc003cd786b49a115a6ae2ce3621aecb021ccb63fd2fc
                              • Instruction Fuzzy Hash: 1C813921E1D94A4FE75EEA3C84512B4B7D2FF94780F5441BAD04EC729ADF39B8424385

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2634 7ff618642290-7ff6186422a7 2635 7ff6186422a9-7ff6186422af 2634->2635 2636 7ff618642300-7ff61864231c VirtualAlloc 2634->2636 2635->2636 2637 7ff6186422b1-7ff6186422fe 2635->2637 2638 7ff618642360-7ff618642386 call 7ff618642260 2636->2638 2639 7ff61864231e-7ff61864235b 2636->2639 2643 7ff6186425d8-7ff6186425df 2638->2643 2644 7ff61864238c-7ff618642399 2638->2644 2639->2637 2645 7ff618642450-7ff618642486 2644->2645 2646 7ff61864239f-7ff6186423aa 2644->2646 2647 7ff6186423af-7ff6186423be 2645->2647 2646->2647 2648 7ff6186425b8-7ff6186425c9 VirtualAlloc 2647->2648 2649 7ff6186423c4-7ff6186423d5 VirtualAlloc 2647->2649 2650 7ff6186425cf-7ff6186425d4 call 7ff618642260 2648->2650 2651 7ff6186423e2-7ff6186423f7 2648->2651 2652 7ff6186423db 2649->2652 2653 7ff6186425e4-7ff6186425fd VirtualAlloc 2649->2653 2650->2643 2654 7ff618642400-7ff618642407 2651->2654 2652->2651 2653->2650 2655 7ff6186425ff 2653->2655 2658 7ff61864240d-7ff618642417 2654->2658 2659 7ff61864248b-7ff6186424a1 2654->2659 2658->2654 2660 7ff618642419-7ff61864244a call 7ff618642290 2658->2660 2661 7ff6186424a4-7ff6186424cc 2659->2661 2660->2661 2663 7ff6186424d8-7ff6186424dc 2661->2663 2664 7ff6186424ce 2661->2664 2667 7ff6186424d0-7ff6186424d6 2663->2667 2668 7ff6186424de-7ff6186424fb 2663->2668 2666 7ff618642509-7ff618642516 2664->2666 2669 7ff618642518-7ff61864251d 2666->2669 2670 7ff618642522-7ff61864253d 2666->2670 2667->2663 2667->2666 2668->2666 2671 7ff6186424fd-7ff618642506 2668->2671 2669->2670 2672 7ff618642550-7ff618642554 2670->2672 2673 7ff61864253f 2670->2673 2671->2666 2674 7ff618642548-7ff61864254e 2672->2674 2675 7ff618642556-7ff61864257e 2672->2675 2676 7ff6186425a8 2673->2676 2674->2672 2674->2676 2677 7ff6186425ac-7ff6186425b2 2675->2677 2678 7ff618642580-7ff618642584 2675->2678 2676->2677 2680 7ff618642589-7ff6186425a0 2677->2680 2678->2677 2679 7ff618642586 2678->2679 2679->2680
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 61b36df273f6b85ec4401ed97c8b4a5ba5ce742697c2d4847c6fd4114e6972b1
                              • Instruction ID: 2f70b944df992ffb1371c0cca6f670507ffda02558da083a2d958fe8d24f6050
                              • Opcode Fuzzy Hash: 61b36df273f6b85ec4401ed97c8b4a5ba5ce742697c2d4847c6fd4114e6972b1
                              • Instruction Fuzzy Hash: E8519E32705B8580EB198B29E4683AD67A0EB89FE4F688135DE5D8B3C5DF39E085D344

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID:
                              • API String ID: 438689982-0
                              • Opcode ID: 3b4c29ced6fc8eeeec82797927dfcd0c7633041d78cfa8070d8ed1b799edb56f
                              • Instruction ID: 46969cec201093a4b8882caac8b36324a50f65ccc6ef379bbc8e328f9a740e8b
                              • Opcode Fuzzy Hash: 3b4c29ced6fc8eeeec82797927dfcd0c7633041d78cfa8070d8ed1b799edb56f
                              • Instruction Fuzzy Hash: E351AC72609F8582EB60DB65E4503AD77A0FB84F98F858532DA8C87795EF3CD408D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: ReraiseDefect
                              • API String ID: 3510742995-3378185472
                              • Opcode ID: 7c9cd1653c2dd4753b55a6b8421e778c657948852e18861a3f90cb9161839ba5
                              • Instruction ID: 2b83dc9c2756f8405541835e8a65b5133f6bb17ca8e55686c59d7b2bd7bf20e4
                              • Opcode Fuzzy Hash: 7c9cd1653c2dd4753b55a6b8421e778c657948852e18861a3f90cb9161839ba5
                              • Instruction Fuzzy Hash: 28310092E09E8681EF049B6480153FE6361AF85FA8F84C336EE1C877D5DE2DE0419384
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: :CH$H
                              • API String ID: 0-1765256081
                              • Opcode ID: 64104eb0b1777079da7a236120d3564e7abc859b8adbe75906c034170702bc19
                              • Instruction ID: 89b1982e87d3b94b9449494d8073067f6af43ee389b28ce0bbc23205a8dccecc
                              • Opcode Fuzzy Hash: 64104eb0b1777079da7a236120d3564e7abc859b8adbe75906c034170702bc19
                              • Instruction Fuzzy Hash: E7D15622E1DD8A5FE799FB3844562B663D1FF95690F4841BAD00ED31C7EE2CB8028346
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: jN_H$kN_H
                              • API String ID: 0-3263368993
                              • Opcode ID: fed9bb0af1827c2001ccc6e23a2c1822930854dc535544baf9e01f7fd4318cfe
                              • Instruction ID: a9b060bc59a822852f8fe96026ffa4b9fc9cbefdee0585073e7e0b6feb4e89ee
                              • Opcode Fuzzy Hash: fed9bb0af1827c2001ccc6e23a2c1822930854dc535544baf9e01f7fd4318cfe
                              • Instruction Fuzzy Hash: 39812861A0DAC56FE719A37854562F9BFE0FF963A4F5800FEC0898B193CD2868478355
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 4ce8db57e7ee0f556b2e6a54c5ee9ec679398d8325481f7e710a92328de204db
                              • Instruction ID: 526f7d5f4271846ed2cf437e98c257e43d4d5a4b2829445c42f588c5959ee3c6
                              • Opcode Fuzzy Hash: 4ce8db57e7ee0f556b2e6a54c5ee9ec679398d8325481f7e710a92328de204db
                              • Instruction Fuzzy Hash: 02517F72706F8580EF199B25D8683AD27A1EB94FD4F688536DE0D4B384EE39E441D344
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmp
                              • String ID:
                              • API String ID: 3051281561-0
                              • Opcode ID: cab75eb36988222bcd097d8e06d6b7df367d0e1f3e54dad1592f0bc6b84a2da2
                              • Instruction ID: f90fcd3324273921fea2af71e93cfc1a2797e7c52ed73f4012ea890a10788eae
                              • Opcode Fuzzy Hash: cab75eb36988222bcd097d8e06d6b7df367d0e1f3e54dad1592f0bc6b84a2da2
                              • Instruction Fuzzy Hash: A0712A36609F8681EB619B24F0603AE73A0FBD4B94F504136DA8D83B68DF3DD444DB84
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: ce9684a7bcbf9374ec5cca18138e3e32ea178d5a1363495608cb7d33c7bc0b15
                              • Instruction ID: 4decb3bb6b1a03e798e6dfb67e9d50b3a62b89e5eb224c6f70a9b630da1347db
                              • Opcode Fuzzy Hash: ce9684a7bcbf9374ec5cca18138e3e32ea178d5a1363495608cb7d33c7bc0b15
                              • Instruction Fuzzy Hash: 83319CA2B04E1681EB14DF2AC49866D2765FBA4FE8F454536CE2D833D0DF38D880E384
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmp
                              • String ID:
                              • API String ID: 3051281561-0
                              • Opcode ID: 7f1ee1402874eb9ab1b3ada440b1831695bc8974bc0591d5c60109507bdbe239
                              • Instruction ID: 9046bbb7f5a0bbd12ac5ba8f5653b401285393d7475a38812d642f7544d09b8e
                              • Opcode Fuzzy Hash: 7f1ee1402874eb9ab1b3ada440b1831695bc8974bc0591d5c60109507bdbe239
                              • Instruction Fuzzy Hash: FE41FB7A608F8680EB619B26E4643AE73A1FBC4FA4F508026DA8D87758DF3CD445D744
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: N_H
                              • API String ID: 0-343878021
                              • Opcode ID: 7470775701e882115dce53669ff2f62610f997c98a512e622ea3e2745885b241
                              • Instruction ID: bc573e5068a2162b47a01cbfee495e9544ff57bb80613923fd140bd2ca9da881
                              • Opcode Fuzzy Hash: 7470775701e882115dce53669ff2f62610f997c98a512e622ea3e2745885b241
                              • Instruction Fuzzy Hash: B581F3A294DAC92FE306B7B8A8665E93FA0EF16260F4C01FBC089CF193DD1C64478355
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: :CH
                              • API String ID: 0-1644320485
                              • Opcode ID: ca4d5919d173eea7fbebc4d006a59857e8e3f8e2b5f4573edee4388d97df41b4
                              • Instruction ID: 14894fdd142945e8451d96d1e81314a30422884d7651f0d7582116c5b23f6966
                              • Opcode Fuzzy Hash: ca4d5919d173eea7fbebc4d006a59857e8e3f8e2b5f4573edee4388d97df41b4
                              • Instruction Fuzzy Hash: 79610762D1CD8A6EEA89FB3884516F6A391FF95350F4842BAC00EC3187EE2DB4018756
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: :CH
                              • API String ID: 0-1644320485
                              • Opcode ID: 62f6021c5f0016c0c63bda04708ca10851ba33afbb9415c11bb13bc9d7978636
                              • Instruction ID: 5503e61c548de13023a53420211680fb5e43a20aced468222649dc7fb4c5f5e1
                              • Opcode Fuzzy Hash: 62f6021c5f0016c0c63bda04708ca10851ba33afbb9415c11bb13bc9d7978636
                              • Instruction Fuzzy Hash: 4561D662D1CD8A6EEA89FB3884516F5A391FFA5354F4842BAC00EC3187EF3DB4418756
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 3ac8151efdcba9275be8dd78e271329b85aaca815e783dbc8375432938e4aa9c
                              • Instruction ID: 8d15e2b8716389fc2c1176eb5a4d467be44704e8015ca64d6d5ef8829de05730
                              • Opcode Fuzzy Hash: 3ac8151efdcba9275be8dd78e271329b85aaca815e783dbc8375432938e4aa9c
                              • Instruction Fuzzy Hash: 4B61CD72A05F4290EB198B25E5143AD63A0FF84FA4F288235DA5D87798EF38E4D0D394
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: H
                              • API String ID: 0-2852464175
                              • Opcode ID: 1145064cc1cfdf6cac46ce9c4bd19679affac1bd0ec7f4ee83618833ed403596
                              • Instruction ID: 2bc00d574383d68e80969c9ad5cbe71b6fd1320cb670828de57306d6ac070872
                              • Opcode Fuzzy Hash: 1145064cc1cfdf6cac46ce9c4bd19679affac1bd0ec7f4ee83618833ed403596
                              • Instruction Fuzzy Hash: 85411921F1CAA90FE79DB63C185527D67C2FFD5691F4401BED04EE32D3DE2868064249
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: gfff
                              • API String ID: 0-1553575800
                              • Opcode ID: c3627a63b167688e9a2019d6972ebccb043429fd377630941a17068e6354bf60
                              • Instruction ID: 3c75e3f1bfc4214e89589a0cb903bf01cda773a40f63d1121112fa71bca99598
                              • Opcode Fuzzy Hash: c3627a63b167688e9a2019d6972ebccb043429fd377630941a17068e6354bf60
                              • Instruction Fuzzy Hash: 44213E21B2D55A0FE30DE93D5C8517876C6FBC9341B58827AE18ACB3D7ED25FC068284
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: H
                              • API String ID: 0-2852464175
                              • Opcode ID: 47f4cedb195713c86ce7199a79c1ecab1d20451993aca334b23da8f9b82e3314
                              • Instruction ID: 4db05c5bac3d76843d30fd6251cddb811790c55dad5715b454a9e3b189943c8e
                              • Opcode Fuzzy Hash: 47f4cedb195713c86ce7199a79c1ecab1d20451993aca334b23da8f9b82e3314
                              • Instruction Fuzzy Hash: C7317C30E199596FEB85FBA8D855AFDB7A1FF58394F4840B9E04DE7182CF286801CB44
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: gfff
                              • API String ID: 0-1553575800
                              • Opcode ID: 782d9dac9c861334a64c08f39a3c147765258380bbf50dae20586cdebe8f4fff
                              • Instruction ID: 1599a924036dcf01a89345a88c0ecd4de8e8fc443547e6299c94cc004d311b83
                              • Opcode Fuzzy Hash: 782d9dac9c861334a64c08f39a3c147765258380bbf50dae20586cdebe8f4fff
                              • Instruction Fuzzy Hash: EE214921B2D96A0FD30DA92D5C8107876C6FBC9341B98823EE18BDB3D6ED25FC028184
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memset
                              • String ID:
                              • API String ID: 2221118986-0
                              • Opcode ID: c6be985e4542501d5b7f04d0f4c62c4646fcfcc369a67ada8d91d0a5f580c3bf
                              • Instruction ID: 05fc0dd66cacc1dfc6aff751a3974e786029c3328441cdbd6d044bea2aeb5488
                              • Opcode Fuzzy Hash: c6be985e4542501d5b7f04d0f4c62c4646fcfcc369a67ada8d91d0a5f580c3bf
                              • Instruction Fuzzy Hash: 15412AB6A08E4690EB44CF75D6606BC7365EB98FB0F940233DA1D83790DF39D8999384
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: H
                              • API String ID: 0-2852464175
                              • Opcode ID: 0bfa2eb741fd3151fcec69629a2a9c89d596dbcc8e12acc2ab54bf3b8d09b751
                              • Instruction ID: e185d2fd82f7765bfcf98cf8315b19a458c4e7fe0ea8a0d88060598cc165d813
                              • Opcode Fuzzy Hash: 0bfa2eb741fd3151fcec69629a2a9c89d596dbcc8e12acc2ab54bf3b8d09b751
                              • Instruction Fuzzy Hash: 8731C32090E6C19FE30AE7B864AA4A97FB0DF5726075C48EEC0C59F1E3CD286517C356
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: H
                              • API String ID: 0-2852464175
                              • Opcode ID: 54f238750f88042c55d2854e012d955df2d9bded087e0256104679ca71df11be
                              • Instruction ID: b02456b4a0ca39b45233f2b72614b2973a97c25f4afb4cdad00b87e533f93408
                              • Opcode Fuzzy Hash: 54f238750f88042c55d2854e012d955df2d9bded087e0256104679ca71df11be
                              • Instruction Fuzzy Hash: 9221D751A4EDC65FE38AA37818261F86F90EF56250B8C05FFC049CB1E7DE1D28528356
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: H
                              • API String ID: 0-2852464175
                              • Opcode ID: 794fd0f47898bbdf5c635985a53c9e3a770c1b3da60d843e492bf876108026bc
                              • Instruction ID: 83c4d9d4369932b14a46c077a7e7a0fbe90abd2c59a7870f188e15f18425063b
                              • Opcode Fuzzy Hash: 794fd0f47898bbdf5c635985a53c9e3a770c1b3da60d843e492bf876108026bc
                              • Instruction Fuzzy Hash: 9211D651A4EDC61FE38AB37C14261F96BD1EF56250B8805FED449CB1D7DE1C28528345
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dbe28700fff6afd2f040eb451eb2fec8bbcc1a5d05bd8bff150ecf9342237266
                              • Instruction ID: 4327bf444b7a56ae889656fc58ba1f4ff1e4504078de5e321b918f150d422750
                              • Opcode Fuzzy Hash: dbe28700fff6afd2f040eb451eb2fec8bbcc1a5d05bd8bff150ecf9342237266
                              • Instruction Fuzzy Hash: 1222923090DA8D8FDB85EF68C455EA97BE1FF69350F5801DDD449DB2A2CA38E846CB40
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 43c0bc6745aae3a646b77b2ec006164e51ba0b05ad5ddc6d29faae5987151a8f
                              • Instruction ID: b0bae904ea7941dbac53187ad4a970b5a41ce0e5fe9560ed24854a4a8a9ce43f
                              • Opcode Fuzzy Hash: 43c0bc6745aae3a646b77b2ec006164e51ba0b05ad5ddc6d29faae5987151a8f
                              • Instruction Fuzzy Hash: 34B14853E0EDA25FE218766CB8551F96B90FF417A1F4841BBC18DC71C7DE28A80B8399
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6c53830348b8a818f2d4b5763c4d9a4c0df607df0d9e766bc4cfb51d43b7c516
                              • Instruction ID: afd8984f4351687f02929bdf38b8baede221caea422eb2763b049c19f8848838
                              • Opcode Fuzzy Hash: 6c53830348b8a818f2d4b5763c4d9a4c0df607df0d9e766bc4cfb51d43b7c516
                              • Instruction Fuzzy Hash: F1713732E1DE4A5EE769B65864162B877D1FF95360F04027FD44FC35C2EF29B802428A
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ef39ae5521e23b39fae7ff963df8d79a88a5d62dd815796422a76e8aa242075
                              • Instruction ID: 586690e89fe9b3da9f3e5bf3f10568e2e09e1d25876976230e2dae996ecf8747
                              • Opcode Fuzzy Hash: 7ef39ae5521e23b39fae7ff963df8d79a88a5d62dd815796422a76e8aa242075
                              • Instruction Fuzzy Hash: 48819E3091CA0A4FE75CEA18C4818B573A1FFA4354FA04A7DD49B97686DB36F843CB84
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6bbd87cb1d468df5307d0c7e1625c34fa8531bb41bacda9f7e11e6db69801dae
                              • Instruction ID: b6c94d26866160380e036858ccdbbdb0c3a668d328a34feede79cf327b37102e
                              • Opcode Fuzzy Hash: 6bbd87cb1d468df5307d0c7e1625c34fa8531bb41bacda9f7e11e6db69801dae
                              • Instruction Fuzzy Hash: F171CB7061CA0A8FE369EF28D4849B177A1FF94344F9105BDC44AD76A2DB35B842CB48
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3b5887aa0692084b4dd23ef692308c38e17b95b02e05693a4e9f74a88f4a30dd
                              • Instruction ID: 9f5eac828e01031a9e5c3367f2deff9547f96771897790c6340eb342cf01dd0d
                              • Opcode Fuzzy Hash: 3b5887aa0692084b4dd23ef692308c38e17b95b02e05693a4e9f74a88f4a30dd
                              • Instruction Fuzzy Hash: 34513B62D0EAD15FE31AB77868291F57FA1FF51650F4C40FBC0888B0D3EA186909835A
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45e19c8cd14cb0b5612a1ecf09429e148a6ce70073e1fc8d80a15bc36ea97ce2
                              • Instruction ID: 34dad3af50dbd169c65682478b932479f61f99789e0101e2a7de37a53b5d6984
                              • Opcode Fuzzy Hash: 45e19c8cd14cb0b5612a1ecf09429e148a6ce70073e1fc8d80a15bc36ea97ce2
                              • Instruction Fuzzy Hash: 42414821E0E9D69FE359B77C28551B8BB90FF52260F9801FFD049D7083EE1C68568395
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c968d37c46a13fcbddb1b3bd49421ad2b5481655a5eb28e3248be693ada27859
                              • Instruction ID: ebc3544f0be115c21ad304ab2ec9f6c98462f8daa4814f19d8e9a9f397302170
                              • Opcode Fuzzy Hash: c968d37c46a13fcbddb1b3bd49421ad2b5481655a5eb28e3248be693ada27859
                              • Instruction Fuzzy Hash: 8E41B03091EA8A8FDB89FF28C451AAA7BA1FF55340F4405BAD409C7196DF38E845CB91
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 07ab58752b96fc71105608b34674a461b0f748605b46cbd1722ee20bfaf1e575
                              • Instruction ID: 7c93bb65c85a975e89dd82b01170237c61f3158b5610c4f5b23c11b1de0be392
                              • Opcode Fuzzy Hash: 07ab58752b96fc71105608b34674a461b0f748605b46cbd1722ee20bfaf1e575
                              • Instruction Fuzzy Hash: 70416C3050DAC55FD71AEB388C59A617FA4EF43264B5902FBD088CB1E3DE24AC46C761
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e9c3fc4c55356323d6826c0e0c91b46fc9e693752ff0577eea7b86c105778081
                              • Instruction ID: e2277dbf3478911e52c07784de8bd392844657015ad160424085db862c776358
                              • Opcode Fuzzy Hash: e9c3fc4c55356323d6826c0e0c91b46fc9e693752ff0577eea7b86c105778081
                              • Instruction Fuzzy Hash: 04317B22A1EED10FD35AA36C58556BA7BE0EF5A760F1801FFD049C71D3DD18A8068395
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8b546c2722deebaf9929495927e5f9e3fdf2fc12b0011cd39f9890b4e6447c21
                              • Instruction ID: eb23778dd026581824817a0aedfbbf737aaf8ad9a164af53cee94cb8f62a1b99
                              • Opcode Fuzzy Hash: 8b546c2722deebaf9929495927e5f9e3fdf2fc12b0011cd39f9890b4e6447c21
                              • Instruction Fuzzy Hash: 3831BC31B18C194FEBA4FB3C90987B8A3C1FB98651F5502BAD40DD729ADE28EC818740
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6b69ecf899ec428525f5bf928ec496b0223359ef45a8f6f8ee9bbf7c405e48da
                              • Instruction ID: 900c44debfef73ac4da6b1008e8b9dd3f3474730e84ad5800d375537e0a92bc3
                              • Opcode Fuzzy Hash: 6b69ecf899ec428525f5bf928ec496b0223359ef45a8f6f8ee9bbf7c405e48da
                              • Instruction Fuzzy Hash: D5217722A1DDD10FE259A32C64196FA7BD0EF5A7A0F5801BFD04AC72D6CD18A80783C5
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 009e8c953c35e56d51d6cc3da741c070c714f66eab737db96680abc37c521ca3
                              • Instruction ID: bd80720983a1fe37da2fb665b08eb920e370d405521e3829ef49f59e4fedeb33
                              • Opcode Fuzzy Hash: 009e8c953c35e56d51d6cc3da741c070c714f66eab737db96680abc37c521ca3
                              • Instruction Fuzzy Hash: F431393184E6CE2FD702BBB458151E9BFE4EF47250F4801FBD889CB0A3CA2C255A8351
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c833f53d61a8392e3e043ca2b746721463e7c2cfafe139b56c5f3b061a3933f5
                              • Instruction ID: 77d5e082a2dcfba2789e2b56e4b2287ec4c39faab26b1bdbc6aa475b39afce33
                              • Opcode Fuzzy Hash: c833f53d61a8392e3e043ca2b746721463e7c2cfafe139b56c5f3b061a3933f5
                              • Instruction Fuzzy Hash: 0631D12180E6D55FE707673818255A97FB1EF53280F8D05FBD0D8CB093DA2C680A839A
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e0de9938051ad76138f410972a8a2b341a424d5182f35e003d2f62e29c03461f
                              • Instruction ID: ddf0c0a711d462e8fc67e403e3aefb6184ef32c8c82d472a94df6fff46b1a24c
                              • Opcode Fuzzy Hash: e0de9938051ad76138f410972a8a2b341a424d5182f35e003d2f62e29c03461f
                              • Instruction Fuzzy Hash: 4831A03050AEC55FE746E77440297EABBE1EF26300F5808EDC08ACB1A3DB78A446C745
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d0766af3705b1c6a3f6bdf38b1f5b5dfa78df5ae8a7cbae7f4b79a0c105d0d5c
                              • Instruction ID: c1ccfe69f662d6dab5146e9a330eb0fda7919a6867a7a1e8ce2248b9f00810fd
                              • Opcode Fuzzy Hash: d0766af3705b1c6a3f6bdf38b1f5b5dfa78df5ae8a7cbae7f4b79a0c105d0d5c
                              • Instruction Fuzzy Hash: BF11D661D1DACD9FE346AB7868190F97FA0FF56241F4804FBD049DB1E3DE2828468352
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c29caa92188e203125ea20b66304023ecc7818250f957311753c727894eda898
                              • Instruction ID: 0a0d86f120d2bb20a6e9e82f07baab9f17908fa366fbf2a5fdecbaf177ae1f91
                              • Opcode Fuzzy Hash: c29caa92188e203125ea20b66304023ecc7818250f957311753c727894eda898
                              • Instruction Fuzzy Hash: 3E115E3148E6D99FC3429BB49C249D63FB4EF8B25070A01E7E089CB5A3C95D8D5AC762
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fb763415e00a9848245e2d5b7193029e3ca06602021bcb00a632f0e0a4259d8
                              • Instruction ID: 06c0d8ba44e1cb7218a2063b57da951ed0c47195028b31eccb09721dca5efad7
                              • Opcode Fuzzy Hash: 5fb763415e00a9848245e2d5b7193029e3ca06602021bcb00a632f0e0a4259d8
                              • Instruction Fuzzy Hash: 2D014C21C1EEC61FD39A737854592B2BFE0FF566A0F4801FAC0898B093DA1C5884C341
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6ec8788d947d6e474a65ec43657c57ffe01ad62f7007451ff12d8c1c2306723d
                              • Instruction ID: 87f9d3afe5626f4be50ee569d012f6a58c0990d8c43a823ec146a321dc5bbb6d
                              • Opcode Fuzzy Hash: 6ec8788d947d6e474a65ec43657c57ffe01ad62f7007451ff12d8c1c2306723d
                              • Instruction Fuzzy Hash: 48012D6348E5E62FD706B23CA8A10F57F90FF02168F4C50B3E0888D093DF18205A82D9
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd32b6648ff62198f13178d3f06c3eb110fd9fcd9746cf6320a985a08b4545ab
                              • Instruction ID: 55b4629f638b2dcd5ec1fe86ca3afa362eec18fb122f95d0f873aaf3f208d241
                              • Opcode Fuzzy Hash: dd32b6648ff62198f13178d3f06c3eb110fd9fcd9746cf6320a985a08b4545ab
                              • Instruction Fuzzy Hash: 9D01D47188E2C14FC71AA73458168E23FA4FF03366F4D01EAD488DB4A3C62EA646C352
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: df640bb8fde4b68ce846e99404927320c11076f6b66372bd5c3f59330f74e756
                              • Instruction ID: e3c8a430bd9c4b378ca2df46ec90b5f3494135e90987da50561b30a4decae1c3
                              • Opcode Fuzzy Hash: df640bb8fde4b68ce846e99404927320c11076f6b66372bd5c3f59330f74e756
                              • Instruction Fuzzy Hash: 28119E1040E7C15FE31BABB819A61A97FA0DF17664B9C08DED0C58F1A3C91C646BD362
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 25297bfd928b74b9bbefb519916b360c921faef89a24edc14c59c7ad514d947f
                              • Instruction ID: 833e26b9b26ca71e3c0e5c279271a3d9753c18b20765ac0e23aedb0e5ea8b9f0
                              • Opcode Fuzzy Hash: 25297bfd928b74b9bbefb519916b360c921faef89a24edc14c59c7ad514d947f
                              • Instruction Fuzzy Hash: 7A01A712F1DD5A1FE6D9A52C181523852D2FFC41B1F9811B7D80DD329AEE28BC465308
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8359cd4a7af3ae3f26d1721d5c39f147a21b970ad6804e82d586f54e80078c74
                              • Instruction ID: 30f6dca323f2ce27f35c762d78ab01d442dc9ac16b96e26726bedd4e8f4973a9
                              • Opcode Fuzzy Hash: 8359cd4a7af3ae3f26d1721d5c39f147a21b970ad6804e82d586f54e80078c74
                              • Instruction Fuzzy Hash: AB01B53094DB894FD746A72898291A97FF0FF16201B4800EBD449DB1A3DA295845C782
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 731b94b15eabf27fae29e835d412bb3e090f2300e133e356216ff7187c97bd8c
                              • Instruction ID: 1c11370b1beb0fb8806ee8c85996b8914a707125378f697a2deef35013523805
                              • Opcode Fuzzy Hash: 731b94b15eabf27fae29e835d412bb3e090f2300e133e356216ff7187c97bd8c
                              • Instruction Fuzzy Hash: 7B01F73180EACC5FDB53B3B854260EA7FB0EF16260B4801EBD488CF053DA289496C3C1
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2765235bed80fe0b5577fe1c643320a16d3c24d04ca56306872b116a578fd141
                              • Instruction ID: ef1e3f4c75c10515ed464950e2b4efb5dc52eb365141d9eb3d46f52abb42b279
                              • Opcode Fuzzy Hash: 2765235bed80fe0b5577fe1c643320a16d3c24d04ca56306872b116a578fd141
                              • Instruction Fuzzy Hash: 6811A53040FBCE4FDB46EF3898515A93F60FF12340B48059AD448CB192D7289805C791
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 49f0151ae55bcdca45d3b791c7d4b7c1afcb12cb8afb6695aca872c9c4e6f6ee
                              • Instruction ID: ae6113f6a620f7c9702f5b11e02a8188f225d4aed484d45535c220449dac5238
                              • Opcode Fuzzy Hash: 49f0151ae55bcdca45d3b791c7d4b7c1afcb12cb8afb6695aca872c9c4e6f6ee
                              • Instruction Fuzzy Hash: 3F012131D0C90F9EEB64BAA458212FA76A0FF423E1F044577D80CC31C1DF78A99482C6
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 41ca284384249cc416e3d6ae6889ee9bbc70356aaf7ff6ff039f52cfe67355f6
                              • Instruction ID: ff74e814c4987c5315e311990b005ba23cb643f28fcd055cbaab4291c73c7b0e
                              • Opcode Fuzzy Hash: 41ca284384249cc416e3d6ae6889ee9bbc70356aaf7ff6ff039f52cfe67355f6
                              • Instruction Fuzzy Hash: 53017531E0C5069FD7559E299040365B7E2FF94390FA0827BD01E9B659DB36F8838BC5
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a6bf991113e6f6552fc509c25fbe0992d80717ac53a0f9768335f886a1b7a402
                              • Instruction ID: 612e3dd2ec4f43b0476035722182ef63298f2ac57e982a934f054ec429cca623
                              • Opcode Fuzzy Hash: a6bf991113e6f6552fc509c25fbe0992d80717ac53a0f9768335f886a1b7a402
                              • Instruction Fuzzy Hash: 8CF05912E0E9950FE369763824591B42FD0EF9A16178902EBC008DB1A2DC595C824345
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3cafaa4df65622ad176f7df5f4f2c327bcefee00ba03353e601a885a3dc1c29a
                              • Instruction ID: b8d02365f3fab4054e46c6d56fd02b65a486f60c9de0695e9b9f1f82cde2393c
                              • Opcode Fuzzy Hash: 3cafaa4df65622ad176f7df5f4f2c327bcefee00ba03353e601a885a3dc1c29a
                              • Instruction Fuzzy Hash: DFF03030A14B098FDBB8EE2DE494962B3F0FB1C3107010A6DE49BC3695E724FC858B85
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d8fc6b54ebd047dc307c9487142cd1b0103378737318eb8b7e8a0f55befa4cfd
                              • Instruction ID: 24eab0915db46c793853da44466fdeb0eb666f7a8b7ebc7ee10259eb5454639c
                              • Opcode Fuzzy Hash: d8fc6b54ebd047dc307c9487142cd1b0103378737318eb8b7e8a0f55befa4cfd
                              • Instruction Fuzzy Hash: 7EF0E53190C80DEFCB94F76898195E977A0FF09311F0111B7E40DD3155DB21AD808BC2
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b6344886b49c1f307d7fff2f5cbd5466087cfb3397970c49b042acb5fd4a396f
                              • Instruction ID: ac834104020e904c864f03a931fcfd82b4db167e1792a3af3cdc74c04f6e1842
                              • Opcode Fuzzy Hash: b6344886b49c1f307d7fff2f5cbd5466087cfb3397970c49b042acb5fd4a396f
                              • Instruction Fuzzy Hash: 3FE0C221F08C1A0BE7ACE52CB0952F162C2EBD8354F4441BAD80DC3389FD69AC9257C0
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 68ab5474237ecc6f91e9540abc99e06dc6a7b67699f3f0b0ffbfd04ac2e10ab7
                              • Instruction ID: fa8b79b1ddbf1e03dbbda330987451617e0fb8e6af05172765d412e68edd17f3
                              • Opcode Fuzzy Hash: 68ab5474237ecc6f91e9540abc99e06dc6a7b67699f3f0b0ffbfd04ac2e10ab7
                              • Instruction Fuzzy Hash: D4E0861070DD44AFE748F37C54566ADF7D2EF55300F2840B9E049C72A3CD58A8418745
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b3bfe51617f3e195c8103eda377797ecdcb82d6ab3f106cacfee4d2859816ab5
                              • Instruction ID: 180ef84c8416992230c4adb27fca9928a0b2c343b24d7bf787d94ce135e243ae
                              • Opcode Fuzzy Hash: b3bfe51617f3e195c8103eda377797ecdcb82d6ab3f106cacfee4d2859816ab5
                              • Instruction Fuzzy Hash: A6E0C220A4DA478FE38576380C536A435D0AF46284F8900A9D448DB1E3DF6DE84A8227
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 28f123deb4ca5d4b7a835b487b6f11099e4fc97e2e8958669cc19a28becfa418
                              • Instruction ID: fb6988988cb737a13ddd563ec37e5ae4d0012b2227a071fdc7b81df4e7808629
                              • Opcode Fuzzy Hash: 28f123deb4ca5d4b7a835b487b6f11099e4fc97e2e8958669cc19a28becfa418
                              • Instruction Fuzzy Hash: 8BD02B11E2D8169FD628723C20120BC9150FF097C0F9000F5E05DD30C7ED082C4812D5
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f3e8f7a9508d943fd838041a2ce3d62d800ded088ab4fe0898eb970fc9ac58f7
                              • Instruction ID: 102f2832b45bd19de66f0cf113c0012809232a5beee55b7f73d7fc2bafb45f90
                              • Opcode Fuzzy Hash: f3e8f7a9508d943fd838041a2ce3d62d800ded088ab4fe0898eb970fc9ac58f7
                              • Instruction Fuzzy Hash: 75D02B0171948C0FD705739450123EDB782DFD5610F4440F9C04DC72D6CD18141603C5
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8ae5dce6489d73270b2540da320782655ec34e4b038c2fa3be2a4782175ae6ac
                              • Instruction ID: 4008d0b8e39d9f1a9f844e5703ee2504d5416193fa4de6494d5e84884bab0fd7
                              • Opcode Fuzzy Hash: 8ae5dce6489d73270b2540da320782655ec34e4b038c2fa3be2a4782175ae6ac
                              • Instruction Fuzzy Hash: F1D05E00A5E9853FF20A73B814177AADB95DF55250F7855BDE0488B5D3CC0C58024256
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: String$CopyFreeInitializeVariant_setjmp
                              • String ID: hander:$VariantConversionError$com.nim$d except$de event$ion insi$newVariant$uncatche
                              • API String ID: 1008739868-602244300
                              • Opcode ID: babd2b7deb3f69d8384347ab2bb38c6c367e35c6930c93472293837915020f9a
                              • Instruction ID: 0cd3d0b5c92a97d2121a2b727fc533c7270522da7f27bd0e957dafbcf760aea3
                              • Opcode Fuzzy Hash: babd2b7deb3f69d8384347ab2bb38c6c367e35c6930c93472293837915020f9a
                              • Instruction Fuzzy Hash: 95024672A09F4681EB108F25E4A43AE77A1FB94FA4F444136DA4D877A9DF3CE444E384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CommandLine
                              • String ID: contain$ not in $ not in $ not in $0 ..$0 ..$IndexDefect$er is em$inde$index ou$nds, the$os.nim$paramStr$pty$t of bou
                              • API String ID: 3253501508-475797482
                              • Opcode ID: 74122c24c0382604b01f4cff30d2f2a8460fd49ea4f5a06927617e3ba1fdba9b
                              • Instruction ID: 66895255228c2b87f98095e921e41864ea209a74a888ce1f8b155334a2f0207b
                              • Opcode Fuzzy Hash: 74122c24c0382604b01f4cff30d2f2a8460fd49ea4f5a06927617e3ba1fdba9b
                              • Instruction Fuzzy Hash: 29A19532A09F4280EB048F25E96436D7BA5FB94FA4F448036DA5C87395EF3CE554E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpystrlen
                              • String ID: excepti$Error: u$ReraiseDefect$[[rerais$]]$ed from:$fatal.nim$nhandled$on: $sysFatal
                              • API String ID: 3412268980-331123295
                              • Opcode ID: a6cd64f5d0f6d3e1560dbd9c8d6119d39aba1a0a11e14f057bc305957f246f56
                              • Instruction ID: 4ab4dad60c1c2699074dfccf92049197714798baa4b46cdeb3629adad1501c31
                              • Opcode Fuzzy Hash: a6cd64f5d0f6d3e1560dbd9c8d6119d39aba1a0a11e14f057bc305957f246f56
                              • Instruction Fuzzy Hash: B522CD72A09F4281EB109F25E4587AE27A5FB85FA0F844136EE5C87B95DF3CE444E384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: H$VED|$VT_ARRAY$VT_ARRAY$VT_ARRAY$VT_BYREF$VT_RESER$VT_VECTO
                              • API String ID: 3510742995-1705348919
                              • Opcode ID: a86182c4fd8834cc737c5c4e5302b065617498eade09615eae6dd8b407819b28
                              • Instruction ID: eb9c66d3e65cf35ca8652c1f5ad5bd82d358f8b314dd59c4fb98ab6ef9031734
                              • Opcode Fuzzy Hash: a86182c4fd8834cc737c5c4e5302b065617498eade09615eae6dd8b407819b28
                              • Instruction Fuzzy Hash: A5818932A09F4681EB119B25E4543AD63A4FB94FA4F998132DF4D873A5EE3CD444E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: CLRError$ValueError$annot pa$format s$invalid $parseStandardFormatSpecifier$rse:$strformat.nim$tring, c
                              • API String ID: 3510742995-153200016
                              • Opcode ID: 25213ffec185b75778fdc326f25654378bce352dc660cd6c4fc305b2a0e2afad
                              • Instruction ID: 8329354af60eb2d2427efe18ee3fcfefac10a8071c02efdbc750aeb21f00c501
                              • Opcode Fuzzy Hash: 25213ffec185b75778fdc326f25654378bce352dc660cd6c4fc305b2a0e2afad
                              • Instruction Fuzzy Hash: 91714B72A09F4681EB10DF26E9543AD63A0FB85FA4F448135EA9C8B786EF3CD054D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: _setjmpmemcpy
                              • String ID: ValueError$gfffffff$integer:$invalid $parseInt$strutils.nim
                              • API String ID: 2721286225-831327929
                              • Opcode ID: 3ad7e2d703048a7e250aadf9f4a28c92847c659f50819e4f1fbdab72fa9bd7ac
                              • Instruction ID: 2b0fd9b3cafa8d4f0d3c1718d9171db7e9d9f1d68c34b7bf09eff5c7c7dcffa5
                              • Opcode Fuzzy Hash: 3ad7e2d703048a7e250aadf9f4a28c92847c659f50819e4f1fbdab72fa9bd7ac
                              • Instruction Fuzzy Hash: C691AE32A09F8A81EB618B25E4643AD73A0FB95FA4F444232DA5D87395DF3CD544E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitstrlen
                              • String ID: SIGABRT: Abnormal termination.$SIGFPE: Arithmetic error.$SIGILL: Illegal operation.$SIGINT: Interrupted by Ctrl-C.$SIGSEGV: Illegal storage access. (Attempt to read from nil?)$unknown signal
                              • API String ID: 4213389737-3987738871
                              • Opcode ID: 55abd2ccb1ffba83af6b57a166dde0f77d7c5e3c75de21c6b65acead5480ef3c
                              • Instruction ID: 8cf743a47b8b310620c70333e8517d71d842f44f444e7c1d8844c2d71e539989
                              • Opcode Fuzzy Hash: 55abd2ccb1ffba83af6b57a166dde0f77d7c5e3c75de21c6b65acead5480ef3c
                              • Instruction Fuzzy Hash: 18F0BB20D08C8390FB18A77468A507C5356AF81F64FF40039E41EC3A63CF1CA849E2C8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy
                              • String ID: to $convert $convert $convert $convert $convert $from
                              • API String ID: 3510742995-1950068461
                              • Opcode ID: 9304380911033293320c81f2acf6376005448f402ff89b2ee30c3c9f99823c00
                              • Instruction ID: 87fc6411cf33ddabbc838473a7aa84ab53adfa84f55fdbb9155edaf0dfee9403
                              • Opcode Fuzzy Hash: 9304380911033293320c81f2acf6376005448f402ff89b2ee30c3c9f99823c00
                              • Instruction Fuzzy Hash: 3161BD72A08F8681EB05CF51D4583AD3BA1FB98F84F498036EA0C87395EF78D905D385
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AddressProc$HandleLibraryLoadModule
                              • String ID: __deregister_frame_info$__register_frame_info$libgcc_s_dw2-1.dll
                              • API String ID: 384173800-1835852900
                              • Opcode ID: d15966665af7c63bfc69cf10254b49aa8a80bc0e5efb5ff61f34cf4ca4ebe78a
                              • Instruction ID: d102b2b08da03fb570ef5c8b7b9e32e2d77a20ec8170991d2db9b85d5a03411c
                              • Opcode Fuzzy Hash: d15966665af7c63bfc69cf10254b49aa8a80bc0e5efb5ff61f34cf4ca4ebe78a
                              • Instruction Fuzzy Hash: 1101CC24B49E47D0EB15DB65FC6057963A4BF45FA8F980532DD4D82210EE3CE149E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: strlen
                              • String ID: ,{lW$,{lW$DZ3$MZ$lcJ$lcJ
                              • API String ID: 39653677-2314944304
                              • Opcode ID: 2172c7969333ebb2ae82d8d98b640c3ebf37e01d88012758d8cfca309f05445d
                              • Instruction ID: 19a3777862a9e930e41399151b81b136337add30a1a848f9a2fe246d37da3c57
                              • Opcode Fuzzy Hash: 2172c7969333ebb2ae82d8d98b640c3ebf37e01d88012758d8cfca309f05445d
                              • Instruction Fuzzy Hash: 3CC18F61A08D8685E721DB35E8603BE6362BFC0B74F844031EA4D87799DF7CE549E784
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitlongjmp
                              • String ID: 5$ReraiseDefect$fatal.nim$sysFatal
                              • API String ID: 2266059207-1761478562
                              • Opcode ID: 96f358a524f32e1aed7c9d5d6556c4e98dd1512212eee70b9c6d99e0827447cc
                              • Instruction ID: e55671148f0f03caff3e758b2aed497518041f0d19bc6e8a57b74c348c7a1ac4
                              • Opcode Fuzzy Hash: 96f358a524f32e1aed7c9d5d6556c4e98dd1512212eee70b9c6d99e0827447cc
                              • Instruction Fuzzy Hash: BE314A35A09E06A0EB009B24E4982BD73A4FF94FA4F540436DA1C83392EF38E544E3D8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: CopyInitializeVariant
                              • String ID: VariantConversionError$com.nim$toVariant
                              • API String ID: 633353902-3035603046
                              • Opcode ID: feaf87982f694a6c8e442a242bb527772386966bb8b5cce9090a7bfb967f708d
                              • Instruction ID: 36d0cc5df852142adc3d7a8c94db8a3e5ce0b50070a4ed0f83a56b304223b77f
                              • Opcode Fuzzy Hash: feaf87982f694a6c8e442a242bb527772386966bb8b5cce9090a7bfb967f708d
                              • Instruction Fuzzy Hash: CF915921A0AF4280EB109B75E8643BE63A0FF94FA4F940535DA4D87799DF7CE404E788
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: CCG
                              • API String ID: 0-1584390748
                              • Opcode ID: a4381fa92cb0d565006f9dfff1b99eef7e1d365cb7ea1ddf9efebcac2aa79064
                              • Instruction ID: 1fc4314baea558ae1293197643bde0afdc45d822699a79892980f7aa536beef9
                              • Opcode Fuzzy Hash: a4381fa92cb0d565006f9dfff1b99eef7e1d365cb7ea1ddf9efebcac2aa79064
                              • Instruction Fuzzy Hash: 52410672E09F0589F7208B74D55437C23A1AB45BB8F204A35D92DC7BEACE3CE941A385
                              APIs
                              Strings
                              • [GC] cannot register global variable; too many global variables, xrefs: 00007FF618641E5C
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitfflushfwrite
                              • String ID: [GC] cannot register global variable; too many global variables
                              • API String ID: 3476253079-2146260042
                              • Opcode ID: 29812f787e1599843f91b4f967f7b950ef688920f6c1d8c3de6006fb422d7a35
                              • Instruction ID: 4272ef23a561b587f934a18aa4c0591e944861dce32174515a312b896c59a25f
                              • Opcode Fuzzy Hash: 29812f787e1599843f91b4f967f7b950ef688920f6c1d8c3de6006fb422d7a35
                              • Instruction Fuzzy Hash: 93516BB2B05E5181EF44CB28D0643BC27A1FB94F94F558631CA1E87392EF7EE5469384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: AddressProcexit
                              • String ID: @$could not import:
                              • API String ID: 2129014486-260091680
                              • Opcode ID: f09754910e3e8cb936a1675167e3d2a009b0b329895b95ccb8fea2a27c7e7849
                              • Instruction ID: c4a56ba508c6b5748bafc265ca7209f7d873cfe7036ef82ba93ddf71c1da3526
                              • Opcode Fuzzy Hash: f09754910e3e8cb936a1675167e3d2a009b0b329895b95ccb8fea2a27c7e7849
                              • Instruction Fuzzy Hash: 35312552F09A8291EF25D739E9203BD5B52AB85BD4F584135CF0E47385DE2DD0069384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitlongjmp
                              • String ID: fatal.nim$sysFatal
                              • API String ID: 2266059207-2644091575
                              • Opcode ID: c477938fe259c137f17db8573d3d48f01283773be389f318350ec4beba3344b7
                              • Instruction ID: 6016670c031afd4bdfee767afd1fe5d401352b52084db3128634fe6527bcc251
                              • Opcode Fuzzy Hash: c477938fe259c137f17db8573d3d48f01283773be389f318350ec4beba3344b7
                              • Instruction Fuzzy Hash: F3417472A05E0691EF009B28D8A877D73A4FB98FE4F544535EA4C87790EF78D445D388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ErrorLastexitfwritestrlen
                              • String ID: (bad format; library may be wrong architecture)$could not load:
                              • API String ID: 671075621-2754783905
                              • Opcode ID: f74af93159ec3b986ac481cf631a12f3a498c680a62705fde9ca631de226845a
                              • Instruction ID: 8aa0e071a75e1ca80512bd772d9fd2a198c1d5d3e89d8d2ce41442d936af29f5
                              • Opcode Fuzzy Hash: f74af93159ec3b986ac481cf631a12f3a498c680a62705fde9ca631de226845a
                              • Instruction Fuzzy Hash: B2014450B09E5381FB04B771E8653B852A6AF94FA0F540035DD0EC73C7EE2DA441D399
                              APIs
                              Strings
                              • [GC] cannot register thread local variable; too many thread local variables, xrefs: 00007FF618641E0C
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: exitfflushfwrite
                              • String ID: [GC] cannot register thread local variable; too many thread local variables
                              • API String ID: 3476253079-685140759
                              • Opcode ID: 41490137f2756b60f423ddc810860dccecf2b5eb74e20a2dfacef0102946c7a4
                              • Instruction ID: 7c016e40807b1a637b9a24bddbe56de7df40422fda87856fb7041b1c98f0c97b
                              • Opcode Fuzzy Hash: 41490137f2756b60f423ddc810860dccecf2b5eb74e20a2dfacef0102946c7a4
                              • Instruction Fuzzy Hash: 9EE08C20A04A814AE3006BB2A4153B86650FF97F90F401034D90E973C3CE2D90429388
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: 9$9!$99$9Q$9i
                              • API String ID: 0-1690732360
                              • Opcode ID: ff5b9ab47a6bacd3042c26211afbfdf63c73c55c1783c52ee89202a6331a0f45
                              • Instruction ID: 2003889ec95a35cb86ec2b6eddfb5dc072d7d20a759b795c10ff3abc64cdb992
                              • Opcode Fuzzy Hash: ff5b9ab47a6bacd3042c26211afbfdf63c73c55c1783c52ee89202a6331a0f45
                              • Instruction Fuzzy Hash: C861BF2154E6CC1FD707A7FC15661E9BFE09F666207AC05DEC4C98F5A2C91CA887C385
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: memcpy$memset
                              • String ID: CLRError$clr.nim$clrError
                              • API String ID: 438689982-2830349459
                              • Opcode ID: e048558dc86e6f5a9352b3e37d4a831861b57ce832144c4fdce3ff389ed0c927
                              • Instruction ID: 06c78d002ca072f97161da44ba19796811ac4b373146f5cba75e83525047d9ab
                              • Opcode Fuzzy Hash: e048558dc86e6f5a9352b3e37d4a831861b57ce832144c4fdce3ff389ed0c927
                              • Instruction Fuzzy Hash: B491E362A08F8255EB158B25A9102BD2B61FF84FB4F440231EF6D8B3C2DF2CE550E394
                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocInitializeString
                              • String ID:
                              • API String ID: 1889743751-0
                              • Opcode ID: e0bb64149f93d728e33b5e0fbb6459ea89275909b76d61481fabf21199463d14
                              • Instruction ID: 265b1ecc6406499e316111c48663d00cf411d4df90e3a842864f0a4313cfbb6a
                              • Opcode Fuzzy Hash: e0bb64149f93d728e33b5e0fbb6459ea89275909b76d61481fabf21199463d14
                              • Instruction Fuzzy Hash: 7D51AF62B0AF4690FB109B35A82437E67A0BF94FA4F584135DA0D87395EF3CE445E388
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: FreeVirtualexit
                              • String ID: virtualFree failing!
                              • API String ID: 1212090140-3108117800
                              • Opcode ID: 5a5d7f3fc116070e423d12f439fdbadc18ae0e903acef11f49e85f90fe83bf56
                              • Instruction ID: c0a654b4bf5fbd7d27de5657561ea2011eeff32b78b79107cbd5d79d896bfdd2
                              • Opcode Fuzzy Hash: 5a5d7f3fc116070e423d12f439fdbadc18ae0e903acef11f49e85f90fe83bf56
                              • Instruction Fuzzy Hash: AF51C2B2A05F8180EF05CB25C569BAD33A5FB94BA0F51C235C65D87384EF3AD584D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-3474627141
                              • Opcode ID: f5ed3b677f2f48d0590d541834f8938872b46eabe71cd71ba44e55bff7287e57
                              • Instruction ID: c0565396ea39fcefbfda1a7b0e3cb648e662b32f21e44c31f051f1c6f411da7f
                              • Opcode Fuzzy Hash: f5ed3b677f2f48d0590d541834f8938872b46eabe71cd71ba44e55bff7287e57
                              • Instruction Fuzzy Hash: 27217926A04F849AD711CF69E8403EA7371FF59BA8F444622EE8C57724EF38C24AC300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2187435201
                              • Opcode ID: 2dbb23b2c733bdc5e2c88e864f8e4be43479ddb640e3ee14439bc3aa9eb47380
                              • Instruction ID: 681872378f8b6965354e993a2fccc59937e916cb7d1391e2763be282fc752f8b
                              • Opcode Fuzzy Hash: 2dbb23b2c733bdc5e2c88e864f8e4be43479ddb640e3ee14439bc3aa9eb47380
                              • Instruction Fuzzy Hash: B5017C26A04F848AD711CF69D8402AA7771FF5DBA8F044722EF8D27765DF28C189D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4273532761
                              • Opcode ID: 224748f1aa114ad75b1f1ac9416724a679c86d711bcf6c7fa56f51eb8680cdc8
                              • Instruction ID: b8a7bd9c511dfc30071d2d231488d7bc4f7f50a11415dc56549139907e78d974
                              • Opcode Fuzzy Hash: 224748f1aa114ad75b1f1ac9416724a679c86d711bcf6c7fa56f51eb8680cdc8
                              • Instruction Fuzzy Hash: 9C017C26A04F888AD711CF69D8402AA7771FF5DBA8F044722EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4064033741
                              • Opcode ID: 2ccf02da138a7f67b759a146aa06823c0007208c8fea492fe6df19dd1a8d4ce2
                              • Instruction ID: 3d7cf50a8b13dd009eac55de7e61bc2674518e2fee46bf8573463a5d05a59b90
                              • Opcode Fuzzy Hash: 2ccf02da138a7f67b759a146aa06823c0007208c8fea492fe6df19dd1a8d4ce2
                              • Instruction Fuzzy Hash: 41017C26A04F848AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-4283191376
                              • Opcode ID: b8127e0a148a3f2144de23711edacc057c0f970e361e3f338bc60eb4b9e6ada2
                              • Instruction ID: 91763f853cdfd93e27d15687f58216b8973e5e8b89cd145c08e6cc80bdc146e2
                              • Opcode Fuzzy Hash: b8127e0a148a3f2144de23711edacc057c0f970e361e3f338bc60eb4b9e6ada2
                              • Instruction Fuzzy Hash: 0C017C26A04F848AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2468659920
                              • Opcode ID: 041973ba09f51f5bbe3c4b1c88ac10a69af53ca7432e29cfd1701aba7b0af9e6
                              • Instruction ID: 1b65328334aecc317225a61fbe5a9ad0f448309576b0de1484abe1593fcc8d38
                              • Opcode Fuzzy Hash: 041973ba09f51f5bbe3c4b1c88ac10a69af53ca7432e29cfd1701aba7b0af9e6
                              • Instruction Fuzzy Hash: 07015A26A04F888AD711CF69D8402AA7771FB5DBA8F044722EF8D27769DF28C185D340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2145066843.00007FF618641000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF618640000, based on PE: true
                              • Associated: 00000003.00000002.2145038409.00007FF618640000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145104906.00007FF618663000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145131553.00007FF618664000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145262418.00007FF6186E6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145323035.00007FF6186F8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145450621.00007FF6186FE000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145562791.00007FF618707000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000003.00000002.2145647893.00007FF61870A000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff618640000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID: fprintf
                              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                              • API String ID: 383729395-2713391170
                              • Opcode ID: a146f8cdcdf8742bd3899f7bf3c1021d3d1a80d061f4e761973d6a360533c67e
                              • Instruction ID: 5712630d364b0a5830d1c4483717d1c32082dd7ed30d3e5b69a8c5f8bce2d20b
                              • Opcode Fuzzy Hash: a146f8cdcdf8742bd3899f7bf3c1021d3d1a80d061f4e761973d6a360533c67e
                              • Instruction Fuzzy Hash: 8F017C26A04F888AD711CF69D8402AA7771FF5DBA8F044726EF8D27769DF28C185D340
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.2146606507.00007FF848E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E60000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_7ff848e60000_gEP8SOoakR.jbxd
                              Similarity
                              • API ID:
                              • String ID: N_^($N_^*$N_^,$N_^2
                              • API String ID: 0-46808458
                              • Opcode ID: 22f594e5524680a48dd261e105dfdeec3c63ce7310ea9c0b8d80d7b14f2accbd
                              • Instruction ID: 554a6422e312b9ded25c3e57e168fb5322527e03e2a9ce099b9b6ec1109991ed
                              • Opcode Fuzzy Hash: 22f594e5524680a48dd261e105dfdeec3c63ce7310ea9c0b8d80d7b14f2accbd
                              • Instruction Fuzzy Hash: EA21E7E769D4117ED30976ADAC611F92740FF502B4B4D5172E39CCB103EE24604A8ADA