Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
Analysis ID:1543365
MD5:992a36edccd6fb4db6aad9c43329cb04
SHA1:5276588b19a213b10a8c25c6c08e11d4621124d5
SHA256:b157d6d7519daf5b2ca2b514d6291d3df5c1971884ff429e48045bd7161ca369
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to hide a thread from the debugger
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Hides threads from debuggers
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse usering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe (PID: 5980 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5: 992A36EDCCD6FB4DB6AAD9C43329CB04)
    • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5812 cmdline: C:\Windows\system32\cmd.exe /c cls MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • cmd.exe (PID: 4824 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • certutil.exe (PID: 6392 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
      • find.exe (PID: 5100 cmdline: find /i /v "md5" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
      • find.exe (PID: 5328 cmdline: find /i /v "certutil" MD5: 15B158BC998EEF74CFDD27C44978AEA0)
    • cmd.exe (PID: 7156 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 6704 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 3636 cmdline: timeout /t 5 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
    • WerFault.exe (PID: 5716 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 1104 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E8F990 BCryptGenRandom,0_2_00E8F990
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000000.2134340036.0000000000EC1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_1f749c83-4
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E63BEB GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,___std_fs_close_handle@4,0_2_00E63BEB
Source: Joe Sandbox ViewIP Address: 104.26.1.5 104.26.1.5
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/..~
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/8
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/E
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownHTTPS traffic detected: 104.26.1.5:443 -> 192.168.2.6:49712 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB0 GetModuleHandleW,GetProcAddress,NtSetInformationThread,VirtualAlloc,VirtualAlloc,VirtualFree,GetModuleFileNameW,GetShortPathNameW,GetEnvironmentVariableW,ShellExecuteW,NtTerminateProcess,GetCurrentProcess,NtTerminateProcess,GetWriteWatch,VirtualFree,VirtualFree,VirtualFree,GetModuleHandleW,KiUserExceptionDispatcher,KiUserExceptionDispatcher,LoadLibraryA,GetProcAddress,OpenProcess,CloseHandle,CreateFileA,CloseHandle,GetProcessHeap,HeapWalk,memset,GetCurrentThread,GetThreadContext,0_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E321F00_2_00E321F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E6C1500_2_00E6C150
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB00_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E8D5500_2_00E8D550
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E516700_2_00E51670
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E3A6100_2_00E3A610
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E368D00_2_00E368D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E358B00_2_00E358B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E280600_2_00E28060
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E3B8220_2_00E3B822
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4D0200_2_00E4D020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E460200_2_00E46020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E248000_2_00E24800
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4B0000_2_00E4B000
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E481D60_2_00E481D6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4B9600_2_00E4B960
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E529500_2_00E52950
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E239200_2_00E23920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E539300_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E46AD00_2_00E46AD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E243500_2_00E24350
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4B3200_2_00E4B320
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E8CB300_2_00E8CB30
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E444A00_2_00E444A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4ACB00_2_00E4ACB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4BC900_2_00E4BC90
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E49D800_2_00E49D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E40D000_2_00E40D00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E31ED00_2_00E31ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4B6400_2_00E4B640
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4D7C00_2_00E4D7C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E38FA00_2_00E38FA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E47FA00_2_00E47FA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4A7B00_2_00E4A7B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E647630_2_00E64763
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E827100_2_00E82710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 1104
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@20/6@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1476:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5980
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1ffb3444-e011-401c-bb20-355d40057d6dJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeString found in binary or memory: iphlpapi.dllif_nametoindexws2_32FreeAddrInfoExWGetAddrInfoExCancelGetAddrInfoExWkernel32LoadLibraryExA\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cls
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "md5"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 1104
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeSection loaded: ????l??? .dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\SysWOW64\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\SysWOW64\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\SysWOW64\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic file information: File size 1236992 > 1048576
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E50910 LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualFree,0_2_00E50910
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E560C8 push esp; ret 0_2_00E560C9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E37CDA push ebx; retn 0002h0_2_00E37CE5
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E514A0 in eax, dx0_2_00E514A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeMemory allocated: 3360000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeMemory allocated: 3460000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeMemory allocated: 3830000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-23079
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeAPI coverage: 8.9 %
Source: C:\Windows\SysWOW64\timeout.exe TID: 6448Thread sleep count: 42 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E63BEB GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,___std_fs_close_handle@4,0_2_00E63BEB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E50E60 GetSystemInfo,VirtualAlloc,VirtualProtect,0_2_00E50E60
Source: Amcache.hve.14.drBinary or memory string: VMware
Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.14.drBinary or memory string: vmci.sys
Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.14.drBinary or memory string: VMware20,1
Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB0 NtSetInformationThread 000000FE,00000011,00000000,000000000_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeOpen window title or class name: ollydbg
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeOpen window title or class name: windbgframeclass
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E64AD5 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E64AD5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E50E60 VirtualProtect 00000000,?,00000140,000000000_2_00E50E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E50910 LoadLibraryA,GetProcAddress,VirtualAlloc,VirtualFree,0_2_00E50910
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB0 mov eax, dword ptr fs:[00000030h]0_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB0 mov eax, dword ptr fs:[00000030h]0_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E578C0 mov eax, dword ptr fs:[00000030h]0_2_00E578C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E57040 mov eax, dword ptr fs:[00000030h]0_2_00E57040
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E52950 mov eax, dword ptr fs:[00000030h]0_2_00E52950
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E52950 mov eax, dword ptr fs:[00000030h]0_2_00E52950
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E59920 mov eax, dword ptr fs:[00000030h]0_2_00E59920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E59920 mov eax, dword ptr fs:[00000030h]0_2_00E59920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E59920 mov eax, dword ptr fs:[00000030h]0_2_00E59920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E59920 mov eax, dword ptr fs:[00000030h]0_2_00E59920
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53930 mov eax, dword ptr fs:[00000030h]0_2_00E53930
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E51A10 mov eax, dword ptr fs:[00000030h]0_2_00E51A10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E51A10 mov eax, dword ptr fs:[00000030h]0_2_00E51A10
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E56390 mov eax, dword ptr fs:[00000030h]0_2_00E56390
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53360 mov eax, dword ptr fs:[00000030h]0_2_00E53360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E57480 mov eax, dword ptr fs:[00000030h]0_2_00E57480
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E565C7 mov eax, dword ptr fs:[00000030h]0_2_00E565C7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDA0 mov eax, dword ptr fs:[00000030h]0_2_00E4EDA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E505B0 mov ecx, dword ptr fs:[00000030h]0_2_00E505B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E58D80 mov eax, dword ptr fs:[00000030h]0_2_00E58D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E58D80 mov eax, dword ptr fs:[00000030h]0_2_00E58D80
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53550 mov eax, dword ptr fs:[00000030h]0_2_00E53550
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53550 mov eax, dword ptr fs:[00000030h]0_2_00E53550
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E57D00 mov eax, dword ptr fs:[00000030h]0_2_00E57D00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5AE20 mov eax, dword ptr fs:[00000030h]0_2_00E5AE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5AE20 mov eax, dword ptr fs:[00000030h]0_2_00E5AE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5AE20 mov eax, dword ptr fs:[00000030h]0_2_00E5AE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5AE20 mov eax, dword ptr fs:[00000030h]0_2_00E5AE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E55E00 mov eax, dword ptr fs:[00000030h]0_2_00E55E00
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E58600 mov eax, dword ptr fs:[00000030h]0_2_00E58600
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E567C1 mov eax, dword ptr fs:[00000030h]0_2_00E567C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E567C1 mov eax, dword ptr fs:[00000030h]0_2_00E567C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5A770 mov eax, dword ptr fs:[00000030h]0_2_00E5A770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5A770 mov eax, dword ptr fs:[00000030h]0_2_00E5A770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5A770 mov eax, dword ptr fs:[00000030h]0_2_00E5A770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5A770 mov eax, dword ptr fs:[00000030h]0_2_00E5A770
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53710 mov eax, dword ptr fs:[00000030h]0_2_00E53710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53710 mov eax, dword ptr fs:[00000030h]0_2_00E53710
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5571B mov eax, dword ptr fs:[00000030h]0_2_00E5571B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E5571B mov eax, dword ptr fs:[00000030h]0_2_00E5571B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E4EDB0 GetModuleHandleW,GetProcAddress,NtSetInformationThread,VirtualAlloc,VirtualAlloc,VirtualFree,GetModuleFileNameW,GetShortPathNameW,GetEnvironmentVariableW,ShellExecuteW,NtTerminateProcess,GetCurrentProcess,NtTerminateProcess,GetWriteWatch,VirtualFree,VirtualFree,VirtualFree,GetModuleHandleW,KiUserExceptionDispatcher,KiUserExceptionDispatcher,LoadLibraryA,GetProcAddress,OpenProcess,CloseHandle,CreateFileA,CloseHandle,GetProcessHeap,HeapWalk,memset,GetCurrentThread,GetThreadContext,0_2_00E4EDB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E64AD5 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E64AD5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E6430F SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E6430F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeMemory protected: page execute and read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E53360 VirtualAllocEx,OpenThread,SuspendThread,GetThreadContext,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_00E53360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E2E840 VirtualAllocEx,VirtualAllocEx,VirtualProtectEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,GetExitCodeProcess,Sleep,GetExitCodeProcess,ReadProcessMemory,Sleep,malloc,memset,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,WriteProcessMemory,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,VirtualFreeEx,0_2_00E2E840
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c clsJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00E63EAF
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E64CE5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00E64CE5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exeCode function: 0_2_00E28060 _invalid_parameter_noinfo_noreturn,GetUserNameA,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00E28060
Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
211
Process Injection
32
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
22
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Disable or Modify Tools
LSASS Memory331
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
Process Injection
Security Account Manager32
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543365 Sample: SecuriteInfo.com.Trojan.Gen... Startdate: 27/10/2024 Architecture: WINDOWS Score: 76 33 keyauth.win 2->33 39 Multi AV Scanner detection for submitted file 2->39 41 AI detected suspicious sample 2->41 9 SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe 1 2->9         started        signatures3 process4 dnsIp5 35 keyauth.win 104.26.1.5, 443, 49712 CLOUDFLARENETUS United States 9->35 37 127.0.0.1 unknown unknown 9->37 43 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->43 45 Contains functionality to detect virtual machines (IN, VMware) 9->45 47 Contains functionality to inject threads in other processes 9->47 49 3 other signatures 9->49 13 cmd.exe 1 9->13         started        15 cmd.exe 1 9->15         started        17 WerFault.exe 3 16 9->17         started        19 2 other processes 9->19 signatures6 process7 process8 21 certutil.exe 1 13->21         started        23 find.exe 1 13->23         started        25 find.exe 1 13->25         started        27 cmd.exe 1 15->27         started        process9 29 conhost.exe 27->29         started        31 timeout.exe 1 27->31         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe42%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.1.5
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
      unknown
      https://curl.se/docs/alt-svc.html#SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
        unknown
        https://keyauth.win/api/1.2/8SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://upx.sf.netAmcache.hve.14.drfalse
          • URL Reputation: safe
          unknown
          https://curl.se/docs/http-cookies.html#SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
            unknown
            https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
              unknown
              https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
                unknown
                https://curl.se/docs/hsts.html#SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exefalse
                  unknown
                  https://keyauth.win/api/1.2/SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://keyauth.win/api/1.2/..~SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://keyauth.win/api/1.2/ESecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe, 00000000.00000002.2217484239.00000000015FE000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.26.1.5
                        keyauth.winUnited States
                        13335CLOUDFLARENETUSfalse
                        IP
                        127.0.0.1
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1543365
                        Start date and time:2024-10-27 18:42:45 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 25s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:17
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
                        Detection:MAL
                        Classification:mal76.evad.winEXE@20/6@1/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 64%
                        • Number of executed functions: 27
                        • Number of non-executed functions: 142
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 104.208.16.94
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
                        TimeTypeDescription
                        13:43:45API Interceptor1x Sleep call for process: WerFault.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.26.1.5Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.Evo-gen.6030.29502.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Trojan.Generic.36879400.484.7364.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win64.MalwareX-gen.6639.30242.exeGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win64.Evo-gen.24402.15705.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.Win64.MalwareX-gen.25010.24037.exeGet hashmaliciousUnknownBrowse
                                    lvXRlexBnb.exeGet hashmaliciousUnknownBrowse
                                      oMBUxRQ4cj.exeGet hashmaliciousUnknownBrowse
                                        G9e272AEyo.exeGet hashmaliciousUnknownBrowse
                                          Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            keyauth.winSecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSSecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                            • 104.20.4.235
                                            SecuriteInfo.com.Win64.CrypterX-gen.31361.18171.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.0.5
                                            SecuriteInfo.com.Trojan.TR.Redcap.cdtxw.10783.3124.exeGet hashmaliciousLummaCBrowse
                                            • 188.114.97.3
                                            f6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                                            • 188.114.96.3
                                            wo4POc0NG1.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                            • 172.67.170.64
                                            K3SRs78CAv.exeGet hashmaliciousLummaCBrowse
                                            • 188.114.97.3
                                            file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                            • 104.21.95.91
                                            file.exeGet hashmaliciousStealc, VidarBrowse
                                            • 172.64.41.3
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.95.91
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.95.91
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            bd0bf25947d4a37404f0424edf4db9adsadfwqefrqw3f.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            SecuriteInfo.com.Win64.Evo-gen.20107.17462.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            SecuriteInfo.com.FileRepMalware.12025.7543.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            SecuriteInfo.com.Heuristic.HEUR.AGEN.1319832.32667.20795.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            ActSet.ps1Get hashmaliciousFredy StealerBrowse
                                            • 104.26.1.5
                                            ActSet.ps1Get hashmaliciousFredy StealerBrowse
                                            • 104.26.1.5
                                            SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            SecuriteInfo.com.Win32.CrypterX-gen.13288.14467.dllGet hashmaliciousUnknownBrowse
                                            • 104.26.1.5
                                            IDMan.exeGet hashmaliciousFredy StealerBrowse
                                            • 104.26.1.5
                                            IDMan.exeGet hashmaliciousFredy StealerBrowse
                                            • 104.26.1.5
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.9221590033519892
                                            Encrypted:false
                                            SSDEEP:96:q5FSSR7zsKhGQ7LVSFQXIDcQ8c6DFcE6cw32+HbHg/opAnQzOqg7TKENdUzX0i1j:io0P70ytgrjb5zuiFoZ24IO8mM
                                            MD5:070984A02152624D0A3A40445ADEA878
                                            SHA1:7E14C058B958B6F81485F14DFB6798E624B8C2AE
                                            SHA-256:6BCA22E4A7610A2F9F3CFEC5F0E560ED5E4718CDA1AF0F5428812EEC838C9651
                                            SHA-512:AF0EB6D0E6390760146F5A2E71CE8FB1FD74630E965F5C98847959C30B8EB20AE6AC14A39A00DA5674DEFBAE6355C0941794009A5CBA0B3795BDB4B681E7BA19
                                            Malicious:false
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.5.2.4.6.2.1.7.2.6.8.6.0.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.5.2.4.6.2.2.3.3.6.2.4.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.8.5.1.0.c.0.d.-.5.7.8.3.-.4.2.1.6.-.b.7.7.c.-.1.5.c.8.c.3.0.3.a.a.d.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.3.0.a.3.0.7.e.-.6.b.c.0.-.4.2.c.7.-.8.8.c.3.-.9.8.c.c.6.d.8.3.1.e.8.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...G.e.n.e.r.i.c.K.D...7.4.4.4.4.4.2.8...1.7.3.3.6...1.0.1.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.5.c.-.0.0.0.1.-.0.0.1.5.-.3.0.9.9.-.6.0.c.0.9.7.2.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Sun Oct 27 17:43:42 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):101972
                                            Entropy (8bit):1.7277431807950245
                                            Encrypted:false
                                            SSDEEP:384:1cYhkYdps0CqtTLpzthFqQsQr9bUGUJdr1C2vuYOZ:FSYdps0tLpz/FmC9UGe1SY6
                                            MD5:C0339E92AE29035908777C3042A150EC
                                            SHA1:5FDE3107158C2370AAD4E29D8C31FDAB8CF1A072
                                            SHA-256:5B30365F76FD3F3F7BD0F2EDBF043FDF2B9FEA47D122197CD8D1CA71B42C822F
                                            SHA-512:DCE5580D73C048F46E86D617DCB46C8039FA4E5E7741F1D947E9FA398BDEC219D9B281F806C581465F9F3CEF7B86B8123B5EB1296A6FF3D12E0E829282BB9165
                                            Malicious:false
                                            Preview:MDMP..a..... ........{.g....................................T....>..........T.......8...........T...........0+..$c......................................................................................................eJ......|.......GenuineIntel............T.......\....{.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8542
                                            Entropy (8bit):3.697013693758745
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJpHz6PN6Y2DRSUnCgmffNtIpDO89btGsfiPm:R6lXJpT6PN6YMSUnCgmfvitlfz
                                            MD5:C5C7BE733421521387027CF92F9C020E
                                            SHA1:27E2B2E9F9D2FB14A2677FFE5963E4D69225C8BC
                                            SHA-256:ABC2C76E191DC48B7B9AAC573B5D733923696D27ACF5DB86514D382ED3CE2215
                                            SHA-512:9528FCAA46A8901A0B8DE7785A5DC85E540B6116F1E814D45228FA2B5B64BE1A69E5A63E7605D8E5639F51FBBAB92ED33CF0ABE70AB9625132024C2820BE7188
                                            Malicious:false
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.8.0.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4981
                                            Entropy (8bit):4.573810169254779
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsctJg77aI9wbWpW8VYpYm8M4J3eA+lFax+q8v+A+rsG9KcQIcQd0h02d:uIjfcHI7yq7VpJdxK09Kku62d
                                            MD5:E6FAF23B81946B9BD5122473970F370D
                                            SHA1:0C3864F3CE9ABC00F3A63B92BF75DDF0F0E432BD
                                            SHA-256:6A0167B30ED3F0431226BE8A4CFBC385D0F36AEDCC41B7FBA38EFCA1F76AB5C8
                                            SHA-512:5BECD6BAA95E9FDAD34BD4A10BE28D5A8B933A4344F3F12FA3EB19E215C024224C3A38B480E2C99E1B67F24588E62C7942505F49A706AD56ED5CD007C9DEF6F4
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="562126" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.465916739794386
                                            Encrypted:false
                                            SSDEEP:6144:MzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:yZHtBZWOKnMM6bFpZj4
                                            MD5:B8A875F15511F84D9259206C9838D49F
                                            SHA1:80A45111941C2CC360CBC660508EDCC5CC14E0F2
                                            SHA-256:BC562AA66C9215F84CC52034FF6D99525E107A83F0FDFEE2E6BC3531008605F1
                                            SHA-512:4A1FBAF746CD87C246D50B04ABF5CF47A3CE9E8C129B1A84170F7B8A086BC5A2199F2252D7E7717AFF03A10C1AAA8EF0EEAB5F02B1AC9551275E385E30C7FD04
                                            Malicious:false
                                            Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr...(..............................................................................................................................................................................................................................................................................................................................................CR..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
                                            File Type:ASCII text, with no line terminators, with escape sequences
                                            Category:dropped
                                            Size (bytes):53
                                            Entropy (8bit):4.689815737418786
                                            Encrypted:false
                                            SSDEEP:3:YoRTxCx+q49Vg9ND:5FCxj4M9B
                                            MD5:4E5EAA5EDD9A5CCC5BA3FBC366C81217
                                            SHA1:0F4809FE5246C5705941577EAA1BA429A71021F0
                                            SHA-256:E97F3155C7BB79912EA1DCC882518274A59FEDC7D14E07C60B068B79A79C0E1C
                                            SHA-512:F5A9B69AD75B0F52B1C857C116D2A8E003F449C51A9D91AEA078B19A25565D186B4B4DE4BD913C5E4BD68BF75CB68B68BBF7F4727F9F8D54DBA8F8541C27C754
                                            Malicious:false
                                            Preview:.[38;2;146;79;255m[~].[0m Connecting to the server...
                                            File type:PE32 executable (console) Intel 80386, for MS Windows
                                            Entropy (8bit):6.657566619637477
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
                                            File size:1'236'992 bytes
                                            MD5:992a36edccd6fb4db6aad9c43329cb04
                                            SHA1:5276588b19a213b10a8c25c6c08e11d4621124d5
                                            SHA256:b157d6d7519daf5b2ca2b514d6291d3df5c1971884ff429e48045bd7161ca369
                                            SHA512:666b2936016fca2444d547698e231a938277a1e1c3096ebc8529ecdd6cf8e37a5031d1d59439918ac0eecc83b129f26eaf6bfb9f1f326f0168531d870260c676
                                            SSDEEP:24576:gu+4D/tSdf1y6zQOC7eZXjPBKZR2xim/KDRzstB:gQtSdflppb0ZRCimiDRYf
                                            TLSH:8045AE32B681D072E1C601B1606AABF65A7D69345B6188C7B7C06E7DCA203D16F36F1F
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I6..'e..'e..'e...e..'e..#d..'e.E&d..'e.G.e..'e.G$d..'e.G#d..'e.G"d..'e.G&d..'e..&e<.'e.@.d..'e.@.e..'e...e..'e.@%d..'eRich..'
                                            Icon Hash:0fcd1333134d1f0e
                                            Entrypoint:0x444756
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows cui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x671A2FDC [Thu Oct 24 11:30:36 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:6
                                            OS Version Minor:0
                                            File Version Major:6
                                            File Version Minor:0
                                            Subsystem Version Major:6
                                            Subsystem Version Minor:0
                                            Import Hash:2e393828d40d2fd8900ef58c7c62e06f
                                            Instruction
                                            call 00007F8425280D8Ch
                                            jmp 00007F8425280629h
                                            retn 0000h
                                            push ebp
                                            mov ebp, esp
                                            and dword ptr [00506BF8h], 00000000h
                                            sub esp, 28h
                                            or dword ptr [004B9090h], 01h
                                            push 0000000Ah
                                            call dword ptr [004A10F8h]
                                            test eax, eax
                                            je 00007F8425280ABBh
                                            push ebx
                                            push esi
                                            push edi
                                            xor eax, eax
                                            lea edi, dword ptr [ebp-28h]
                                            xor ecx, ecx
                                            push ebx
                                            cpuid
                                            mov esi, ebx
                                            pop ebx
                                            nop
                                            mov dword ptr [edi], eax
                                            mov dword ptr [edi+04h], esi
                                            mov dword ptr [edi+08h], ecx
                                            xor ecx, ecx
                                            mov dword ptr [edi+0Ch], edx
                                            mov eax, dword ptr [ebp-28h]
                                            mov edi, dword ptr [ebp-24h]
                                            mov dword ptr [ebp-04h], eax
                                            xor edi, 756E6547h
                                            mov eax, dword ptr [ebp-1Ch]
                                            xor eax, 49656E69h
                                            mov dword ptr [ebp-18h], eax
                                            mov eax, dword ptr [ebp-20h]
                                            xor eax, 6C65746Eh
                                            mov dword ptr [ebp-14h], eax
                                            xor eax, eax
                                            inc eax
                                            push ebx
                                            cpuid
                                            mov esi, ebx
                                            pop ebx
                                            nop
                                            lea ebx, dword ptr [ebp-28h]
                                            mov dword ptr [ebx], eax
                                            mov eax, dword ptr [ebp-18h]
                                            or eax, dword ptr [ebp-14h]
                                            or eax, edi
                                            mov dword ptr [ebx+04h], esi
                                            mov dword ptr [ebx+08h], ecx
                                            mov dword ptr [ebx+0Ch], edx
                                            jne 00007F84252807EBh
                                            mov eax, dword ptr [ebp-28h]
                                            and eax, 0FFF3FF0h
                                            cmp eax, 000106C0h
                                            je 00007F84252807D5h
                                            cmp eax, 00020660h
                                            je 00007F84252807CEh
                                            cmp eax, 00020670h
                                            je 00007F84252807C7h
                                            cmp eax, 00030650h
                                            je 00007F84252807C0h
                                            cmp eax, 00030660h
                                            je 00007F84252807B9h
                                            cmp eax, 00030670h
                                            jne 00007F84252807B9h
                                            Programming Language:
                                            • [IMP] VS2008 SP1 build 30729
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb5ed80x208.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1080000x22c20.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x12b0000x62c4.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb21800x38.rdata
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0xb21c00x18.rdata
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb20c00x40.rdata
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0xa10000x6b0.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x9f1fc0x9f2002786dd19dc325e6ecd53d85610130304False0.4886678858994501data6.577665712001494IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0xa10000x17c400x17e00bd7fa78785f58d1f0c9c77ec2c095d5fFalse0.3919748036649215data5.635575515861512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xb90000x4e1e80x4da00f8cd3a11456809df1b2f086b21b4eb35False0.5262649708132046data6.469389322836828IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x1080000x22c200x22e000f61c35135555a22656b45fbc670384eFalse0.49721382168458783data6.06443588461351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x12b0000x62c40x64005468de62e230485b93ad67b10cc7c1d0False0.7203515625data6.682852540103243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x1081f00xa33dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.9980138313910359
                                            RT_ICON0x1125300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mRussianRussia0.2503844788832367
                                            RT_ICON0x122d580x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mRussianRussia0.3471894189891356
                                            RT_ICON0x126f800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mRussianRussia0.3970954356846473
                                            RT_ICON0x1295280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mRussianRussia0.48827392120075047
                                            RT_ICON0x12a5d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mRussianRussia0.649822695035461
                                            RT_GROUP_ICON0x12aa380x5adataRussianRussia0.7666666666666667
                                            RT_MANIFEST0x12aa980x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                            DLLImport
                                            MSVCP140.dll_Thrd_detach, _Query_perf_counter, _Cnd_do_broadcast_at_thread_exit, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Throw_Cpp_error@std@@YAXH@Z, _Query_perf_frequency, ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ??7ios_base@std@@QBE_NXZ, ?getloc@ios_base@std@@QBE?AVlocale@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z, ?_Syserror_map@std@@YAPBDH@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z, ?_Xbad_function_call@std@@YAXXZ, ?_Winerror_map@std@@YAHH@Z, ?_Xbad_alloc@std@@YAXXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?uncaught_exception@std@@YA_NXZ, ??Bid@locale@std@@QAEIXZ, ?always_noconv@codecvt_base@std@@QBE_NXZ, ?good@ios_base@std@@QBE_NXZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z, ??1_Lockit@std@@QAE@XZ, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ, ?out@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PBD1AAPBDPAD3AAPAD@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QBEHAAU_Mbstatet@@PAD1AAPAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z, ?_Xlength_error@std@@YAXPBD@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xout_of_range@std@@YAXPBD@Z, ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ, ??0_Lockit@std@@QAE@H@Z, ?ignore@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@_JH@Z
                                            ADVAPI32.dllCryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, CryptEncrypt, RegCloseKey, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegOpenKeyExA, LookupPrivilegeValueW, AdjustTokenPrivileges, CloseServiceHandle, OpenSCManagerW, ControlService, RegOpenKeyExW, RegGetValueW, OpenServiceW, QueryServiceStatusEx, CopySid, IsValidSid, ConvertSidToStringSidW, GetLengthSid, ConvertSidToStringSidA, GetUserNameA, OpenProcessToken, GetTokenInformation
                                            KERNEL32.dllTerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, SleepConditionVariableSRW, GetFileSizeEx, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetLocaleInfoEx, FormatMessageA, MultiByteToWideChar, GetFileInformationByHandleEx, EnterCriticalSection, AreFileApisANSI, IsProcessorFeaturePresent, GetFileAttributesExW, FindFirstFileW, FindClose, CreateFileW, CreateDirectoryW, GetCurrentDirectoryW, OpenThread, SetThreadContext, CreateProcessA, IsDebuggerPresent, LeaveCriticalSection, SetEvent, WaitForSingleObject, CreateEventA, QueryPerformanceFrequency, GetSystemDirectoryA, FreeLibrary, MoveFileExA, WaitForSingleObjectEx, GetEnvironmentVariableA, GetFileType, ReadFile, PeekNamedPipe, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, SetLastError, FormatMessageW, GetTickCount, WaitForMultipleObjects, SleepEx, WakeAllConditionVariable, VirtualProtect, GetModuleFileNameW, GetModuleHandleA, LoadLibraryW, GetProcAddress, GetModuleHandleW, GetCurrentProcess, CloseHandle, LocalFree, WriteProcessMemory, Sleep, LoadLibraryA, VirtualProtectEx, VirtualAllocEx, ReadProcessMemory, CreateRemoteThread, VirtualFreeEx, GetExitCodeProcess, GetModuleFileNameA, HeapFree, InitializeCriticalSectionEx, HeapSize, GetLastError, HeapReAlloc, CreateThread, HeapAlloc, HeapDestroy, DeleteCriticalSection, GetProcessHeap, WideCharToMultiByte, VirtualFree, GetStdHandle, GetShortPathNameW, SetConsoleMode, VirtualAlloc, Thread32Next, GetEnvironmentVariableW, GetWriteWatch, Thread32First, SuspendThread, HeapWalk, ResumeThread, OpenProcess, GetConsoleMode, GetTickCount64, Process32NextW, CreateFileA, GetCurrentThread, Process32FirstW, RaiseException, GetSystemInfo, GetThreadContext, VerSetConditionMask, GetCurrentProcessId, VerifyVersionInfoW, OutputDebugStringW
                                            USER32.dllMessageBoxA, FindWindowW
                                            SHELL32.dllShellExecuteW, ShellExecuteA
                                            SHLWAPI.dllPathFindFileNameW
                                            RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                                            USERENV.dllUnloadUserProfile
                                            VCRUNTIME140.dllmemmove, memcpy, wcsstr, memchr, strstr, __CxxFrameHandler3, __std_exception_destroy, strchr, _except_handler4_common, memset, strrchr, __std_terminate, __current_exception_context, __std_exception_copy, __current_exception, _CxxThrowException
                                            api-ms-win-crt-stdio-l1-1-0.dll__p__commode, fflush, fclose, fputs, _close, __stdio_common_vsscanf, fgetc, __stdio_common_vswprintf, __stdio_common_vfprintf, _fileno, feof, __acrt_iob_func, _lseeki64, fseek, fwrite, ftell, fgetpos, _popen, setvbuf, ungetc, __stdio_common_vsprintf, _write, _read, fgets, fputc, _pclose, fsetpos, fread, _fseeki64, _open, _set_fmode, _get_stream_buffer_pointers, fopen
                                            api-ms-win-crt-filesystem-l1-1-0.dll_unlink, rename, _access, _lock_file, _unlock_file, _stat64, _fstat64
                                            api-ms-win-crt-string-l1-1-0.dllstrncpy, _strdup, strspn, strcspn, strncmp, strpbrk, strcat_s
                                            api-ms-win-crt-runtime-l1-1-0.dll_beginthreadex, terminate, _resetstkoflw, _errno, system, __sys_nerr, __sys_errlist, exit, _controlfp_s, _invalid_parameter_noinfo, _invalid_parameter_noinfo_noreturn, _register_thread_local_exe_atexit_callback, _c_exit, __p___wargv, __p___argc, _exit, _initterm_e, _initterm, _get_initial_wide_environment, _initialize_wide_environment, _configure_wide_argv, abort, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table
                                            api-ms-win-crt-heap-l1-1-0.dllcalloc, _recalloc, _callnewh, realloc, free, malloc, _set_new_mode
                                            api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dsign, _fdopen, _dclass
                                            api-ms-win-crt-convert-l1-1-0.dllstrtoul, atoi, strtol, strtoull, strtoll, strtod, wcstombs
                                            api-ms-win-crt-time-l1-1-0.dll_time64, strftime, _localtime64, _localtime64_s, _gmtime64
                                            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, localeconv, ___lc_codepage_func
                                            api-ms-win-crt-environment-l1-1-0.dllgetenv
                                            api-ms-win-crt-utility-l1-1-0.dllqsort, srand, rand
                                            bcrypt.dllBCryptGenRandom
                                            Normaliz.dllIdnToAscii, IdnToUnicode
                                            WLDAP32.dll
                                            CRYPT32.dllCertOpenStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertCloseStore
                                            WS2_32.dllsend, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAResetEvent, WSAWaitForMultipleEvents, closesocket, WSASetLastError, WSAGetLastError, ntohs, WSAStartup, WSACleanup, setsockopt, WSAIoctl, htons, getsockopt, socket, __WSAFDIsSet, select, accept, bind, connect, getsockname, htonl, listen, recv, getaddrinfo, freeaddrinfo, recvfrom, sendto, getpeername, ioctlsocket, gethostname
                                            Language of compilation systemCountry where language is spokenMap
                                            RussianRussia
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 27, 2024 18:43:41.447643042 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:41.447743893 CET44349712104.26.1.5192.168.2.6
                                            Oct 27, 2024 18:43:41.447946072 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:41.458570957 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:41.458609104 CET44349712104.26.1.5192.168.2.6
                                            Oct 27, 2024 18:43:42.089050055 CET44349712104.26.1.5192.168.2.6
                                            Oct 27, 2024 18:43:42.089118958 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:42.098361015 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:42.098408937 CET44349712104.26.1.5192.168.2.6
                                            Oct 27, 2024 18:43:42.098529100 CET49712443192.168.2.6104.26.1.5
                                            Oct 27, 2024 18:43:42.098546028 CET44349712104.26.1.5192.168.2.6
                                            Oct 27, 2024 18:43:42.098632097 CET49712443192.168.2.6104.26.1.5
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 27, 2024 18:43:41.436001062 CET5222653192.168.2.61.1.1.1
                                            Oct 27, 2024 18:43:41.444333076 CET53522261.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 27, 2024 18:43:41.436001062 CET192.168.2.61.1.1.10xa2f4Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 27, 2024 18:43:41.444333076 CET1.1.1.1192.168.2.60xa2f4No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                                            Oct 27, 2024 18:43:41.444333076 CET1.1.1.1192.168.2.60xa2f4No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false
                                            Oct 27, 2024 18:43:41.444333076 CET1.1.1.1192.168.2.60xa2f4No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:13:43:37
                                            Start date:27/10/2024
                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe"
                                            Imagebase:0xe20000
                                            File size:1'236'992 bytes
                                            MD5 hash:992A36EDCCD6FB4DB6AAD9C43329CB04
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:13:43:37
                                            Start date:27/10/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:13:43:39
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\system32\cmd.exe /c cls
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:13:43:39
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:13:43:39
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\certutil.exe
                                            Wow64 process (32bit):true
                                            Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74444428.17336.1019.exe" MD5
                                            Imagebase:0x7f0000
                                            File size:1'277'440 bytes
                                            MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:6
                                            Start time:13:43:39
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\find.exe
                                            Wow64 process (32bit):true
                                            Commandline:find /i /v "md5"
                                            Imagebase:0x120000
                                            File size:14'848 bytes
                                            MD5 hash:15B158BC998EEF74CFDD27C44978AEA0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:7
                                            Start time:13:43:39
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\find.exe
                                            Wow64 process (32bit):true
                                            Commandline:find /i /v "certutil"
                                            Imagebase:0x120000
                                            File size:14'848 bytes
                                            MD5 hash:15B158BC998EEF74CFDD27C44978AEA0
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:true

                                            Target ID:8
                                            Start time:13:43:40
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:13:43:40
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\cmd.exe
                                            Wow64 process (32bit):true
                                            Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                                            Imagebase:0x1c0000
                                            File size:236'544 bytes
                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:10
                                            Start time:13:43:40
                                            Start date:27/10/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:13
                                            Start time:13:43:41
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\timeout.exe
                                            Wow64 process (32bit):true
                                            Commandline:timeout /t 5
                                            Imagebase:0x690000
                                            File size:25'088 bytes
                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:14
                                            Start time:13:43:41
                                            Start date:27/10/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 1104
                                            Imagebase:0x8e0000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Has exited:true

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:6.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:22.8%
                                              Total number of Nodes:2000
                                              Total number of Limit Nodes:46
                                              execution_graph 22669 e634d0 22670 e63509 _Cnd_do_broadcast_at_thread_exit 22669->22670 22675 e633f0 22670->22675 22672 e6351a 22673 e63f2d 5 API calls 22672->22673 22674 e63531 22673->22674 22676 e633f7 22675->22676 22678 e6341b 22675->22678 22677 e63446 _invalid_parameter_noinfo_noreturn 22676->22677 22676->22678 22679 e63456 22677->22679 22678->22672 22679->22672 22680 e6a880 22681 e6a8af 22680->22681 22698 e6a9e4 22680->22698 22682 e6f570 21 API calls 22681->22682 22683 e6a8b5 free free 22682->22683 22686 e6a8f0 22683->22686 22684 e63f2d 5 API calls 22685 e6aa0c 22684->22685 22687 e6a939 22686->22687 22689 e8bf90 11 API calls 22686->22689 22688 e840d0 11 API calls 22687->22688 22690 e6a951 22688->22690 22689->22687 22691 e6a972 22690->22691 22692 e6a95c 22690->22692 22693 e6c8a0 10 API calls 22691->22693 22694 e6c8a0 10 API calls 22692->22694 22695 e6a981 22693->22695 22697 e6a970 22694->22697 22696 e6ffe0 11 API calls 22695->22696 22695->22697 22696->22697 22697->22698 22699 e6aa28 22697->22699 22700 e85980 2 API calls 22697->22700 22698->22684 22701 e84df0 6 API calls 22699->22701 22700->22699 22702 e6aa38 22701->22702 22703 e6ab6c 22702->22703 22704 e6aaa8 22702->22704 22707 e76a70 72 API calls 22703->22707 22705 e81a70 5 API calls 22704->22705 22706 e6aaf6 22705->22706 22708 e733e0 74 API calls 22706->22708 22707->22698 22709 e6ab14 22708->22709 22709->22698 22710 e7bd40 8 API calls 22709->22710 22710->22698 22711 e63470 22715 e4edb0 GetModuleHandleW GetProcAddress 22711->22715 22713 e634a7 22716 e4eded NtSetInformationThread 22715->22716 22765 e4edf7 22715->22765 22716->22765 22717 e4f365 22718 e63f2d 5 API calls 22717->22718 22719 e4f375 _Cnd_do_broadcast_at_thread_exit 22718->22719 22719->22713 22721 e4ef30 22901 e28060 22721->22901 22723 e41260 11 API calls 22725 e4eeeb VirtualAlloc 22723->22725 22725->22721 22728 e4ef05 VirtualAlloc 22725->22728 22726 e4f2f7 GetCurrentProcess NtTerminateProcess 22726->22765 22727 e4ef5c GetShortPathNameW 22727->22726 22738 e4ef78 22727->22738 22729 e4ef23 VirtualFree 22728->22729 22730 e4f379 GetWriteWatch 22728->22730 22729->22721 22730->22721 22732 e4f3b1 VirtualFree VirtualFree 22730->22732 22732->22721 22733 e4f3d8 22732->22733 22735 e41260 11 API calls 22733->22735 22736 e4f4af GetModuleHandleW 22735->22736 22737 e32070 17 API calls 22736->22737 22737->22765 22738->22738 22739 e4f1cc GetEnvironmentVariableW 22738->22739 22739->22726 22741 e4f2d9 ShellExecuteW 22739->22741 22741->22726 22745 e41260 11 API calls 22746 e4f609 LoadLibraryA 22745->22746 22747 e4f6fb GetProcAddress 22746->22747 22746->22765 22748 e4f70b OpenProcess 22747->22748 22747->22765 22751 e4f71f CloseHandle 22748->22751 22748->22765 22751->22721 22752 e41260 11 API calls 22753 e4f826 CreateFileA 22752->22753 22753->22721 22754 e4fa0c CloseHandle 22753->22754 22849 e50910 22754->22849 22758 e41260 11 API calls 22758->22765 22759 e4fb50 GetProcessHeap HeapWalk 22759->22765 22760 e41260 11 API calls 22761 e4fd79 GetPEB 22760->22761 22761->22721 22762 e4fd89 22761->22762 22763 e41260 11 API calls 22762->22763 22764 e4ff6c GetPEB 22763->22764 22764->22721 22764->22765 22765->22717 22765->22721 22765->22723 22765->22745 22765->22752 22765->22758 22765->22759 22765->22760 22767 e41260 11 API calls 22765->22767 22769 e51a10 22765->22769 22782 e4eda0 GetPEB 22765->22782 22783 e63180 22765->22783 22792 e51670 22765->22792 22812 e514a0 22765->22812 22816 e51000 22765->22816 22837 e50e60 22765->22837 22845 e50d10 22765->22845 22864 e505b0 22765->22864 22876 e501f0 22765->22876 22897 e51e40 22765->22897 22768 e5016e memset GetCurrentThread GetThreadContext 22767->22768 22768->22765 22770 e51bd0 22769->22770 22770->22770 22771 e41260 11 API calls 22770->22771 22772 e51be9 memset GetPEB 22771->22772 22774 e51c24 GetPEB 22772->22774 22780 e51ce2 22774->22780 22775 e51e22 22776 e63f2d 5 API calls 22775->22776 22779 e51e34 22776->22779 22777 e51dc1 22778 e63f2d 5 API calls 22777->22778 22781 e51dcf 22778->22781 22779->22765 22780->22775 22780->22777 22781->22765 22782->22765 22997 e4eab0 _Query_perf_frequency _Query_perf_counter 22783->22997 22785 e631f6 22786 e63330 5 API calls 22785->22786 22787 e6320f 22786->22787 22787->22765 22788 e63197 22788->22785 22789 e631da 22788->22789 22999 e63330 22789->22999 22793 e51800 22792->22793 22793->22793 22794 e41260 11 API calls 22793->22794 22795 e51816 GetCurrentProcessId OpenProcess 22794->22795 22796 e5184e 22795->22796 22797 e5187a LoadLibraryW 22795->22797 22796->22797 22798 e51890 GetProcAddress 22797->22798 22798->22798 22799 e518ab GetModuleHandleA 22798->22799 22800 e51902 wcsstr 22799->22800 22801 e518d9 22799->22801 22802 e51914 wcsstr 22800->22802 22803 e51968 22800->22803 22801->22800 22802->22803 22806 e519d1 CloseHandle 22802->22806 22805 e51970 VirtualProtectEx WriteProcessMemory VirtualProtectEx 22803->22805 22803->22806 22805->22803 22807 e519ed 22805->22807 22808 e63f2d 5 API calls 22806->22808 22809 e63f2d 5 API calls 22807->22809 22810 e519e6 22808->22810 22811 e519fb 22809->22811 22810->22765 22811->22765 22813 e515e0 22812->22813 22813->22813 22814 e41260 11 API calls 22813->22814 22815 e515f6 22814->22815 22815->22765 22817 e511c0 22816->22817 22817->22817 22818 e41260 11 API calls 22817->22818 22819 e511d9 memset RegOpenKeyExW 22818->22819 22820 e5128d memset RegOpenKeyExW 22819->22820 22821 e5122a RegGetValueW 22819->22821 22822 e512d2 RegGetValueW 22820->22822 22823 e5132f memset RegOpenKeyExW 22820->22823 22821->22820 22829 e5124f 22821->22829 22822->22823 22832 e512f7 22822->22832 22824 e51374 RegGetValueW 22823->22824 22825 e513d1 memset RegOpenKeyExW 22823->22825 22824->22825 22835 e51399 22824->22835 22826 e51484 22825->22826 22827 e51416 RegGetValueW 22825->22827 22830 e63f2d 5 API calls 22826->22830 22827->22826 22828 e5143b 22827->22828 22828->22826 22833 e5146f 22828->22833 22829->22820 22829->22833 22831 e51492 22830->22831 22831->22765 22832->22823 22832->22833 22834 e63f2d 5 API calls 22833->22834 22836 e5147d 22834->22836 22835->22825 22835->22833 22836->22765 22838 e50ed6 22837->22838 23006 e3f810 22838->23006 22841 e50f34 22843 e63f2d 5 API calls 22841->22843 22842 e50f3b VirtualProtect 22842->22841 22844 e50ff2 22843->22844 22844->22765 22846 e50dd5 22845->22846 22847 e41260 11 API calls 22846->22847 22848 e50deb CloseHandle 22847->22848 22848->22765 22850 e509b4 22849->22850 22850->22850 22851 e41260 11 API calls 22850->22851 22852 e509ca LoadLibraryA 22851->22852 22853 e50a56 GetProcAddress 22852->22853 22854 e50cfa 22852->22854 22853->22854 22856 e50adf 22853->22856 22855 e63f2d 5 API calls 22854->22855 22857 e50d08 22855->22857 22858 e50ce4 22856->22858 22859 e50af7 VirtualAlloc 22856->22859 22857->22765 22860 e63f2d 5 API calls 22858->22860 22859->22858 22863 e50b14 VirtualFree 22859->22863 22861 e50cf3 22860->22861 22861->22765 22863->22858 22865 e50770 22864->22865 22865->22865 22866 e41260 11 API calls 22865->22866 22867 e50789 memset VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 22866->22867 22868 e50813 22867->22868 22869 e50828 GetLastError GetPEB 22867->22869 22871 e63f2d 5 API calls 22868->22871 22870 e50841 GetLastError 22869->22870 22874 e63f2d 5 API calls 22870->22874 22872 e50821 22871->22872 22872->22765 22875 e50901 22874->22875 22875->22765 22877 e50328 22876->22877 22877->22877 22878 e41260 11 API calls 22877->22878 22879 e5033e 22878->22879 22880 e50367 22879->22880 22881 e50350 FindWindowW 22879->22881 22880->22765 22881->22879 22882 e5037d 22881->22882 23010 e4e2f0 22882->23010 22884 e50397 22885 e2e120 11 API calls 22884->22885 22886 e503d9 22885->22886 22887 e4e2f0 6 API calls 22886->22887 22888 e503e7 22886->22888 22887->22888 22889 e41260 11 API calls 22888->22889 22890 e50529 22889->22890 22891 e5054b 22890->22891 22892 e50545 free 22890->22892 22893 e50577 22891->22893 22896 e50571 _invalid_parameter_noinfo_noreturn 22891->22896 22892->22891 22894 e50597 22893->22894 22895 e50591 free 22893->22895 22894->22765 22895->22894 22896->22893 22898 e51f80 22897->22898 22898->22898 22899 e41260 11 API calls 22898->22899 22900 e51f96 KiUserExceptionDispatcher 22899->22900 22900->22765 22902 e280c3 22901->22902 22944 e2d330 22901->22944 22905 e2e120 11 API calls 22902->22905 22903 e63f2d 5 API calls 22904 e2d351 GetModuleFileNameW 22903->22904 22904->22726 22904->22727 22906 e2b7fc 22905->22906 22907 e2b872 22906->22907 23042 e64018 AcquireSRWLockExclusive 22906->23042 22908 e2b8da 22907->22908 22910 e64018 3 API calls 22907->22910 22937 e2bb38 22908->22937 23049 e65080 AcquireSRWLockExclusive 22908->23049 22913 e2b892 22910->22913 22911 e2b82a 22911->22907 22915 e642b8 2 API calls 22911->22915 22913->22908 22919 e642b8 2 API calls 22913->22919 22914 e2bb8e GetUserNameA 22920 e2bbb9 22914->22920 22917 e2b865 22915->22917 22916 e2b916 22918 e64e80 309 API calls 22916->22918 23047 e63fc7 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 22917->23047 22922 e2b91e 22918->22922 22923 e2b8cd 22919->22923 22920->22920 22928 e2e120 11 API calls 22920->22928 22925 e2bafe 22922->22925 23052 e67e00 22922->23052 23048 e63fc7 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 22923->23048 22924 e2dec0 2 API calls 22932 e2bf3a 22924->22932 23057 e65030 AcquireSRWLockExclusive 22925->23057 22933 e2bcfc 22928->22933 22930 e2bb06 22930->22937 22940 e2bb32 _invalid_parameter_noinfo_noreturn 22930->22940 22931 e2bac4 22934 e67e00 17 API calls 22931->22934 22936 e2e120 11 API calls 22932->22936 22950 e2c145 22932->22950 22933->22924 22941 e2d32a _invalid_parameter_noinfo_noreturn 22933->22941 22938 e2bad7 22934->22938 22935 e2dec0 2 API calls 22947 e2c2a2 22935->22947 22939 e2c11c 22936->22939 22937->22914 22937->22933 22942 e67e00 17 API calls 22938->22942 23062 e2d9c0 22939->23062 22940->22937 22941->22944 22943 e2baec 22942->22943 22946 e64ee0 336 API calls 22943->22946 22944->22903 22948 e2baf5 22946->22948 22947->22947 22952 e2e120 11 API calls 22947->22952 22962 e2c3f8 22947->22962 22951 e64e40 246 API calls 22948->22951 22949 e2dec0 2 API calls 22953 e2c552 22949->22953 22950->22935 22950->22941 22951->22925 22954 e2c3d0 22952->22954 22955 e2c58f 22953->22955 22956 e2c56d 22953->22956 22982 e2c8f7 22953->22982 22958 e2d9c0 22 API calls 22954->22958 22960 e2e120 11 API calls 22955->22960 22957 e2d420 10 API calls 22956->22957 22963 e2c57d 22957->22963 22958->22962 22959 e2dec0 2 API calls 22961 e2cae2 22959->22961 22960->22963 22964 e2cb1e 22961->22964 22965 e2cafd 22961->22965 22989 e2ce47 22961->22989 22962->22941 22962->22949 22966 e2e120 11 API calls 22963->22966 23078 e24350 GetCurrentProcess OpenProcessToken 22964->23078 22967 e2d420 10 API calls 22965->22967 22970 e2c7bc 22966->22970 22974 e2cb0f 22967->22974 22969 e2e120 11 API calls 22971 e2d038 22969->22971 22973 e2d9c0 22 API calls 22970->22973 22972 e2d420 10 API calls 22971->22972 22975 e2d053 22972->22975 22984 e2c7e7 22973->22984 22976 e2e120 11 API calls 22974->22976 22977 e2e120 11 API calls 22975->22977 22978 e2cd0c 22976->22978 22979 e2d082 22977->22979 22981 e2d9c0 22 API calls 22978->22981 22983 e2e120 11 API calls 22979->22983 22980 e2c8f1 _invalid_parameter_noinfo_noreturn 22980->22982 22991 e2cd37 22981->22991 22982->22959 22985 e2d188 22983->22985 22984->22980 22984->22982 23095 e38fa0 22985->23095 22987 e2ce41 _invalid_parameter_noinfo_noreturn 22987->22989 22989->22969 22991->22987 22991->22989 22998 e4eae2 __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22997->22998 22998->22788 23003 e63340 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 22999->23003 23000 e4eab0 2 API calls 23000->23003 23001 e631ef 23001->22765 23002 e6337b Sleep 23002->23003 23003->23000 23003->23001 23003->23002 23004 e633d1 Sleep 23003->23004 23005 e633b7 Sleep 23003->23005 23004->23003 23005->23003 23007 e3f820 23006->23007 23008 e41260 11 API calls 23007->23008 23009 e3f832 GetSystemInfo VirtualAlloc 23008->23009 23009->22841 23009->22842 23011 e4e301 23010->23011 23012 e4e30b 23010->23012 23011->22884 23014 e4e348 calloc _recalloc 23012->23014 23025 e4e3e6 23012->23025 23013 e30f20 _CxxThrowException 23029 e4e402 23013->23029 23015 e4e382 23014->23015 23016 e4e369 23014->23016 23022 e4e3db GetLastError 23015->23022 23015->23029 23030 e4e41e 23015->23030 23016->23015 23020 e4e470 23016->23020 23017 e30f20 _CxxThrowException 23017->23030 23031 e30f20 23020->23031 23022->23025 23022->23030 23023 e4e4a0 23027 e30f20 _CxxThrowException 23023->23027 23025->23013 23025->23029 23026 e4e44a 23026->22884 23028 e4e4aa 23027->23028 23029->23017 23029->23030 23030->23023 23030->23026 23034 e4e920 23030->23034 23041 e30f10 23031->23041 23033 e30f2e _CxxThrowException 23035 e4e924 free 23034->23035 23036 e4e498 23034->23036 23035->23036 23037 e4dcb0 GetLastError 23036->23037 23038 e4dcba 23037->23038 23039 e30f20 _CxxThrowException 23038->23039 23040 e4dcc8 23039->23040 23041->23033 23043 e6402c 23042->23043 23044 e64031 ReleaseSRWLockExclusive 23043->23044 23315 e64067 SleepConditionVariableSRW 23043->23315 23044->22911 23047->22907 23048->22908 23050 e650b0 47 API calls 23049->23050 23051 e65097 ReleaseSRWLockExclusive 23050->23051 23051->22916 23053 e67e0e 23052->23053 23054 e67e08 23052->23054 23316 e65230 23053->23316 23054->22931 23058 e65044 23057->23058 23059 e65070 ReleaseSRWLockExclusive 23057->23059 23058->23059 23405 e7f560 23058->23405 23059->22930 23063 e2d9e8 23062->23063 23064 e2db1d 23062->23064 23065 e2d9f6 memmove 23063->23065 23066 e2da19 23063->23066 23433 e226d0 ?_Xout_of_range@std@@YAXPBD 23064->23433 23065->22950 23069 e2da65 23066->23069 23070 e2da28 memmove memmove 23066->23070 23073 e2daff 23069->23073 23077 e2da7e memmove memmove memmove 23069->23077 23070->22950 23415 e2e320 23073->23415 23075 e2db14 23075->22950 23077->22950 23079 e244ba GetTokenInformation malloc GetTokenInformation 23078->23079 23080 e2439d 23078->23080 23081 e2462a ConvertSidToStringSidA 23079->23081 23082 e244ff free 23079->23082 23087 e2e120 11 API calls 23080->23087 23084 e24645 free 23081->23084 23085 e24768 23081->23085 23083 e24610 23082->23083 23083->23083 23088 e2e120 11 API calls 23083->23088 23086 e24751 23084->23086 23091 e2e120 11 API calls 23085->23091 23086->23086 23090 e2e120 11 API calls 23086->23090 23089 e244b5 23087->23089 23088->23089 23093 e63f2d 5 API calls 23089->23093 23090->23089 23092 e2479c LocalFree free CloseHandle 23091->23092 23092->23089 23094 e247eb 23093->23094 23094->22974 23096 e39010 23095->23096 23097 e3903a 23095->23097 23099 e2e120 11 API calls 23096->23099 23098 e64e80 309 API calls 23097->23098 23100 e39042 23098->23100 23101 e39035 23099->23101 23103 e68060 6 API calls 23100->23103 23102 e3ac20 20 API calls 23101->23102 23102->23097 23104 e390ca 23103->23104 23105 e68060 6 API calls 23104->23105 23106 e390fb 23105->23106 23107 e41a30 11 API calls 23106->23107 23108 e39193 23107->23108 23435 e35810 23108->23435 23111 e43590 14 API calls 23114 e391c3 23111->23114 23112 e39248 23115 e392ab 23112->23115 23116 e3927a memmove 23112->23116 23113 e39242 _invalid_parameter_noinfo_noreturn 23113->23112 23114->23112 23114->23113 23117 e2dfc0 13 API calls 23115->23117 23118 e392c4 23116->23118 23117->23118 23119 e34a80 20 API calls 23118->23119 23120 e39308 23119->23120 23121 e3f720 14 API calls 23120->23121 23122 e3931c 23121->23122 23123 e34960 20 API calls 23122->23123 23124 e39360 23123->23124 23125 e3f720 14 API calls 23124->23125 23126 e39374 23125->23126 23127 e41a30 11 API calls 23126->23127 23128 e393ca 23127->23128 23129 e443f0 16 API calls 23128->23129 23130 e393f2 23129->23130 23131 e39468 23130->23131 23134 e39462 _invalid_parameter_noinfo_noreturn 23130->23134 23132 e3949e memmove 23131->23132 23133 e394dc 23131->23133 23135 e394f5 23132->23135 23136 e2dfc0 13 API calls 23133->23136 23134->23131 23439 e356f0 23135->23439 23136->23135 23138 e39539 23139 e3f790 14 API calls 23138->23139 23140 e39554 23139->23140 23141 e34960 20 API calls 23140->23141 23142 e39595 23141->23142 23143 e3f790 14 API calls 23142->23143 23144 e395a4 23143->23144 23145 e34c10 20 API calls 23144->23145 23146 e395e8 23145->23146 23147 e3f790 14 API calls 23146->23147 23152 e395fa 23147->23152 23148 e399d2 _invalid_parameter_noinfo_noreturn 23149 e399d8 23148->23149 23150 e64e40 246 API calls 23149->23150 23151 e39a08 23150->23151 23153 e2d420 10 API calls 23151->23153 23152->23148 23152->23149 23154 e39a1c 23153->23154 23155 e2d420 10 API calls 23154->23155 23156 e39a2e 23155->23156 23157 e3a610 375 API calls 23156->23157 23158 e39a3d 23157->23158 23159 e41cf0 157 API calls 23158->23159 23160 e39a5f 23159->23160 23161 e41a30 11 API calls 23160->23161 23162 e39ab4 23161->23162 23163 e3ee00 17 API calls 23162->23163 23166 e39ac7 23163->23166 23164 e39b16 23165 e39b59 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE 23164->23165 23167 e39b4f 23164->23167 23170 e39b49 _invalid_parameter_noinfo_noreturn 23164->23170 23168 e63f3b std::_Facet_Register 5 API calls 23165->23168 23166->23164 23169 e41260 11 API calls 23166->23169 23167->23165 23171 e39c40 23168->23171 23169->23164 23170->23167 23172 e4d4b0 17 API calls 23171->23172 23173 e39c96 23172->23173 23174 e39d0e 23173->23174 23176 e39cb0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z ?setw@std@@YA?AU?$_Smanip@_J@1@_J 23173->23176 23175 e3e7f0 11 API calls 23174->23175 23179 e39d38 23175->23179 23177 e39cf8 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H 23176->23177 23177->23174 23177->23176 23315->23043 23317 e65bbe 23316->23317 23350 e6526b 23316->23350 23318 e67235 23317->23318 23319 e66d13 23317->23319 23317->23350 23338 e674aa 23318->23338 23343 e67515 23318->23343 23318->23350 23322 e66da4 23319->23322 23323 e66e6c 23319->23323 23324 e66ea9 23319->23324 23325 e66d36 23319->23325 23326 e66ef1 23319->23326 23327 e6703e 23319->23327 23328 e66f7e 23319->23328 23329 e670be 23319->23329 23330 e66e3c 23319->23330 23331 e66ec1 23319->23331 23332 e66fc1 23319->23332 23333 e6706e 23319->23333 23334 e66e54 23319->23334 23335 e66e91 23319->23335 23336 e66ed9 23319->23336 23337 e66de7 23319->23337 23349 e66f28 23319->23349 23319->23350 23367 e66f53 23319->23367 23369 e66f96 23319->23369 23370 e66d4e 23319->23370 23371 e66d79 23319->23371 23320 e63f2d 5 API calls 23321 e6760a 23320->23321 23321->22931 23355 e651d0 2 API calls 23322->23355 23342 e651d0 2 API calls 23323->23342 23345 e651d0 2 API calls 23324->23345 23383 e651d0 free 23325->23383 23348 e651d0 2 API calls 23326->23348 23354 e651d0 2 API calls 23327->23354 23351 e651d0 2 API calls 23328->23351 23339 e651d0 2 API calls 23329->23339 23340 e651d0 2 API calls 23330->23340 23346 e651d0 2 API calls 23331->23346 23353 e651d0 2 API calls 23332->23353 23362 e651d0 2 API calls 23333->23362 23341 e651d0 2 API calls 23334->23341 23344 e651d0 2 API calls 23335->23344 23347 e651d0 2 API calls 23336->23347 23337->23350 23388 e712b0 23337->23388 23338->23350 23396 e65140 free 23338->23396 23339->23350 23340->23350 23341->23350 23342->23350 23343->23350 23357 e675c7 23343->23357 23358 e67532 23343->23358 23359 e67562 23343->23359 23360 e675dc 23343->23360 23361 e6754a 23343->23361 23379 e67577 23343->23379 23380 e6759f 23343->23380 23344->23350 23345->23350 23346->23350 23347->23350 23348->23350 23349->23350 23373 e651d0 2 API calls 23349->23373 23350->23320 23351->23350 23353->23350 23354->23350 23355->23350 23366 e65140 3 API calls 23357->23366 23363 e65140 3 API calls 23358->23363 23365 e65140 3 API calls 23359->23365 23368 e65140 3 API calls 23360->23368 23364 e65140 3 API calls 23361->23364 23362->23350 23363->23350 23364->23350 23365->23350 23366->23350 23367->23350 23374 e651d0 2 API calls 23367->23374 23368->23350 23369->23350 23375 e651d0 2 API calls 23369->23375 23370->23350 23376 e651d0 2 API calls 23370->23376 23371->23350 23377 e651d0 2 API calls 23371->23377 23373->23350 23374->23350 23375->23350 23376->23350 23377->23350 23379->23350 23381 e65140 3 API calls 23379->23381 23380->23350 23382 e65140 3 API calls 23380->23382 23381->23350 23382->23350 23384 e651ee 23383->23384 23385 e65229 23383->23385 23386 e65206 23384->23386 23387 e6520d _strdup 23384->23387 23385->23350 23386->23350 23387->23350 23389 e66e1c free 23388->23389 23390 e712b9 23388->23390 23389->23350 23391 e7f170 2 API calls 23390->23391 23392 e712c7 23391->23392 23393 e712db free free free memset 23392->23393 23394 e7f170 2 API calls 23392->23394 23393->23389 23395 e712d8 23394->23395 23395->23393 23397 e651c7 23396->23397 23398 e6515f 23396->23398 23397->23350 23399 e65171 malloc 23398->23399 23400 e65169 23398->23400 23401 e65191 23399->23401 23402 e65198 23399->23402 23400->23350 23401->23350 23403 e651bf 23402->23403 23404 e651ac memmove 23402->23404 23403->23350 23404->23403 23406 e7f587 FreeLibrary 23405->23406 23407 e7f5a2 23405->23407 23406->23407 23412 eb0b30 23407->23412 23410 e65063 23410->23059 23411 e7f5ae WSACleanup 23411->23410 23413 eb0b39 FreeLibrary 23412->23413 23414 e7f5a7 23412->23414 23413->23414 23414->23410 23414->23411 23416 e2e498 23415->23416 23419 e2e34b 23415->23419 23434 e21690 ?_Xlength_error@std@@YAXPBD 23416->23434 23418 e2e49d 23420 e215f0 Concurrency::cancel_current_task 2 API calls 23418->23420 23422 e2e3b1 23419->23422 23423 e2e3be 23419->23423 23427 e2e360 23419->23427 23429 e2e370 23419->23429 23424 e2e4a2 23420->23424 23421 e63f3b std::_Facet_Register 5 API calls 23421->23429 23422->23418 23422->23427 23428 e63f3b std::_Facet_Register 5 API calls 23423->23428 23425 e2e461 memmove memmove memmove 23425->23075 23426 e2e3f8 memmove memmove memmove 23430 e2e432 23426->23430 23431 e2e442 23426->23431 23427->23421 23428->23429 23429->23425 23429->23426 23432 e2e45b _invalid_parameter_noinfo_noreturn 23429->23432 23430->23431 23430->23432 23431->23075 23432->23425 23436 e3581e 23435->23436 23437 e41a30 11 API calls 23436->23437 23438 e35897 23437->23438 23438->23111 23440 e3573f 23439->23440 23441 e41a30 11 API calls 23440->23441 23442 e35761 23441->23442 23443 e443f0 16 API calls 23442->23443 23444 e3577e 23443->23444 23445 e357e2 23444->23445 23446 e357dc _invalid_parameter_noinfo_noreturn 23444->23446 23445->23138 23446->23445 23458 e63270 23459 e4eab0 2 API calls 23458->23459 23463 e63287 23459->23463 23460 e632e6 23461 e63330 5 API calls 23460->23461 23462 e632ff 23461->23462 23463->23460 23464 e632ca 23463->23464 23465 e63330 5 API calls 23464->23465 23466 e632df 23465->23466 22553 e52010 GetModuleFileNameW 22554 e52090 22553->22554 22554->22554 22584 e227e0 22554->22584 22556 e520b2 22557 e520e1 memset 22556->22557 22564 e52101 22556->22564 22557->22564 22558 e52710 22621 e226d0 ?_Xout_of_range@std@@YAXPBD 22558->22621 22559 e227e0 11 API calls 22561 e521fe WideCharToMultiByte 22559->22561 22601 e3f840 22561->22601 22564->22558 22564->22559 22565 e52240 WideCharToMultiByte 22566 e522c0 _time64 srand 22565->22566 22567 e52289 22565->22567 22570 e52570 22566->22570 22568 e522b0 _invalid_parameter_noinfo_noreturn 22567->22568 22569 e522b6 22567->22569 22568->22569 22569->22566 22571 e2e120 11 API calls 22570->22571 22572 e5258c rand 22571->22572 22573 e525e0 22572->22573 22574 e525af 22572->22574 22576 e525e9 strcat_s rename 22573->22576 22577 e5270b 22573->22577 22575 e525b0 rand 22574->22575 22575->22573 22575->22575 22579 e5262f 22576->22579 22578 e64432 5 API calls 22577->22578 22578->22558 22580 e526e3 22579->22580 22581 e526dd _invalid_parameter_noinfo_noreturn 22579->22581 22582 e63f2d 5 API calls 22580->22582 22581->22580 22583 e52704 22582->22583 22585 e22801 22584->22585 22586 e228cb 22584->22586 22587 e22806 memmove 22585->22587 22593 e2282d 22585->22593 22622 e21690 ?_Xlength_error@std@@YAXPBD 22586->22622 22587->22556 22590 e228c6 22591 e215f0 Concurrency::cancel_current_task 2 API calls 22590->22591 22591->22586 22592 e22892 22594 e63f3b std::_Facet_Register 5 API calls 22592->22594 22593->22590 22593->22592 22595 e22857 22593->22595 22597 e22864 memmove 22593->22597 22594->22597 22598 e63f3b std::_Facet_Register 5 API calls 22595->22598 22597->22556 22599 e2285d 22598->22599 22599->22597 22600 e2288c _invalid_parameter_noinfo_noreturn 22599->22600 22600->22592 22602 e3f86b 22601->22602 22603 e3f929 22601->22603 22604 e3f871 memset 22602->22604 22606 e3f899 22602->22606 22623 e21690 ?_Xlength_error@std@@YAXPBD 22603->22623 22604->22565 22607 e3f92e 22606->22607 22608 e3f8fd memset 22606->22608 22609 e3f8a6 22606->22609 22611 e3f8f4 22606->22611 22610 e215f0 Concurrency::cancel_current_task 2 API calls 22607->22610 22608->22565 22612 e63f3b std::_Facet_Register 5 API calls 22609->22612 22613 e3f933 22610->22613 22616 e63f3b std::_Facet_Register 5 API calls 22611->22616 22614 e3f8b9 22612->22614 22615 e3e740 2 API calls 22613->22615 22617 e3f8c2 22614->22617 22618 e3f8ee _invalid_parameter_noinfo_noreturn 22614->22618 22619 e3f96c ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE 22615->22619 22616->22617 22617->22608 22618->22611 22620 e3f983 22619->22620 22620->22565 19649 e321f0 CreateThread 19650 e3226b 19649->19650 19651 e346ff 19649->19651 22538 e3da40 19649->22538 19650->19651 19652 e32275 UuidCreate UuidToStringA 19650->19652 19655 e3475a MessageBoxA exit 19651->19655 19653 e322d7 19652->19653 19654 e32305 19652->19654 19660 e41260 11 API calls 19653->19660 19836 e2e120 19654->19836 19656 e3476b 19655->19656 20272 e3ea70 19656->20272 19662 e322f8 RpcStringFreeA 19660->19662 19662->19654 19664 e32401 19872 e443f0 19664->19872 19666 e3434f _invalid_parameter_noinfo_noreturn 19683 e34101 19666->19683 19667 e32370 19667->19666 19853 e41a30 19667->19853 19669 e347b9 20280 e21690 ?_Xlength_error@std@@YAXPBD 19669->20280 19671 e63f3b std::_Facet_Register 5 API calls 19671->19683 19674 e41a30 11 API calls 19674->19683 19675 e32420 19675->19666 19878 e3f790 19675->19878 19676 e324d2 19676->19666 19885 e3ae00 GetModuleFileNameA 19676->19885 19679 e3ee00 17 API calls 19679->19683 19681 e32662 19917 e68060 19681->19917 19683->19666 19683->19671 19683->19674 19683->19679 19685 e344e0 19683->19685 19703 e346d7 19683->19703 20255 e3e740 19683->20255 19684 e326a1 19687 e41a30 11 API calls 19684->19687 20259 e3eae0 19685->20259 19690 e32762 19687->19690 19693 e41a30 11 API calls 19690->19693 19691 e3ee00 17 API calls 19694 e34525 19691->19694 19695 e327a3 19693->19695 20262 e417f0 19694->20262 19929 e43590 19695->19929 19700 e3453e 19705 e34556 19700->19705 19712 e34694 19700->19712 19701 e3f790 14 API calls 19702 e3288b 19701->19702 19954 e34960 19702->19954 19707 e63f2d 5 API calls 19703->19707 19704 e327c6 19704->19666 19704->19701 19708 e34689 MessageBoxA 19705->19708 19710 e346f8 19707->19710 19711 e346cf exit 19708->19711 19709 e328ed 19713 e32934 memmove 19709->19713 19714 e3297d 19709->19714 19711->19703 19715 e346bf ShellExecuteA 19712->19715 19718 e32999 19713->19718 20023 e2dfc0 19714->20023 19715->19711 19962 e34a80 19718->19962 19720 e329fd 19721 e32a81 19720->19721 19722 e32a38 memmove 19720->19722 19723 e2dfc0 13 API calls 19721->19723 19725 e32a9d 19722->19725 19723->19725 19726 e34960 20 API calls 19725->19726 19727 e32b01 19726->19727 19969 e3f720 19727->19969 19729 e32b15 19976 e34c10 19729->19976 19731 e32b77 19732 e3f790 14 API calls 19731->19732 19733 e32b89 19732->19733 19733->19666 19734 e3371b 19733->19734 20041 e41b50 19733->20041 19984 e64e40 19734->19984 19742 e33741 19746 e2d420 10 API calls 19742->19746 19743 e32f47 19743->19666 19749 e33756 19746->19749 20005 e3a610 19749->20005 19837 e2e1f3 19836->19837 19838 e2e140 19836->19838 20281 e21690 ?_Xlength_error@std@@YAXPBD 19837->20281 19839 e2e145 memmove 19838->19839 19848 e2e167 19838->19848 19839->19667 19841 e2e174 19845 e63f3b std::_Facet_Register 5 API calls 19841->19845 19842 e2e1f8 19843 e215f0 Concurrency::cancel_current_task 2 API calls 19842->19843 19846 e2e1fd 19843->19846 19844 e2e1cb memmove 19844->19667 19849 e2e187 19845->19849 19847 e2e1c2 19850 e63f3b std::_Facet_Register 5 API calls 19847->19850 19848->19841 19848->19842 19848->19844 19848->19847 19851 e2e190 19849->19851 19852 e2e1bc _invalid_parameter_noinfo_noreturn 19849->19852 19850->19851 19851->19844 19852->19847 19854 e41a71 19853->19854 19855 e41a5c 19853->19855 19856 e41b36 19854->19856 19857 e41a7f 19854->19857 19855->19664 20282 e21690 ?_Xlength_error@std@@YAXPBD 19856->20282 19858 e41a84 memmove 19857->19858 19860 e41aa8 19857->19860 19858->19664 19861 e41b3b 19860->19861 19862 e41b0c memmove 19860->19862 19863 e41ab5 19860->19863 19865 e41b03 19860->19865 19864 e215f0 Concurrency::cancel_current_task 2 API calls 19861->19864 19862->19664 19866 e63f3b std::_Facet_Register 5 API calls 19863->19866 19867 e41b40 19864->19867 19868 e63f3b std::_Facet_Register 5 API calls 19865->19868 19869 e41ac8 19866->19869 19870 e41ad1 19868->19870 19869->19870 19871 e41afd _invalid_parameter_noinfo_noreturn 19869->19871 19870->19862 19871->19865 19873 e44478 19872->19873 19874 e4440a memmove memmove memmove 19872->19874 20283 e49620 19873->20283 19874->19675 19876 e4448a 19876->19675 19879 e3f7a4 19878->19879 19880 e3f7b4 memmove 19879->19880 19881 e3f7e9 19879->19881 19880->19676 19883 e2dfc0 13 API calls 19881->19883 19884 e3f7fa 19883->19884 19884->19676 19886 e3aec7 19885->19886 19886->19886 19887 e2e120 11 API calls 19886->19887 19888 e3aee3 19887->19888 19889 e443f0 16 API calls 19888->19889 19890 e3aefd 19889->19890 19891 e34ed0 20 API calls 19890->19891 19892 e3af41 _popen 19891->19892 19894 e3afb4 fgets 19892->19894 19895 e3b10a 19892->19895 19897 e3b012 _pclose 19894->19897 19902 e3afce 19894->19902 19896 e3ea70 11 API calls 19895->19896 19898 e3b131 19896->19898 19901 e3b02e 19897->19901 19899 e2f060 6 API calls 19898->19899 19900 e3b147 _CxxThrowException 19899->19900 19903 e3b0da _invalid_parameter_noinfo_noreturn 19901->19903 19904 e3b0e0 19901->19904 19905 e41260 11 API calls 19902->19905 19903->19904 19906 e63f2d 5 API calls 19904->19906 19908 e3aff8 fgets 19905->19908 19907 e32659 19906->19907 19909 e64e80 AcquireSRWLockExclusive 19907->19909 19908->19897 19908->19902 19910 e64eb4 ReleaseSRWLockExclusive 19909->19910 19911 e64e95 19909->19911 20309 e76db0 calloc 19910->20309 20302 e650b0 19911->20302 19914 e64e9e 19914->19910 19916 e64ea5 ReleaseSRWLockExclusive 19914->19916 19915 e64ec8 19915->19681 19916->19681 19918 e68192 19917->19918 19921 e68080 19917->19921 19919 e63f2d 5 API calls 19918->19919 19920 e681a1 19919->19920 19920->19684 19922 e680ab _strdup 19921->19922 19926 e680d0 19921->19926 19923 e63f2d 5 API calls 19922->19923 19924 e680c6 19923->19924 19924->19684 19925 e68174 19927 e63f2d 5 API calls 19925->19927 19926->19918 19926->19925 19928 e6818e 19927->19928 19928->19684 19930 e435d3 19929->19930 19931 e4362d 19929->19931 19930->19931 19934 e435d8 memmove 19930->19934 19932 e43633 memmove 19931->19932 19933 e4368e 19931->19933 19935 e4366d 19932->19935 19936 e4366f memmove 19932->19936 19937 e43756 19933->19937 19941 e4369d 19933->19941 19934->19704 19935->19936 19936->19704 21317 e21690 ?_Xlength_error@std@@YAXPBD 19937->21317 19940 e4375b 19945 e215f0 Concurrency::cancel_current_task 2 API calls 19940->19945 19941->19940 19942 e436c6 memmove 19941->19942 19946 e436fc 19941->19946 19947 e436aa 19941->19947 19949 e43734 19942->19949 19950 e43736 memmove 19942->19950 19944 e63f3b std::_Facet_Register 5 API calls 19951 e436bf 19944->19951 19952 e43760 19945->19952 19948 e63f3b std::_Facet_Register 5 API calls 19946->19948 19947->19944 19948->19942 19949->19950 19950->19704 19951->19942 19953 e436f6 _invalid_parameter_noinfo_noreturn 19951->19953 19953->19946 19955 e349af 19954->19955 19956 e41a30 11 API calls 19955->19956 19957 e349d1 19956->19957 19958 e443f0 16 API calls 19957->19958 19959 e349ee 19958->19959 19960 e34a52 19959->19960 19961 e34a4c _invalid_parameter_noinfo_noreturn 19959->19961 19960->19709 19961->19960 21318 e34b70 19962->21318 19965 e443f0 16 API calls 19966 e34aed 19965->19966 19967 e34b48 _invalid_parameter_noinfo_noreturn 19966->19967 19968 e34b4e 19966->19968 19967->19968 19968->19720 19970 e3f730 19969->19970 19970->19970 19971 e3f771 19970->19971 19972 e3f747 memmove 19970->19972 19974 e2dfc0 13 API calls 19971->19974 19972->19729 19975 e3f782 19974->19975 19975->19729 19977 e34c5f 19976->19977 19978 e41a30 11 API calls 19977->19978 19979 e34c81 19978->19979 19980 e443f0 16 API calls 19979->19980 19981 e34c9e 19980->19981 19982 e34d02 19981->19982 19983 e34cfc _invalid_parameter_noinfo_noreturn 19981->19983 19982->19731 19983->19982 19985 e3372d 19984->19985 19986 e64e48 19984->19986 19988 e2d420 19985->19988 19986->19985 19987 e765e0 246 API calls 19986->19987 19987->19985 19989 e2d44c 19988->19989 19990 e2d504 19989->19990 20000 e2d45d 19989->20000 21322 e21690 ?_Xlength_error@std@@YAXPBD 19990->21322 19991 e2d462 19991->19742 19993 e2d48a 19997 e63f3b std::_Facet_Register 5 API calls 19993->19997 19994 e2d509 19995 e215f0 Concurrency::cancel_current_task 2 API calls 19994->19995 19998 e2d50e 19995->19998 19996 e2d4e1 memmove 19996->19742 20002 e2d49d 19997->20002 19999 e2d4d8 20001 e63f3b std::_Facet_Register 5 API calls 19999->20001 20000->19991 20000->19993 20000->19994 20000->19996 20000->19999 20003 e2d4a6 20001->20003 20002->20003 20004 e2d4d2 _invalid_parameter_noinfo_noreturn 20002->20004 20003->19996 20004->19999 20006 e64e80 309 API calls 20005->20006 20007 e3a668 20006->20007 20008 e41a30 11 API calls 20007->20008 20021 e3a6bd 20007->20021 20008->20021 20009 e3abe9 20010 e63f2d 5 API calls 20009->20010 20012 e33762 20010->20012 20011 e3a731 _invalid_parameter_noinfo_noreturn 20011->20021 20013 e67e00 17 API calls 20013->20021 20015 e2d420 10 API calls 20015->20021 20016 e2e120 11 API calls 20016->20021 20018 e41a30 11 API calls 20018->20021 20019 e3aa00 strstr 20019->20021 20020 e3ac20 20 API calls 20020->20021 20021->20009 20021->20011 20021->20013 20021->20015 20021->20016 20021->20018 20021->20019 20021->20020 20022 e3aa3d strstr 20021->20022 21323 e64ee0 20021->21323 21350 e64e60 20021->21350 20022->20021 20024 e2e10e 20023->20024 20027 e2dfea 20023->20027 21578 e21690 ?_Xlength_error@std@@YAXPBD 20024->21578 20026 e2e113 20028 e215f0 Concurrency::cancel_current_task 2 API calls 20026->20028 20030 e2e051 20027->20030 20031 e2e05e 20027->20031 20035 e2e000 20027->20035 20040 e2e010 20027->20040 20032 e2e118 20028->20032 20029 e63f3b std::_Facet_Register 5 API calls 20029->20040 20030->20026 20030->20035 20036 e63f3b std::_Facet_Register 5 API calls 20031->20036 20033 e2e0e5 memmove memmove 20033->19718 20034 e2e08a memmove memmove 20037 e2e0b6 20034->20037 20038 e2e0c6 20034->20038 20035->20029 20036->20040 20037->20038 20039 e2e0df _invalid_parameter_noinfo_noreturn 20037->20039 20038->19718 20039->20033 20040->20033 20040->20034 20040->20039 20042 e41bac 20041->20042 21579 e639ea ___lc_codepage_func 20042->21579 20044 e41bb3 20045 e32f38 20044->20045 20046 e41c4e 20044->20046 20047 e41bfb 20044->20047 20060 e31d40 20045->20060 21591 e2f470 20046->21591 21582 e63a08 MultiByteToWideChar 20047->21582 20051 e41c53 21595 e2f700 20051->21595 20052 e41c0e 21585 e3f660 20052->21585 20055 e41c32 20055->20045 20056 e2f700 8 API calls 20055->20056 20058 e41c61 20056->20058 20057 e41c17 20059 e63a08 ___std_fs_convert_narrow_to_wide@20 2 API calls 20057->20059 20059->20055 20061 e31d5e 20060->20061 21626 e63beb 20061->21626 20063 e31d6c 20064 e63f2d 5 API calls 20063->20064 20065 e31e0c 20063->20065 20066 e31e02 20064->20066 20066->19743 20256 e3e796 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE 20255->20256 20258 e3e74f 20255->20258 20257 e3e7e0 _invalid_parameter_noinfo_noreturn 20256->20257 20258->20256 20258->20257 20260 e34b70 11 API calls 20259->20260 20261 e3450f 20260->20261 20261->19691 20263 e4185b 20262->20263 20264 e34533 20263->20264 20265 e41260 11 API calls 20263->20265 20266 e22420 20264->20266 20265->20264 20267 e2242b 20266->20267 20268 e22446 20266->20268 20267->20268 20269 e22465 _invalid_parameter_noinfo_noreturn 20267->20269 20268->19700 22534 e21800 20269->22534 20271 e2247e 20271->19700 20273 e34fd0 11 API calls 20272->20273 20274 e34792 20273->20274 20275 e2f060 20274->20275 20276 e2f07e __std_exception_copy 20275->20276 20277 e2f07c 20275->20277 20278 e63f2d 5 API calls 20276->20278 20277->20276 20279 e2f0b6 _CxxThrowException 20278->20279 20279->19669 20284 e4975c 20283->20284 20285 e4964b 20283->20285 20301 e21690 ?_Xlength_error@std@@YAXPBD 20284->20301 20286 e49660 20285->20286 20291 e496b1 20285->20291 20292 e496be 20285->20292 20297 e49670 20285->20297 20290 e63f3b std::_Facet_Register 5 API calls 20286->20290 20288 e49761 20289 e215f0 Concurrency::cancel_current_task 2 API calls 20288->20289 20293 e49766 20289->20293 20290->20297 20291->20286 20291->20288 20294 e63f3b std::_Facet_Register 5 API calls 20292->20294 20294->20297 20295 e4973d memmove memmove 20295->19876 20296 e496ea memmove memmove 20298 e4971e 20296->20298 20299 e4970e 20296->20299 20297->20295 20297->20296 20300 e49737 _invalid_parameter_noinfo_noreturn 20297->20300 20298->19876 20299->20298 20299->20300 20300->20295 20303 e650c4 20302->20303 20304 e650c1 20302->20304 20305 e650cb calloc 20303->20305 20307 e650fd 20303->20307 20304->19914 20305->20307 20306 e6511a 20306->19914 20307->20306 20330 e7f5c0 20307->20330 20310 e76dc7 20309->20310 20311 e76dcc 20309->20311 20310->19915 20419 e70270 memset 20311->20419 20313 e76de0 20314 e76df9 20313->20314 20315 e76de9 free 20313->20315 20420 e6f3d0 calloc 20314->20420 20315->19915 20317 e76e06 20318 e76e26 __acrt_iob_func __acrt_iob_func __acrt_iob_func 20317->20318 20319 e76e0f 20317->20319 20438 e713b0 memset 20318->20438 20421 e70020 free free 20319->20421 20323 e76f14 20439 e74940 20323->20439 20326 e76f5a 20442 e7ab30 free free 20326->20442 20327 e74940 7 API calls 20327->20326 20331 e7f621 20330->20331 20332 e7f5de WSAStartup 20330->20332 20367 eb0b60 20331->20367 20333 e7f607 20332->20333 20334 e7f5f2 20332->20334 20337 e63f2d 5 API calls 20333->20337 20334->20331 20336 e7f601 WSACleanup 20334->20336 20336->20333 20341 e7f61a 20337->20341 20338 e7f626 20339 e7f62e GetModuleHandleA 20338->20339 20340 e7f7fc 20338->20340 20342 e7f655 GetProcAddress strpbrk 20339->20342 20343 e7f64a 20339->20343 20344 e63f2d 5 API calls 20340->20344 20341->20306 20346 e7f677 20342->20346 20347 e7f69f 20342->20347 20345 e7f781 GetModuleHandleA 20343->20345 20348 e7f80a 20344->20348 20353 e7f792 GetProcAddress GetProcAddress GetProcAddress 20345->20353 20354 e7f7b9 20345->20354 20349 e7f68d LoadLibraryA 20346->20349 20350 e7f67b 20346->20350 20351 e7f6c4 GetSystemDirectoryA 20347->20351 20352 e7f6a3 GetProcAddress 20347->20352 20348->20306 20349->20350 20350->20345 20359 e7f768 GetProcAddress 20350->20359 20351->20350 20357 e7f6da malloc 20351->20357 20352->20351 20356 e7f6af LoadLibraryExA 20352->20356 20353->20354 20376 eb0760 20354->20376 20356->20350 20360 e7f753 free 20357->20360 20361 e7f6ed GetSystemDirectoryA 20357->20361 20358 e7f7c8 20362 eb0760 14 API calls 20358->20362 20359->20345 20360->20350 20361->20360 20364 e7f6fc 20361->20364 20363 e7f7e0 QueryPerformanceFrequency 20362->20363 20363->20340 20365 e7f741 20364->20365 20366 e7f74a LoadLibraryA 20364->20366 20365->20360 20366->20365 20368 eb0b69 20367->20368 20369 eb0bc5 20367->20369 20370 eb0760 14 API calls 20368->20370 20369->20338 20371 eb0b78 20370->20371 20400 e7f410 GetModuleHandleA 20371->20400 20373 eb0b8d 20374 eb0b99 GetProcAddress 20373->20374 20375 eb0ba9 20373->20375 20374->20375 20375->20338 20377 eb07a7 20376->20377 20378 eb0784 GetModuleHandleA GetProcAddress 20376->20378 20379 eb096b 20377->20379 20380 eb07b7 memset 20377->20380 20378->20377 20381 e63f2d 5 API calls 20379->20381 20384 eb0839 VerSetConditionMask VerSetConditionMask 20380->20384 20383 eb097d 20381->20383 20383->20358 20386 eb087d VerSetConditionMask 20384->20386 20387 eb089b 20386->20387 20388 eb088e VerSetConditionMask 20386->20388 20389 eb08bc VerifyVersionInfoW 20387->20389 20394 eb08b3 20387->20394 20388->20387 20389->20394 20390 eb0950 20391 e63f2d 5 API calls 20390->20391 20393 eb0964 20391->20393 20392 eb08fc 20392->20390 20396 eb0949 VerifyVersionInfoW 20392->20396 20397 eb0927 20392->20397 20393->20358 20394->20390 20394->20392 20395 eb0760 5 API calls 20394->20395 20395->20392 20396->20390 20398 e63f2d 5 API calls 20397->20398 20399 eb0942 20398->20399 20399->20358 20401 e7f426 20400->20401 20402 e7f42a GetProcAddress strpbrk 20400->20402 20401->20373 20403 e7f473 20402->20403 20404 e7f451 20402->20404 20407 e7f477 GetProcAddress 20403->20407 20408 e7f499 GetSystemDirectoryA 20403->20408 20405 e7f455 20404->20405 20406 e7f464 LoadLibraryA 20404->20406 20405->20373 20406->20373 20407->20408 20409 e7f487 LoadLibraryExA 20407->20409 20410 e7f4b1 malloc 20408->20410 20411 e7f54f 20408->20411 20409->20373 20413 e7f545 free 20410->20413 20414 e7f4d4 GetSystemDirectoryA 20410->20414 20411->20373 20413->20411 20414->20413 20415 e7f4e3 20414->20415 20416 e7f521 free 20415->20416 20417 e7f53c LoadLibraryA 20415->20417 20416->20373 20417->20413 20419->20313 20420->20317 20422 e7005d 20421->20422 20423 e70066 20421->20423 20445 e8f2c0 20422->20445 20451 e7ca80 20423->20451 20427 e700e1 free 20427->19915 20430 e765e0 243 API calls 20431 e70099 20430->20431 20505 e6f000 free 20431->20505 20433 e700aa 20506 e6f000 free 20433->20506 20435 e700bb 20507 e7f170 20435->20507 20438->20323 21302 e75ca0 20439->21302 20441 e74947 20441->20326 20441->20327 20443 e74f10 3 API calls 20442->20443 20444 e7702d 20443->20444 20444->19915 20446 e8f2cb 20445->20446 20447 e8f2e4 20445->20447 20448 e8f2d0 free 20446->20448 20449 e8f306 20447->20449 20450 e8f2f0 free 20447->20450 20448->20447 20448->20448 20449->20423 20450->20449 20450->20450 20511 e7d210 20451->20511 20456 e765e0 20457 e70088 20456->20457 20458 e765ed 20456->20458 20457->20430 20458->20457 20519 e69630 20458->20519 20460 e76603 20461 e76636 20460->20461 20464 e76623 20460->20464 20525 e6a3d0 20460->20525 20462 e76652 free 20461->20462 20463 e76661 20461->20463 20462->20463 20466 e70020 223 API calls 20463->20466 20464->20461 20544 e6a110 20464->20544 20468 e7666e 20466->20468 20560 e74a90 20468->20560 20473 e766d2 20572 e79ee0 8 API calls 20473->20572 20474 e766b2 free 20474->20473 20478 e766ef 20576 e6e630 20478->20576 20480 e766f7 20585 e7ffc0 20480->20585 20482 e7670b 20608 e7f850 20482->20608 20486 e76725 20487 e7673e 20486->20487 20639 e80860 20486->20639 20489 e7f170 2 API calls 20487->20489 20490 e7674c 20489->20490 20645 e7f200 20490->20645 20505->20433 20506->20435 20508 e700c8 free 20507->20508 20509 e7f179 20507->20509 20508->20427 20510 e7f180 free free 20509->20510 20510->20508 20510->20510 20512 e7ca8b 20511->20512 20513 e7d220 free 20511->20513 20515 e7d250 20512->20515 20513->20512 20516 e70072 20515->20516 20517 e7d260 free 20515->20517 20516->20427 20516->20456 20517->20516 20520 e6963c 20519->20520 20523 e6967e 20519->20523 20520->20523 20648 e861c0 20520->20648 20522 e6966b 20522->20523 20656 e7bd40 20522->20656 20523->20460 20526 e6a409 20525->20526 20527 e6a3e2 20525->20527 20526->20464 20527->20526 20529 e6a465 20527->20529 20762 e6a880 20527->20762 20530 e861c0 5 API calls 20529->20530 20533 e6a4b9 20529->20533 20531 e6a4a6 20530->20531 20531->20533 20535 e7bd40 8 API calls 20531->20535 20793 e8bc90 20533->20793 20535->20533 20538 e6a5aa 20835 e6c8a0 20538->20835 20540 e6a55f 20540->20538 20821 e76a70 20540->20821 20545 e6a132 20544->20545 20546 e6a11d 20544->20546 20545->20461 20546->20545 20547 e6c8a0 10 API calls 20546->20547 20550 e6a156 20547->20550 20548 e6a1b7 21182 e72db0 20548->21182 20550->20548 20553 e6a880 95 API calls 20550->20553 20553->20550 20554 e6a1d0 20555 e84840 free 20554->20555 20556 e6a1df WSACloseEvent 20555->20556 20557 e6a1f9 20556->20557 21194 e6c7d0 free free 20557->21194 20559 e6a1ff free 20559->20461 20561 e74b3f free free 20560->20561 20564 e74aa2 20560->20564 20567 e74f10 20561->20567 20562 e74b25 free 20562->20561 20563 e74b23 20563->20562 20564->20561 20564->20562 20564->20563 21195 e74180 12 API calls 20564->21195 20566 e74af6 free free 20566->20564 20568 e74f1f 20567->20568 20569 e74f7b 20567->20569 20570 e74f57 free 20568->20570 20571 e7f170 2 API calls 20568->20571 20569->20473 20569->20474 20570->20569 20571->20568 21196 ea4e80 20572->21196 20575 e6f000 free 20575->20478 20577 e6e643 20576->20577 20580 e6e679 20576->20580 21202 e6e6f0 20577->21202 20579 e6e65a 20579->20580 20583 e7bd40 8 API calls 20579->20583 20581 e6e6cc 20580->20581 20584 e6e6c1 free 20580->20584 21233 e6dd40 20580->21233 20581->20480 20583->20580 20584->20581 20586 e8020d 20585->20586 20589 e7ffec 20585->20589 20587 e63f2d 5 API calls 20586->20587 20588 e8021c 20587->20588 20588->20482 20589->20586 20590 e80012 20589->20590 20591 e8e700 18 API calls 20590->20591 20592 e80025 20591->20592 20593 e80034 fputs 20592->20593 20594 e801d5 20592->20594 20595 e80198 fclose 20593->20595 20606 e80051 20593->20606 20596 e801d9 free 20594->20596 20595->20596 20598 e801ad 20595->20598 20597 e63f2d 5 API calls 20596->20597 20600 e801f6 20597->20600 20601 e8e620 11 API calls 20598->20601 20600->20482 20602 e801b4 20601->20602 20602->20594 20602->20596 20605 e801cb _unlink 20602->20605 20603 e801fa fclose 20603->20602 20604 e92df0 9 API calls 20604->20606 20605->20594 20606->20595 20606->20603 20606->20604 20607 e81a50 5 API calls 20606->20607 21296 e8df50 _gmtime64 20606->21296 20607->20606 20609 e76711 20608->20609 20610 e7f85d 20608->20610 20614 e80e80 20609->20614 20611 e7f88b free free 20610->20611 20612 e7f866 free free free 20610->20612 20611->20609 20612->20612 20613 e7f88a 20612->20613 20613->20611 20615 e80eaf 20614->20615 20619 e80ec3 20614->20619 20616 e63f2d 5 API calls 20615->20616 20617 e80ebf 20616->20617 20617->20486 20618 e81149 20620 e63f2d 5 API calls 20618->20620 20621 e8e700 18 API calls 20619->20621 20626 e81020 20619->20626 20622 e8115a 20620->20622 20623 e80efd 20621->20623 20622->20486 20624 e80f0a fputs 20623->20624 20625 e8100e 20623->20625 20627 e80fd4 fclose 20624->20627 20631 e80f26 20624->20631 20628 e81012 free 20625->20628 20626->20618 20630 e8df50 _gmtime64 20626->20630 20636 e81a70 5 API calls 20626->20636 20627->20628 20629 e80fe9 20627->20629 20628->20626 20632 e8e620 11 API calls 20629->20632 20630->20626 20631->20627 20633 e8df50 _gmtime64 20631->20633 20635 e81a50 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20631->20635 20637 e810ad fclose 20631->20637 20634 e80ff0 20632->20634 20633->20631 20634->20625 20634->20628 20638 e81004 _unlink 20634->20638 20635->20631 20636->20626 20637->20634 20638->20625 20640 e808ad 20639->20640 20641 e8086d 20639->20641 20640->20487 20642 e80892 free free 20641->20642 20643 e80875 free free 20641->20643 20642->20640 20643->20643 20644 e80891 20643->20644 20644->20642 21298 eb06b0 free 20645->21298 20647 e7f211 20650 e861ce 20648->20650 20654 e86200 20648->20654 20650->20654 20687 e85ea0 20650->20687 20651 e86247 20651->20522 20652 e8623e 20652->20651 20653 e85ea0 5 API calls 20652->20653 20655 e862a3 20653->20655 20654->20522 20655->20522 20657 e7bde8 20656->20657 20660 e7bd64 20656->20660 20658 e63f2d 5 API calls 20657->20658 20659 e7bdfb 20658->20659 20659->20523 20660->20657 20661 e7bd9a 20660->20661 20694 e81a70 20660->20694 20697 e81b50 20661->20697 20665 e7bdd5 20700 e7bbc0 20665->20700 20666 e7be02 20704 e64432 20666->20704 20669 e7bf1a 20670 e63f2d 5 API calls 20669->20670 20671 e7bf2e 20670->20671 20671->20523 20673 e7be8e 20675 e7bebe 20673->20675 20676 e7bea8 20673->20676 20674 e81a70 5 API calls 20674->20673 20678 e81a70 5 API calls 20675->20678 20677 e81a70 5 API calls 20676->20677 20679 e7beb9 20677->20679 20678->20679 20680 e81b50 5 API calls 20679->20680 20681 e7bef4 20680->20681 20682 e7bf07 20681->20682 20683 e7bf35 20681->20683 20685 e7bbc0 2 API calls 20682->20685 20684 e64432 5 API calls 20683->20684 20686 e7bf3a 20684->20686 20685->20669 20686->20523 20688 e85eb6 20687->20688 20692 e85ec5 20687->20692 20689 e63f2d 5 API calls 20688->20689 20690 e85ec1 20689->20690 20690->20652 20691 e63f2d 5 API calls 20693 e85fdd 20691->20693 20692->20691 20693->20652 20707 e81c10 20694->20707 20696 e81aa2 20696->20661 20698 e81c10 5 API calls 20697->20698 20699 e7bdc2 20698->20699 20699->20665 20699->20666 20702 e7bbd2 20700->20702 20703 e7bbdb 20700->20703 20701 e7bc2c fwrite fwrite 20701->20703 20702->20701 20702->20703 20703->20657 20757 e6443f IsProcessorFeaturePresent 20704->20757 20708 e81c1a 20707->20708 20717 e82710 20708->20717 20710 e81c83 20711 e81c8a 20710->20711 20716 e81ca4 __aulldvrm 20710->20716 20712 e63f2d 5 API calls 20711->20712 20713 e81c9d 20712->20713 20713->20696 20714 e63f2d 5 API calls 20715 e826af 20714->20715 20715->20696 20716->20714 20718 e82ce8 20717->20718 20724 e82774 20717->20724 20720 e82d0c 20718->20720 20725 e82de4 20718->20725 20719 e82eac 20721 e63f2d 5 API calls 20719->20721 20722 e63f2d 5 API calls 20720->20722 20723 e82ecd 20721->20723 20726 e82d20 20722->20726 20723->20710 20724->20718 20724->20720 20730 e82d24 20724->20730 20732 e82d6c 20724->20732 20735 e82d84 20724->20735 20737 e828ff 20724->20737 20738 e82d3c 20724->20738 20739 e82d54 20724->20739 20742 e82dcc 20724->20742 20747 e82d9c 20724->20747 20752 e82db4 20724->20752 20725->20719 20727 e82ed1 20725->20727 20726->20710 20728 e63f2d 5 API calls 20727->20728 20729 e82ee5 20728->20729 20729->20710 20731 e63f2d 5 API calls 20730->20731 20733 e82d38 20731->20733 20734 e63f2d 5 API calls 20732->20734 20733->20710 20736 e82d80 20734->20736 20740 e63f2d 5 API calls 20735->20740 20736->20710 20741 e63f2d 5 API calls 20737->20741 20743 e63f2d 5 API calls 20738->20743 20744 e63f2d 5 API calls 20739->20744 20745 e82d98 20740->20745 20748 e82913 20741->20748 20746 e63f2d 5 API calls 20742->20746 20750 e82d50 20743->20750 20751 e82d68 20744->20751 20745->20710 20749 e82de0 20746->20749 20753 e63f2d 5 API calls 20747->20753 20748->20710 20749->20710 20750->20710 20751->20710 20755 e63f2d 5 API calls 20752->20755 20754 e82db0 20753->20754 20754->20710 20756 e82dc8 20755->20756 20756->20710 20758 e64454 20757->20758 20761 e6430f SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20758->20761 20760 e6443c 20760->20669 20760->20673 20760->20674 20761->20760 20763 e6a8af 20762->20763 20780 e6a9e4 20762->20780 20843 e6f570 20763->20843 20765 e6a8b5 free free 20768 e6a8f0 20765->20768 20766 e63f2d 5 API calls 20767 e6aa0c 20766->20767 20767->20529 20769 e6a939 20768->20769 20870 e8bf90 20768->20870 20875 e840d0 20769->20875 20773 e6a972 20775 e6c8a0 10 API calls 20773->20775 20774 e6a95c 20776 e6c8a0 10 API calls 20774->20776 20777 e6a981 20775->20777 20779 e6a970 20776->20779 20777->20779 20878 e6ffe0 20777->20878 20779->20780 20781 e6aa28 20779->20781 20884 e85980 20779->20884 20780->20766 20889 e84df0 20781->20889 20784 e6aa38 20785 e6ab6c 20784->20785 20786 e6aaa8 20784->20786 20789 e76a70 72 API calls 20785->20789 20787 e81a70 5 API calls 20786->20787 20788 e6aaf6 20787->20788 20895 e733e0 20788->20895 20789->20780 20791 e6ab14 20791->20780 20792 e7bd40 8 API calls 20791->20792 20792->20780 20794 e6a551 20793->20794 20795 e8bc9c 20793->20795 20797 e6c950 20794->20797 20796 e8bcc4 free free free 20795->20796 20796->20794 21110 e6abb0 20797->21110 20799 e6cd13 20802 e63f2d 5 API calls 20799->20802 20800 e6ca8d calloc 20801 e6cbd4 20800->20801 20810 e6c97d 20800->20810 20803 e63f2d 5 API calls 20801->20803 20804 e6cd3a 20802->20804 20805 e6cbe8 20803->20805 20804->20540 20805->20540 20806 e845e0 malloc malloc memmove 20806->20810 20807 e6cbc4 20808 e84840 free 20807->20808 20809 e6cbca free 20808->20809 20809->20801 20810->20800 20810->20806 20810->20807 20811 e6cb9d 20810->20811 20813 e6cba3 20810->20813 20814 e6ccf4 20810->20814 20811->20799 20812 e84840 free 20811->20812 20811->20814 20812->20811 20815 e84840 free 20813->20815 20816 e63f2d 5 API calls 20814->20816 20817 e6cba9 20815->20817 20818 e6cd0f 20816->20818 20819 e63f2d 5 API calls 20817->20819 20818->20540 20820 e6cbc0 20819->20820 20820->20540 20822 e76a83 20821->20822 20823 e76a9e 20822->20823 20824 e85980 2 API calls 20822->20824 20834 e76b1b 20822->20834 21144 ea8410 20823->21144 20824->20823 20834->20538 20836 e6c8af 20835->20836 20838 e6a615 20835->20838 21158 e69420 20836->21158 20839 e69bd0 20838->20839 20840 e69be4 20839->20840 20842 e69bfc 20839->20842 20840->20842 21173 e6c060 20840->21173 20842->20464 20844 e6f580 20843->20844 20854 e6f5b4 20843->20854 20845 e6f592 20844->20845 20844->20854 20848 e6f5ab 20845->20848 20849 e6f598 WaitForSingleObject CloseHandle 20845->20849 20846 e6f786 free 20846->20765 20847 e6f6e1 EnterCriticalSection LeaveCriticalSection 20850 e6f70f 20847->20850 20851 e6f729 20847->20851 20906 e8f1b0 WaitForSingleObjectEx CloseHandle 20848->20906 20849->20854 20856 e6f713 CloseHandle 20850->20856 20857 e6f71c 20850->20857 20852 e6f72d GetAddrInfoExCancel WaitForSingleObject CloseHandle 20851->20852 20853 e6f749 20851->20853 20852->20853 20861 e6f752 20853->20861 20862 e6f75b 20853->20862 20854->20846 20854->20847 20859 e6f770 20856->20859 20907 e8f1a0 CloseHandle 20857->20907 20858 e6f5b1 20858->20854 20917 e69730 20859->20917 20908 e8f1b0 WaitForSingleObjectEx CloseHandle 20861->20908 20909 e6f7b0 20862->20909 20863 e6f724 20863->20859 20867 e6f758 20867->20862 20868 e6f764 free 20868->20859 20869 e6f77a closesocket 20869->20846 20929 e8c6e0 20870->20929 20872 e8bfd7 20872->20769 20873 e8bfaf 20873->20872 20943 e81a50 20873->20943 21023 e7d5d0 20875->21023 20877 e6a951 20877->20773 20877->20774 20879 e6ffe7 20878->20879 20880 e6fff0 20878->20880 21058 e70630 20879->21058 21070 e7cb20 20880->21070 20888 e85989 20884->20888 20885 e8ebb0 free 20886 e859b1 free 20885->20886 20887 e859bb 20886->20887 20887->20781 20888->20885 20888->20887 20890 e84e14 20889->20890 20894 e84e40 20889->20894 20891 e84e2a _time64 20890->20891 20891->20894 20892 e63f2d 5 API calls 20893 e84ebf 20892->20893 20893->20784 20894->20892 20896 e733f8 20895->20896 20897 e6ed50 2 API calls 20896->20897 20899 e73408 20897->20899 20898 e735b5 20898->20791 20899->20898 20900 e7bd40 8 API calls 20899->20900 20901 e73467 20900->20901 20902 e6ed50 2 API calls 20901->20902 20905 e7348e 20902->20905 20903 e76a70 72 API calls 20904 e735a3 20903->20904 20904->20791 20905->20898 20905->20903 20906->20858 20907->20863 20908->20867 20910 e6f7cf free 20909->20910 20911 e6f7bc DeleteCriticalSection free 20909->20911 20912 e6f7e2 20910->20912 20913 e6f7e8 20910->20913 20911->20910 20921 e8ebb0 20912->20921 20915 e6f7f3 closesocket 20913->20915 20916 e6f7fa memset 20913->20916 20915->20916 20916->20868 20918 e69740 20917->20918 20920 e697b1 20917->20920 20918->20920 20925 e84840 20918->20925 20920->20869 20922 e8ebb8 20921->20922 20923 e8ebd3 20921->20923 20924 e8ebc0 free 20922->20924 20923->20913 20924->20923 20924->20924 20926 e8487f 20925->20926 20928 e8484a 20925->20928 20926->20920 20927 e8486d free 20927->20926 20928->20927 20946 e6ed50 20929->20946 20931 e8ca45 20931->20873 20932 e8ca38 20932->20931 20962 e8cd90 20932->20962 20934 e8c8fe 20934->20932 20936 e8c95d 20934->20936 20935 e8c6f1 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20935->20931 20935->20934 20938 e8c979 20935->20938 20937 e8c96c 20936->20937 20950 e7bc70 20936->20950 20937->20873 20938->20932 20940 e8ca18 20938->20940 20940->20937 20941 e7bc70 8 API calls 20940->20941 20942 e8ca2b 20941->20942 20942->20873 20944 e81c10 5 API calls 20943->20944 20945 e81a67 20944->20945 20945->20872 20947 e6edc1 GetTickCount 20946->20947 20948 e6ed5d QueryPerformanceCounter 20946->20948 20947->20935 20949 e6ed82 __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20948->20949 20949->20935 20951 e7bc95 20950->20951 20952 e7bd16 20951->20952 20953 e81b50 5 API calls 20951->20953 20954 e63f2d 5 API calls 20952->20954 20958 e7bcbd 20953->20958 20955 e7bd29 20954->20955 20955->20937 20956 e7bd03 20959 e7bbc0 2 API calls 20956->20959 20957 e7bd30 20960 e64432 5 API calls 20957->20960 20958->20956 20958->20957 20958->20958 20959->20952 20961 e7bd35 20960->20961 20963 e8cde8 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20962->20963 20964 e8ce1e 20963->20964 20966 e81a50 5 API calls 20963->20966 20968 e8ce31 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20963->20968 20965 e81a50 5 API calls 20964->20965 20965->20968 20966->20964 20990 e8d240 20968->20990 20969 e8d055 20970 e8d240 5 API calls 20969->20970 20971 e8d061 20970->20971 20972 e8d240 5 API calls 20971->20972 20976 e8d070 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20972->20976 20974 e8d14f 20975 e8cb30 5 API calls 20974->20975 20977 e8d17b 20975->20977 21003 e8cb30 20976->21003 20978 e8cb30 5 API calls 20977->20978 20979 e8d198 20978->20979 20980 e8cb30 5 API calls 20979->20980 20981 e8d1b5 20980->20981 20982 e8cb30 5 API calls 20981->20982 20983 e8d1da 20982->20983 20984 e8cb30 5 API calls 20983->20984 20985 e8d1f5 20984->20985 20986 e81a50 5 API calls 20985->20986 20987 e8d20e fflush 20986->20987 20988 e63f2d 5 API calls 20987->20988 20989 e8d22f 20988->20989 20989->20931 20994 e8d250 20990->20994 20991 e8d256 20991->20969 20992 e8d386 20993 e8d434 20992->20993 20998 e8d3ea __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20992->20998 20995 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20993->20995 20994->20991 20994->20992 20997 e8d306 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 20994->20997 20996 e8d446 20995->20996 20996->20969 20999 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20997->20999 21000 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20998->21000 21001 e8d37b 20999->21001 21002 e8d429 21000->21002 21001->20969 21002->20969 21004 e8cb99 21003->21004 21005 e8cb40 21003->21005 21006 e8cc54 21004->21006 21008 e8cbb2 21004->21008 21007 e8cb4a 21005->21007 21015 e8cb67 21005->21015 21012 e8cc63 21006->21012 21014 e8cc89 21006->21014 21009 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21007->21009 21010 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21008->21010 21011 e8cb5d 21009->21011 21013 e8cc47 21010->21013 21011->20974 21017 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21012->21017 21013->20974 21018 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21014->21018 21015->21004 21016 e8cb75 21015->21016 21019 e81a70 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21016->21019 21020 e8cd75 21017->21020 21021 e8cd1a 21018->21021 21022 e8cb8f 21019->21022 21020->20974 21021->20974 21022->20974 21024 e7d5de 21023->21024 21025 e7d5fb 21024->21025 21028 e7d760 21024->21028 21025->20877 21029 e7d5f7 21028->21029 21030 e7d773 21028->21030 21029->20877 21030->21029 21031 e7d760 10 API calls 21030->21031 21032 e7d7c9 21030->21032 21031->21030 21033 e7d829 21032->21033 21042 e7d880 21032->21042 21033->21029 21057 e6f000 free 21033->21057 21036 e7d864 free 21036->21029 21037 e7d805 21037->21029 21037->21033 21038 e7d824 21037->21038 21039 e7d82e 21037->21039 21051 e6f000 free 21038->21051 21052 e6f0b0 21039->21052 21043 e7d892 21042->21043 21044 e7d9a7 21043->21044 21045 e7d98a 21043->21045 21046 e7d8ee 21043->21046 21044->21046 21049 e7bc70 8 API calls 21044->21049 21047 e7bc70 8 API calls 21045->21047 21046->21037 21048 e7d997 21047->21048 21048->21037 21050 e7d9c5 21049->21050 21050->21037 21051->21033 21053 e6f0c1 21052->21053 21054 e6f0c9 21052->21054 21053->21033 21055 e6f0e4 memmove 21054->21055 21056 e6f0cf 21054->21056 21055->21056 21056->21033 21057->21036 21059 e7074c 21058->21059 21060 e70640 21058->21060 21059->20880 21060->21059 21062 e706ea 21060->21062 21076 e8f3f0 21060->21076 21065 e706ee 21062->21065 21090 e70760 21062->21090 21065->20880 21066 e70737 21066->20880 21068 e70674 21068->21062 21068->21065 21069 e8f3f0 free 21068->21069 21080 e70820 21068->21080 21086 e8f5b0 21068->21086 21069->21068 21071 e7cb2e 21070->21071 21074 e7cb34 21070->21074 21072 e7d210 free 21071->21072 21072->21074 21073 e7d250 free 21075 e6fffc 21073->21075 21074->21073 21075->20779 21077 e8f3fb 21076->21077 21078 e8f409 21076->21078 21077->21078 21106 e8f850 21077->21106 21078->21068 21083 e7084d 21080->21083 21081 e708b6 21081->21068 21082 e7089a 21082->21081 21085 e7bbc0 2 API calls 21082->21085 21083->21081 21083->21082 21084 e7bbc0 2 API calls 21083->21084 21084->21082 21085->21081 21087 e8f602 21086->21087 21088 e8f5b9 21086->21088 21087->21068 21088->21087 21089 e8f850 free 21088->21089 21089->21088 21091 e70781 21090->21091 21092 e707d3 21091->21092 21093 e7079b 21091->21093 21096 e707d7 21092->21096 21103 e707f2 21092->21103 21094 e7079f 21093->21094 21095 e707ba 21093->21095 21098 e7bd40 8 API calls 21094->21098 21099 e7bd40 8 API calls 21095->21099 21097 e7bd40 8 API calls 21096->21097 21100 e707e4 21097->21100 21101 e707ac 21098->21101 21102 e707c5 21099->21102 21100->21066 21101->21066 21102->21066 21104 e7bd40 8 API calls 21103->21104 21105 e70810 21104->21105 21105->21066 21107 e8f8cd 21106->21107 21108 e8f85b 21106->21108 21107->21078 21108->21107 21109 e8f8ba free 21108->21109 21109->21108 21111 e6abc1 21110->21111 21112 e6ac83 21111->21112 21113 e6ac77 21111->21113 21114 e6abda 21111->21114 21112->20810 21121 e7bc70 8 API calls 21113->21121 21114->21112 21115 e6ac45 21114->21115 21116 e6ac13 21114->21116 21117 e6ac5e 21114->21117 21118 e6ac2c 21114->21118 21119 e6abfa 21114->21119 21120 e6abe8 21114->21120 21123 e7b970 7 API calls 21115->21123 21126 e7b970 7 API calls 21116->21126 21125 e7b970 7 API calls 21117->21125 21127 e7b970 7 API calls 21118->21127 21124 e7b970 7 API calls 21119->21124 21134 e7b970 21120->21134 21121->21112 21130 e6ac51 21123->21130 21131 e6ac06 21124->21131 21132 e6ac6a 21125->21132 21133 e6ac1f 21126->21133 21128 e6ac38 21127->21128 21128->20810 21130->20810 21131->20810 21132->20810 21133->20810 21135 e7b99b 21134->21135 21136 e7b9fd 21135->21136 21140 e7ba10 21135->21140 21137 e63f2d 5 API calls 21136->21137 21138 e6abf4 21137->21138 21138->20810 21141 e7ba1d 21140->21141 21142 e7ba3c 21140->21142 21141->21142 21143 e7ba79 memmove memmove 21141->21143 21142->21135 21143->21142 21147 eb1e50 21144->21147 21146 ea8421 21148 eb1e7a 21147->21148 21149 eb1e5c free 21147->21149 21150 eb1e9f 21148->21150 21153 eb1e8c free 21148->21153 21149->21148 21155 eb0af0 21150->21155 21153->21150 21156 eb0b2a free free free 21155->21156 21157 eb0af9 free free free 21155->21157 21156->21146 21157->21156 21159 e6961d 21158->21159 21160 e6943a 21158->21160 21159->20838 21161 e6ed50 2 API calls 21160->21161 21163 e69444 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21161->21163 21162 e695e4 21168 e860a0 21162->21168 21163->21159 21163->21162 21165 e861c0 5 API calls 21163->21165 21166 e695d1 21165->21166 21166->21162 21167 e7bd40 8 API calls 21166->21167 21167->21162 21169 e86198 21168->21169 21170 e860b4 21168->21170 21169->21159 21170->21169 21171 e85ea0 5 API calls 21170->21171 21172 e860cf 21171->21172 21172->21159 21174 e6c076 21173->21174 21175 e6c084 21173->21175 21174->20842 21176 e6c136 21175->21176 21177 e6c08e 21175->21177 21176->20842 21178 e6ed50 2 API calls 21177->21178 21179 e6c098 21178->21179 21180 e85ea0 5 API calls 21179->21180 21181 e6c0bf 21180->21181 21181->20842 21183 e6a1c4 21182->21183 21187 e72dc5 21182->21187 21188 e6cd40 21183->21188 21184 e72eef 21185 e765e0 246 API calls 21184->21185 21185->21183 21186 e76a70 72 API calls 21186->21187 21187->21184 21187->21186 21192 e6cd50 21188->21192 21189 e6cd7a 21191 e84840 free 21189->21191 21190 e84840 free 21190->21192 21193 e6cd83 21191->21193 21192->21189 21192->21190 21193->20554 21194->20559 21195->20566 21197 e766e3 21196->21197 21198 ea4e89 21196->21198 21197->20575 21201 ea6140 10 API calls 21198->21201 21200 ea4e8f free 21200->21197 21201->21200 21203 e6e711 21202->21203 21204 e6e718 21202->21204 21203->20579 21237 e6eb90 _time64 21204->21237 21207 e6e777 21241 e8e700 fopen 21207->21241 21208 e6e761 __acrt_iob_func 21209 e6e79c fputs 21208->21209 21212 e6e853 21209->21212 21213 e6e7b9 calloc 21209->21213 21215 e6e8d6 21212->21215 21216 e6e85a fclose 21212->21216 21214 e6e89f 21213->21214 21221 e6e7d4 qsort 21213->21221 21217 e6e8bf free 21214->21217 21220 e6e8b9 fclose 21214->21220 21218 e6e8da free 21215->21218 21216->21218 21219 e6e873 21216->21219 21217->20579 21218->20579 21263 e8e620 21219->21263 21220->21217 21226 e6e843 free 21221->21226 21228 e6e80e 21221->21228 21223 e6e87a 21223->21215 21225 e6e881 _unlink 21223->21225 21225->21214 21226->21212 21229 e6e895 free 21228->21229 21230 e81a50 5 API calls 21228->21230 21259 e6eaf0 21228->21259 21229->21214 21231 e6e830 free 21230->21231 21231->21228 21232 e6e83f 21231->21232 21232->21226 21234 e6dd49 21233->21234 21236 e6dd8f 21233->21236 21235 e6dd50 6 API calls 21234->21235 21235->21235 21235->21236 21236->20580 21239 e6ebbc 21237->21239 21238 e6e71f 21238->21207 21238->21208 21239->21238 21240 e6ec3b 6 API calls 21239->21240 21240->21239 21242 e8e8dd free 21241->21242 21243 e8e75e _fileno _fstat64 21241->21243 21244 e8e8ce 21242->21244 21243->21244 21245 e8e780 21243->21245 21246 e63f2d 5 API calls 21244->21246 21245->21244 21247 e8e794 fclose 21245->21247 21248 e6e78b 21246->21248 21279 e8f990 21247->21279 21248->21209 21248->21214 21250 e8e8d8 21250->21242 21251 e8e7af 21251->21242 21251->21250 21284 e819d0 21251->21284 21253 e8e86c free 21253->21250 21254 e8e87c 21253->21254 21294 e8dc70 _open 21254->21294 21256 e8e898 21256->21242 21257 e8e8a2 _fdopen 21256->21257 21257->21244 21258 e8e8bb _close _unlink 21257->21258 21258->21242 21260 e6eb2d 21259->21260 21261 e819d0 7 API calls 21260->21261 21262 e6eb86 21261->21262 21262->21228 21264 e6ed50 2 API calls 21263->21264 21265 e8e631 _strdup _strdup MoveFileExA 21264->21265 21266 e8e6b5 21265->21266 21273 e8e662 21265->21273 21267 e8e6bf free 21266->21267 21268 e8e6c5 21266->21268 21267->21268 21269 e8e6c9 free 21268->21269 21270 e8e6cf 21268->21270 21269->21270 21270->21223 21271 e6ed50 2 API calls 21271->21273 21272 e8e6d9 21274 e8e6e9 21272->21274 21275 e8e6e3 free 21272->21275 21273->21271 21273->21272 21276 e8e6a7 Sleep MoveFileExA 21273->21276 21277 e8e6ed free 21274->21277 21278 e8e6f3 21274->21278 21275->21274 21276->21266 21276->21273 21277->21278 21278->21223 21280 e8fa08 21279->21280 21281 e8f9a1 21279->21281 21280->21251 21281->21280 21282 e8f9ce BCryptGenRandom 21281->21282 21282->21281 21283 e8fa2f 21282->21283 21283->21251 21285 e819e6 21284->21285 21286 e81c10 5 API calls 21285->21286 21287 e81a03 21286->21287 21288 e81a1e 21287->21288 21289 e81a10 21287->21289 21292 e81a39 _strdup 21288->21292 21293 e81a2a 21288->21293 21295 e6f000 free 21289->21295 21291 e81a15 21291->21253 21292->21253 21293->21253 21294->21256 21295->21291 21297 e8df62 21296->21297 21297->20606 21299 eb06f2 free free 21298->21299 21300 eb06d4 free 21298->21300 21299->20647 21300->21299 21303 e75cb0 21302->21303 21304 e75cb8 21302->21304 21303->21304 21310 e929c0 realloc 21303->21310 21304->20441 21306 e75d12 free 21306->20441 21307 e75cd5 21307->21306 21308 e75d27 free 21307->21308 21309 e75d0c 21307->21309 21308->20441 21309->21306 21311 e92a17 free 21310->21311 21314 e929da 21310->21314 21311->21307 21312 e929e0 GetEnvironmentVariableA 21313 e92a2f free 21312->21313 21312->21314 21313->21307 21314->21312 21314->21313 21315 e92a28 21314->21315 21316 e92a06 realloc 21314->21316 21315->21307 21316->21311 21316->21312 21321 e34b7e 21318->21321 21319 e41a30 11 API calls 21320 e34ad1 21319->21320 21320->19965 21321->21319 21324 e64ef0 21323->21324 21325 e64eea 21323->21325 21326 e64f03 21324->21326 21327 e64f19 21324->21327 21325->20021 21558 e7a080 21350->21558 21352 e64e71 21352->20021 21559 e7a08e 21558->21559 21564 e7a093 21558->21564 21559->21352 21560 e7a62b 21561 e7a608 21564->21560 21564->21561 21580 e639fc AreFileApisANSI 21579->21580 21581 e639f9 21579->21581 21580->20044 21581->20044 21583 e41c07 21582->21583 21584 e63a29 GetLastError 21582->21584 21583->20051 21583->20052 21584->21583 21586 e3f688 21585->21586 21587 e3f671 21585->21587 21588 e3f695 21586->21588 21599 e426a0 21586->21599 21587->20057 21588->20057 21590 e3f6cf 21590->20057 21592 e2f47e 21591->21592 21619 e2f3b0 21592->21619 21596 e2f710 21595->21596 21597 e2f3b0 7 API calls 21596->21597 21598 e2f71d _CxxThrowException 21597->21598 21598->20055 21600 e4281a 21599->21600 21604 e426c8 21599->21604 21618 e21690 ?_Xlength_error@std@@YAXPBD 21600->21618 21603 e42815 21606 e215f0 Concurrency::cancel_current_task 2 API calls 21603->21606 21604->21603 21605 e426fe 21604->21605 21607 e42742 21604->21607 21608 e426ed 21604->21608 21611 e42769 memmove 21605->21611 21612 e427db memmove 21605->21612 21616 e427d5 _invalid_parameter_noinfo_noreturn 21605->21616 21606->21600 21609 e63f3b std::_Facet_Register 5 API calls 21607->21609 21608->21603 21610 e426f8 21608->21610 21609->21605 21613 e63f3b std::_Facet_Register 5 API calls 21610->21613 21615 e4277c 21611->21615 21614 e427ec 21612->21614 21613->21605 21614->21590 21615->21616 21617 e427bc 21615->21617 21616->21612 21617->21590 21620 e2f3dd __std_exception_copy 21619->21620 21621 e2f41b 21620->21621 21625 e2f43f 21620->21625 21624 e2f439 _invalid_parameter_noinfo_noreturn 21621->21624 21621->21625 21622 e63f2d 5 API calls 21623 e2f464 _CxxThrowException __std_exception_copy 21622->21623 21623->20051 21624->21625 21625->21622 21628 e63c22 21626->21628 21627 e63f2d 5 API calls 21629 e63e53 21627->21629 21631 e63c7c GetFileAttributesExW 21628->21631 21632 e63cf3 21628->21632 21644 e63c2b 21628->21644 21629->20063 21631->21632 21633 e63c8d GetLastError 21631->21633 21632->21644 21647 e63e57 CreateFileW 21632->21647 21635 e63c9c FindFirstFileW 21633->21635 21633->21644 21637 e63caf GetLastError 21635->21637 21638 e63cba FindClose 21635->21638 21636 e63d89 21650 e639ca 21636->21650 21637->21644 21638->21632 21639 e63d95 GetFileInformationByHandleEx 21640 e63da8 GetLastError 21639->21640 21643 e63db5 21639->21643 21640->21636 21641 e63e07 GetFileInformationByHandleEx 21641->21636 21641->21640 21645 e63dda GetFileInformationByHandleEx 21643->21645 21646 e63df0 21643->21646 21644->21627 21645->21640 21645->21646 21646->21636 21646->21641 21648 e63d79 21647->21648 21649 e63e7c GetLastError 21647->21649 21648->21636 21648->21639 21648->21646 21649->21648 21651 e639e6 21650->21651 21652 e639d3 CloseHandle 21650->21652 21651->21644 21652->21651 21653 e639e0 abort 21652->21653 21653->21651 22535 e21855 22534->22535 22536 e21881 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE 22535->22536 22537 e22640 9 API calls 22535->22537 22536->20271 22537->22536 22544 e3da65 22538->22544 22539 e3da70 GetModuleHandleW 22546 e32070 22539->22546 22542 e32070 17 API calls 22542->22544 22543 e41a30 11 API calls 22543->22544 22544->22539 22544->22543 22545 e3ac20 20 API calls 22544->22545 22545->22544 22547 e321c6 22546->22547 22551 e320d2 22546->22551 22548 e63f2d 5 API calls 22547->22548 22549 e321d5 GetModuleHandleW 22548->22549 22549->22542 22550 e2e120 11 API calls 22550->22551 22551->22547 22551->22550 22552 e321db _invalid_parameter_noinfo_noreturn 22551->22552 19585 e21390 19586 e21456 19585->19586 19586->19586 19602 e41260 19586->19602 19588 e2146e 19620 e63f3b 19588->19620 19590 e21475 _beginthreadex 19591 e214f4 ?_Throw_Cpp_error@std@@YAXH 19590->19591 19592 e214a9 19590->19592 19595 e642b8 2 API calls 19591->19595 19593 e214b4 _Thrd_detach 19592->19593 19594 e214ec ?_Throw_Cpp_error@std@@YAXH 19592->19594 19593->19594 19596 e214c3 19593->19596 19594->19591 19597 e2150e 19595->19597 19629 e642b8 19596->19629 19601 e214e5 19603 e4127e memmove 19602->19603 19608 e412a4 19602->19608 19603->19588 19605 e41385 19639 e21690 ?_Xlength_error@std@@YAXPBD 19605->19639 19606 e412e7 19609 e4138a 19606->19609 19611 e63f3b std::_Facet_Register 5 API calls 19606->19611 19608->19605 19608->19606 19614 e4131b 19608->19614 19618 e412db 19608->19618 19640 e215f0 19609->19640 19611->19618 19612 e4138f 19613 e41324 memmove 19617 e41349 19613->19617 19619 e41366 19613->19619 19616 e63f3b std::_Facet_Register 5 API calls 19614->19616 19615 e4137f _invalid_parameter_noinfo_noreturn 19615->19605 19616->19618 19617->19615 19617->19619 19618->19613 19618->19615 19619->19588 19621 e63f4d malloc 19620->19621 19622 e63f40 _callnewh 19621->19622 19623 e63f5a 19621->19623 19622->19621 19624 e63f5c 19622->19624 19623->19590 19625 e63f66 std::_Facet_Register 19624->19625 19626 e215f0 Concurrency::cancel_current_task 19624->19626 19628 e64ab6 _CxxThrowException 19625->19628 19627 e215fe _CxxThrowException __std_exception_copy 19626->19627 19627->19590 19628->19590 19644 e6428b 19629->19644 19632 e63f2d 19633 e63f36 IsProcessorFeaturePresent 19632->19633 19634 e63f35 19632->19634 19636 e6434c 19633->19636 19634->19601 19648 e6430f SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19636->19648 19638 e6442f 19638->19601 19643 e215d0 19640->19643 19642 e215fe _CxxThrowException __std_exception_copy 19642->19612 19643->19642 19645 e642a1 _register_onexit_function 19644->19645 19646 e6429a _crt_atexit 19644->19646 19647 e214cd 19645->19647 19646->19647 19647->19632 19648->19638 23467 e50f9a VirtualFree 23468 e50fdb 23467->23468 23469 e63f2d 5 API calls 23468->23469 23470 e50ff2 23469->23470 22624 e52720 22625 e2d420 10 API calls 22624->22625 22633 e52769 22625->22633 22627 e2e120 11 API calls 22627->22633 22628 e528d3 22629 e52919 22628->22629 22631 e52913 _invalid_parameter_noinfo_noreturn 22628->22631 22630 e63f2d 5 API calls 22629->22630 22632 e5293a 22630->22632 22631->22629 22633->22627 22633->22628 22633->22631 22645 e2dec0 22633->22645 22651 e22a50 22633->22651 22636 e22a50 9 API calls 22637 e52850 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H 22636->22637 22638 e22a50 9 API calls 22637->22638 22639 e52866 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H 22638->22639 22640 e22a50 9 API calls 22639->22640 22641 e5287f 22640->22641 22642 e22a50 9 API calls 22641->22642 22643 e22a50 9 API calls 22641->22643 22642->22641 22644 e5289f memmove 22643->22644 22644->22633 22646 e2ded7 22645->22646 22647 e2df9c 22645->22647 22646->22647 22648 e2deee memchr 22646->22648 22647->22633 22648->22647 22650 e2df1a 22648->22650 22649 e2df80 memchr 22649->22647 22649->22650 22650->22647 22650->22649 22652 e22a90 22651->22652 22663 e22ca0 22652->22663 22654 e22b43 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J 22657 e22ae7 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N ?uncaught_exception@std@ 22654->22657 22662 e22b5f 22654->22662 22655 e22ada 22655->22654 22655->22657 22660 e22b1a ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 22655->22660 22658 e22bf6 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 22657->22658 22659 e22bff ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H 22657->22659 22658->22659 22659->22636 22660->22655 22660->22657 22661 e22b6d ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD 22661->22657 22661->22662 22662->22657 22662->22661 22664 e22ce1 ?good@ios_base@std@ 22663->22664 22665 e22cdc 22663->22665 22666 e22d1f 22664->22666 22667 e22cf9 22664->22667 22665->22664 22666->22655 22667->22666 22668 e22d0a ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12 ?good@ios_base@std@ 22667->22668 22668->22666
                                              APIs
                                              • CreateThread.KERNELBASE(00000000,00000000,00E3DA40,00000000,00000000,00000000), ref: 00E3225B
                                              • UuidCreate.RPCRT4(?), ref: 00E322AF
                                              • UuidToStringA.RPCRT4(?,?), ref: 00E322CD
                                              • RpcStringFreeA.RPCRT4(00000000), ref: 00E322FF
                                                • Part of subcall function 00E3F790: memmove.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,00E324D2,?,?,00000000,00000000,?,?,0000000F,00000000), ref: 00E3F7CF
                                                • Part of subcall function 00E34960: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,8E857614,?,?,?,?,?,?,?,?,DDCCC48D), ref: 00E34A4C
                                              • memmove.VCRUNTIME140(00000000,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3295D
                                              • memmove.VCRUNTIME140(00000000,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E32A61
                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000010), ref: 00E33003
                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3300B
                                              • memset.VCRUNTIME140(?,00000000,000000B8,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3301F
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3303F
                                              • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140(?,00000000,00000000,?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E33064
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3309E
                                              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ.MSVCP140(?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E330C2
                                                • Part of subcall function 00E410E0: ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z.MSVCP140(00000001,?,00000040,8E857614,?,?,?,00E33106,?,00000001,00000000,?,?,?,?,?), ref: 00E41120
                                                • Part of subcall function 00E410E0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ.MSVCP140(?,?,?,?,00E33106,?,00000001,00000000,?,?,?,?,?,?,00000000,?), ref: 00E4113D
                                                • Part of subcall function 00E410E0: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,?,?), ref: 00E41165
                                                • Part of subcall function 00E410E0: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,00E33106,?,00000001,00000000,?,?), ref: 00E411AA
                                                • Part of subcall function 00E410E0: ?always_noconv@codecvt_base@std@@QBE_NXZ.MSVCP140(?,?,?,?,?,?,?,?,00E33106,?,00000001), ref: 00E411C2
                                              • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000080,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E3331B
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F), ref: 00E4382F
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,DCC8DA8D,?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D), ref: 00E43840
                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000010), ref: 00E338F3
                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 00E338FB
                                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000002,00000000,?,00000001,00000000,?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000), ref: 00E3311D
                                                • Part of subcall function 00E41260: memmove.VCRUNTIME140(?,?,00E3AFF8,00000000,?,?,00E3AFF8,?,?), ref: 00E4128D
                                              • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z.MSVCP140(0000000A,?,00000001,00000000,?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E331A6
                                              • _popen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00ECFB2C,?,?,?,?,?,?,?,?,00000000,?,00000001,0000000F,00000000,00000000), ref: 00E3329C
                                              • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000080,00000000,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001), ref: 00E332D0
                                              • memset.VCRUNTIME140(?,00000000,000000B0,00000000,?,?,DDDEC9C6,?,00000001), ref: 00E33A56
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(DDDEC9C6,?,00000001), ref: 00E33A78
                                              • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140(?,00000000), ref: 00E33A9A
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,00000001), ref: 00E33AD4
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z.MSVCP140(00E2F740), ref: 00E33B93
                                              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(00000001,00000002,00000000), ref: 00E33BB0
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(00000000), ref: 00E33BD8
                                              • Sleep.KERNEL32(00000064,?,FDDAC9C5,?,00000001,?,CDCED9D8,?,00000001,00000000,?,message,success,?), ref: 00E33F34
                                              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(?,DDDEC9C6,?,00000001,CFDBC2C2,?,?,?), ref: 00E34182
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(?,?), ref: 00E3418E
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E3434F
                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000010), ref: 00E3468C
                                              • ShellExecuteA.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 00E346C9
                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,00000000,00000000,00000001,?,?,?,?,00000001,?,?), ref: 00E346D1
                                              • MessageBoxA.USER32(00000000,00000000,00000000,00000010), ref: 00E3475D
                                              • exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 00E34765
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5DA0,?,?), ref: 00E347B4
                                              Strings
                                              • Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: , xrefs: 00E33CD9
                                              • message, xrefs: 00E33D20
                                              • certutil -hashfile ", xrefs: 00E33219
                                              • success, xrefs: 00E33D04
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: U?$char_traits@$D@std@@@std@@$memmove$Messageexit$??0?$basic_ios@??0?$basic_streambuf@??6?$basic_ostream@CreateInit@?$basic_streambuf@StringUuidV01@V?$basic_streambuf@_invalid_parameter_noinfo_noreturnfgetsmemset$??0?$basic_iostream@??0?$basic_istream@??1?$basic_ios@??1?$basic_iostream@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@?setw@std@@?widen@?$basic_ios@D@std@@@1@@D@std@@@1@_ExceptionExecuteFiopen@std@@FreeJ@1@_ShellSleepSmanip@_ThreadThrowU?$_U_iobuf@@V21@@Vios_base@1@Vlocale@2@_get_stream_buffer_pointers_popen
                                              • String ID: Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $certutil -hashfile "$message$success
                                              • API String ID: 1436105476-171691153
                                              • Opcode ID: dd6a619e288d55e4b19e7c8517cd37319a4631d4d8f7bb8bd3e04bfc60830ec8
                                              • Instruction ID: 7cc53e61041e34106e4179a93caca00fdbe3acdd24f97dce85c5a9496fe266b7
                                              • Opcode Fuzzy Hash: dd6a619e288d55e4b19e7c8517cd37319a4631d4d8f7bb8bd3e04bfc60830ec8
                                              • Instruction Fuzzy Hash: A633ABB0D002588BDB29CB24DC88BEDBBB5AF55304F1492D9E449B7292DB756BC8CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 552 e4edb0-e4edeb GetModuleHandleW GetProcAddress 553 e4edf7-e4edfb 552->553 554 e4eded-e4edf5 NtSetInformationThread 552->554 555 e4f365-e4f378 call e63f2d 553->555 556 e4ee01-e4ee04 553->556 554->553 558 e4ee08-e4ee11 call e51a10 556->558 562 e4ee17-e4eec9 558->562 563 e4ef30 558->563 564 e4eed1-e4eed6 562->564 565 e4ef34-e4ef56 call e28060 GetModuleFileNameW 563->565 564->564 566 e4eed8-e4ef03 call e41260 VirtualAlloc 564->566 571 e4f2f7-e4f308 GetCurrentProcess NtTerminateProcess 565->571 572 e4ef5c-e4ef72 GetShortPathNameW 565->572 566->563 573 e4ef05-e4ef1d VirtualAlloc 566->573 574 e4f30c-e4f313 call e4eda0 571->574 572->571 575 e4ef78-e4f05a 572->575 576 e4ef23-e4ef2a VirtualFree 573->576 577 e4f379-e4f3ab GetWriteWatch 573->577 585 e4f315-e4f31a 574->585 586 e4f339-e4f356 call e63180 574->586 579 e4f060-e4f076 575->579 576->563 577->563 580 e4f3b1-e4f3d2 VirtualFree * 2 577->580 579->579 582 e4f078-e4f07f 579->582 580->563 584 e4f3d8-e4f48a 580->584 583 e4f081-e4f08a 582->583 583->583 587 e4f08c-e4f098 583->587 589 e4f492-e4f497 584->589 585->586 590 e4f31c-e4f321 585->590 592 e4f35b-e4f35f 586->592 591 e4f0a0-e4f0aa 587->591 589->589 593 e4f499-e4f4d1 call e41260 GetModuleHandleW call e32070 589->593 590->586 594 e4f323-e4f328 590->594 591->591 596 e4f0ac-e4f19b 591->596 592->555 592->558 593->565 605 e4f4d7-e4f4e4 call e51670 593->605 594->586 595 e4f32a-e4f32f 594->595 595->586 598 e4f331-e4f337 595->598 599 e4f1a3-e4f1ac 596->599 598->586 599->599 601 e4f1ae-e4f1ba 599->601 604 e4f1c0-e4f1ca 601->604 604->604 606 e4f1cc-e4f2d7 GetEnvironmentVariableW 604->606 605->565 610 e4f4ea-e4f4f3 call e514a0 605->610 606->571 608 e4f2d9-e4f2f1 ShellExecuteW 606->608 608->571 610->565 613 e4f4f9-e4f502 call e51000 610->613 613->565 616 e4f508-e4f511 call e50e60 613->616 616->565 619 e4f517-e4f5e9 616->619 620 e4f5f0-e4f5f5 619->620 620->620 621 e4f5f7-e4f6f9 call e41260 LoadLibraryA 620->621 624 e4f72b-e4f734 call e50d10 621->624 625 e4f6fb-e4f709 GetProcAddress 621->625 624->565 630 e4f73a-e4f80f 624->630 625->624 626 e4f70b-e4f71d OpenProcess 625->626 626->624 631 e4f71f-e4f726 CloseHandle 626->631 632 e4f810-e4f815 630->632 631->565 632->632 633 e4f817-e4fa06 call e41260 CreateFileA 632->633 633->565 636 e4fa0c-e4fa1c CloseHandle call e50910 633->636 636->565 639 e4fa22-e4fa2b call e505b0 636->639 639->565 642 e4fa31-e4fa3a call e501f0 639->642 642->565 645 e4fa40-e4fb10 642->645 646 e4fb15-e4fb1a 645->646 646->646 647 e4fb1c-e4fb4a call e41260 646->647 650 e4fb50-e4fb67 GetProcessHeap HeapWalk 647->650 651 e4fb8f-e4fd59 650->651 652 e4fb69-e4fb72 650->652 653 e4fd60-e4fd65 651->653 652->650 654 e4fb74-e4fb89 652->654 653->653 655 e4fd67-e4fd83 call e41260 GetPEB 653->655 654->565 654->651 655->565 658 e4fd89-e4ff4b 655->658 659 e4ff53-e4ff58 658->659 659->659 660 e4ff5a-e4ff76 call e41260 GetPEB 659->660 660->565 663 e4ff7c-e4ff7e call e51e40 660->663 665 e4ff83-e4ff85 663->665 665->565 666 e4ff8b-e5014d 665->666 667 e50155-e5015a 666->667 667->667 668 e5015c-e501a7 call e41260 memset GetCurrentThread GetThreadContext 667->668 668->574 671 e501ad-e501b5 668->671 671->565 672 e501bb-e501c3 671->672 672->565 673 e501c9-e501d1 672->673 673->565 674 e501d7-e501df 673->674 674->574 675 e501e5 674->675 675->565
                                              APIs
                                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtSetInformationThread), ref: 00E4EDDC
                                              • GetProcAddress.KERNEL32(00000000), ref: 00E4EDE3
                                              • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000), ref: 00E4EDF5
                                              • VirtualAlloc.KERNELBASE(00000000,00004000,00003000,00000004,?,?), ref: 00E4EEF9
                                              • VirtualAlloc.KERNELBASE(00000000,01000000,00203000,00000004), ref: 00E4EF13
                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00E4EF2A
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?), ref: 00E4EF4E
                                              • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 00E4EF6A
                                              • GetEnvironmentVariableW.KERNEL32(?,?,00000104), ref: 00E4F2CF
                                              • ShellExecuteW.SHELL32(00000000,00000000,?,?,00000000,00000000), ref: 00E4F2F1
                                              • GetCurrentProcess.KERNEL32(00000001), ref: 00E4F2FF
                                              • NtTerminateProcess.NTDLL(00000000), ref: 00E4F306
                                              • GetWriteWatch.KERNELBASE(00000000,00000000,00001000,00000000,?), ref: 00E4F3A3
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00E4F3BE
                                              • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00E4F3C8
                                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 00E4F4B1
                                              • LoadLibraryA.KERNEL32(?,?,?,?,00000000), ref: 00E4F6F1
                                              • GetProcAddress.KERNEL32(00000000,CsrGetProcessId), ref: 00E4F701
                                              • OpenProcess.KERNEL32(00000400,00000000,00000000), ref: 00E4F715
                                              • CloseHandle.KERNEL32(00000000), ref: 00E4F720
                                              • CreateFileA.KERNELBASE(?,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 00E4F9FD
                                              • CloseHandle.KERNELBASE(00000000), ref: 00E4FA0D
                                              • GetProcessHeap.KERNEL32(?,?,?), ref: 00E4FB58
                                              • HeapWalk.KERNEL32(00000000), ref: 00E4FB5F
                                              • memset.VCRUNTIME140(?,00000000,000002C8,?,?,?,?,?,?), ref: 00E5017D
                                              • GetCurrentThread.KERNEL32 ref: 00E50190
                                              • GetThreadContext.KERNEL32(00000000,00010010), ref: 00E5019F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Virtual$HandleProcess$FreeModuleThread$AddressAllocCloseCurrentFileHeapNameProc$ContextCreateEnvironmentExecuteInformationLibraryLoadOpenPathShellShortTerminateVariableWalkWatchWritememset
                                              • String ID: >jL"$CsrGetProcessId$NtSetInformationThread$P-8w$RPsu$Rj@"$d$ntdll.dll
                                              • API String ID: 2524847058-2986773690
                                              • Opcode ID: 5809e3ab5b0877bab92faded9cc705db7bf5c332436655a326d6ccc17d9e1199
                                              • Instruction ID: ecef63290d61dc0cab95b283ba5aa9645289fafe8d66ede656a6a54fcc02457d
                                              • Opcode Fuzzy Hash: 5809e3ab5b0877bab92faded9cc705db7bf5c332436655a326d6ccc17d9e1199
                                              • Instruction Fuzzy Hash: 78B2EDB46093808BD739CF28D484BEABBE5BF89304F005A1DE9DDA7351EB705A45CB46

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 871 e51670-e517fc 872 e51800-e51805 871->872 872->872 873 e51807-e5184c call e41260 GetCurrentProcessId OpenProcess 872->873 876 e5184e-e51850 873->876 877 e5187a-e51888 LoadLibraryW 873->877 878 e51853-e51878 876->878 879 e51890-e518a9 GetProcAddress 877->879 878->877 878->878 879->879 880 e518ab-e518d7 GetModuleHandleA 879->880 881 e51902-e51912 wcsstr 880->881 882 e518d9-e518db 880->882 884 e51914-e51931 881->884 885 e51968-e5196f 881->885 883 e518e0-e518fd 882->883 883->883 889 e518ff 883->889 886 e51954-e51966 wcsstr 884->886 887 e51933 884->887 888 e51970-e519bf VirtualProtectEx WriteProcessMemory VirtualProtectEx 885->888 886->885 891 e519d1-e519e1 CloseHandle call e63f2d 886->891 890 e51935-e51952 887->890 892 e519c1-e519cf 888->892 893 e519ed-e51a01 call e63f2d 888->893 889->881 890->886 890->890 896 e519e6-e519ec 891->896 892->888 892->891
                                              APIs
                                              • GetCurrentProcessId.KERNEL32(?,?,?,?), ref: 00E51816
                                              • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00E51824
                                              • LoadLibraryW.KERNELBASE(?), ref: 00E5187E
                                              • GetProcAddress.KERNEL32(00000000,00ED16A4), ref: 00E51897
                                              • GetModuleHandleA.KERNEL32(00000000), ref: 00E518AD
                                              • wcsstr.VCRUNTIME140(00000000,?), ref: 00E51907
                                              • wcsstr.VCRUNTIME140(3545065E,?), ref: 00E5195B
                                              • VirtualProtectEx.KERNEL32(?,00000000,00000000,00000040,3545065E), ref: 00E51980
                                              • WriteProcessMemory.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 00E51999
                                              • VirtualProtectEx.KERNEL32(?,00000000,00000000,3545065E,00000000), ref: 00E519B7
                                              • CloseHandle.KERNELBASE(?), ref: 00E519D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Process$HandleProtectVirtualwcsstr$AddressCloseCurrentLibraryLoadMemoryModuleOpenProcWrite
                                              • String ID: ][B
                                              • API String ID: 1383684886-3797712168
                                              • Opcode ID: 437c1e043aa669aaf04042472a6fe19297fe9887a92d76478f90067b70653bce
                                              • Instruction ID: 3a60a4b9b0090894521443cc0228486e9869c918a2dca199eaf84313a9145022
                                              • Opcode Fuzzy Hash: 437c1e043aa669aaf04042472a6fe19297fe9887a92d76478f90067b70653bce
                                              • Instruction Fuzzy Hash: A7C11575D00219AFCB14DFA9E840AAEFBB1FF49300F0485AAE825B7350E7756A06DF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 898 e6c150-e6c1a3 899 e6c7aa-e6c7c5 call e63f2d 898->899 900 e6c1a9-e6c1b0 898->900 900->899 901 e6c1b6-e6c1bd 900->901 903 e6c1bf-e6c1d8 call e63f2d 901->903 904 e6c1d9-e6c1e7 901->904 906 e6c206-e6c219 904->906 907 e6c1e9-e6c205 call e63f2d 904->907 910 e6c23d-e6c251 call e6c060 906->910 911 e6c21b 906->911 919 e6c253-e6c258 910->919 920 e6c25c-e6c277 910->920 914 e6c220-e6c237 call e6abb0 911->914 921 e6c239 914->921 919->920 922 e6c2b5-e6c2c6 920->922 923 e6c279-e6c290 malloc 920->923 921->910 926 e6c3c3-e6c3d7 922->926 927 e6c2cc-e6c2d5 922->927 924 e6c292-e6c2af call e63f2d 923->924 925 e6c2b0 923->925 925->922 930 e6c3dd-e6c3ee 926->930 931 e6c4cb-e6c4cd 926->931 927->926 929 e6c2db 927->929 933 e6c2e0-e6c2f4 call e6abb0 929->933 934 e6c3f0-e6c40f 930->934 935 e6c4d3-e6c4da 931->935 936 e6c5ca-e6c5d4 call e8d550 931->936 949 e6c2fa-e6c2fe 933->949 950 e6c3a9-e6c3b6 933->950 938 e6c456-e6c463 934->938 939 e6c411-e6c440 getsockopt 934->939 940 e6c4e0-e6c4e4 935->940 941 e6c71f-e6c724 935->941 948 e6c5d9-e6c5e0 936->948 965 e6c5ac-e6c5b1 938->965 966 e6c469-e6c477 938->966 939->938 946 e6c442-e6c447 939->946 947 e6c4e6-e6c4f1 WSAWaitForMultipleEvents 940->947 944 e6c726-e6c730 free 941->944 945 e6c733-e6c739 941->945 944->945 951 e6c741-e6c749 945->951 952 e6c73b-e6c73f 945->952 946->938 953 e6c449-e6c450 send 946->953 954 e6c4f7-e6c505 947->954 955 e6c5e2 948->955 956 e6c5ec 948->956 960 e6c301-e6c322 949->960 950->933 959 e6c3bc 950->959 963 e6c7a3 951->963 964 e6c74b-e6c74d 951->964 952->951 953->938 961 e6c680-e6c685 954->961 962 e6c50b-e6c51c 954->962 955->956 956->947 958 e6c5f2-e6c5f6 956->958 958->954 959->926 973 e6c324-e6c32c 960->973 974 e6c330-e6c335 960->974 971 e6c70f-e6c71b WSAResetEvent 961->971 972 e6c68b-e6c698 961->972 975 e6c520-e6c543 962->975 963->899 964->963 976 e6c74f-e6c756 964->976 969 e6c5b3-e6c5bd free 965->969 970 e6c5c0 965->970 967 e6c481-e6c487 966->967 968 e6c479-e6c47e 966->968 977 e6c494-e6c497 967->977 978 e6c489-e6c491 967->978 968->967 969->970 970->936 971->941 972->971 979 e6c69a-e6c69e 972->979 973->974 980 e6c337-e6c363 getsockopt 974->980 981 e6c37f-e6c390 WSAEventSelect 974->981 992 e6c5ff-e6c611 975->992 993 e6c549-e6c587 975->993 976->963 982 e6c758-e6c766 976->982 985 e6c49f-e6c4be 977->985 986 e6c499-e6c49c 977->986 978->977 987 e6c6a0-e6c6b4 call e6abb0 979->987 988 e6c376-e6c37b 980->988 989 e6c365-e6c36a 980->989 981->965 984 e6c396-e6c3a3 981->984 982->963 983 e6c768-e6c76e 982->983 983->963 994 e6c770-e6c780 call e6c060 983->994 984->950 984->960 985->934 995 e6c4c4 985->995 986->985 1004 e6c6b6-e6c6ba 987->1004 1005 e6c704-e6c70d 987->1005 988->981 989->988 991 e6c36c-e6c370 send 989->991 991->988 1008 e6c613-e6c616 992->1008 1009 e6c618-e6c657 992->1009 997 e6c5fb 993->997 998 e6c589-e6c58b 993->998 994->963 1007 e6c782-e6c788 994->1007 995->931 997->992 998->997 1001 e6c58d-e6c58f 998->1001 1001->997 1006 e6c591-e6c5a7 1001->1006 1010 e6c6c0-e6c6d7 WSAEnumNetworkEvents 1004->1010 1005->971 1005->987 1014 e6c65a-e6c67a 1006->1014 1007->963 1013 e6c78a-e6c790 1007->1013 1008->1014 1009->1014 1011 e6c6ed-e6c6fe WSAEventSelect 1010->1011 1012 e6c6d9-e6c6dd 1010->1012 1011->1010 1016 e6c700 1011->1016 1012->1011 1015 e6c6df-e6c6e1 1012->1015 1018 e6c796 1013->1018 1019 e6c792-e6c794 1013->1019 1014->961 1014->975 1015->1011 1020 e6c6e3-e6c6e7 1015->1020 1016->1005 1021 e6c798-e6c7a0 call e8da10 1018->1021 1019->1018 1019->1021 1020->1011 1022 e6c6e9 1020->1022 1021->963 1022->1011
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7fcebc6865cfd13e296520dcc37794275437d20b7ba85b7fb5c04ef327872355
                                              • Instruction ID: 4a95a2abd2b441cafce40b2e97d3255ddd974aef451f39487eb4a4e4523ae74f
                                              • Opcode Fuzzy Hash: 7fcebc6865cfd13e296520dcc37794275437d20b7ba85b7fb5c04ef327872355
                                              • Instruction Fuzzy Hash: 0E129A706483419FD720CF65E880B7ABBE4BF88348F54682EF9D9A7251E734E844CB52

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1091 e8d550-e8d572 1092 e8d58c-e8d59e 1091->1092 1093 e8d574-e8d57f 1091->1093 1094 e8d5a4-e8d5a6 1092->1094 1095 e8d8c6-e8d8dd call e63f2d 1092->1095 1093->1092 1096 e8d581-e8d585 1093->1096 1097 e8d5ac 1094->1097 1098 e8d8b2-e8d8b7 1094->1098 1100 e8d5da-e8d603 1096->1100 1101 e8d587-e8d58a 1096->1101 1102 e8d5ae-e8d5b0 1097->1102 1103 e8d5b6-e8d5d9 WSASetLastError call e63f2d 1097->1103 1105 e8d8bf-e8d8c0 Sleep 1098->1105 1104 e8d606-e8d612 1100->1104 1101->1092 1101->1096 1102->1103 1107 e8d8a7-e8d8a9 1102->1107 1109 e8d618 1104->1109 1110 e8d700-e8d70a 1104->1110 1105->1095 1107->1105 1113 e8d8ab 1107->1113 1114 e8d61e-e8d62e 1109->1114 1115 e8d737-e8d742 WSASetLastError 1109->1115 1110->1104 1111 e8d710-e8d712 1110->1111 1116 e8d75e-e8d7b4 call eb4540 select 1111->1116 1117 e8d714-e8d716 1111->1117 1113->1098 1118 e8d8ad-e8d8b0 1113->1118 1119 e8d634-e8d649 1114->1119 1120 e8d6f5-e8d6fc 1114->1120 1121 e8d745-e8d75d call e63f2d 1115->1121 1134 e8d7ba-e8d7be 1116->1134 1117->1116 1122 e8d718-e8d71a 1117->1122 1118->1098 1118->1105 1123 e8d64b-e8d64f 1119->1123 1124 e8d672-e8d679 1119->1124 1120->1110 1122->1116 1129 e8d71c-e8d732 call e8da10 1122->1129 1130 e8d65c-e8d65e 1123->1130 1131 e8d651-e8d655 1123->1131 1127 e8d67b-e8d67f 1124->1127 1128 e8d6ae-e8d6b4 1124->1128 1135 e8d68f-e8d691 1127->1135 1136 e8d681-e8d688 1127->1136 1128->1120 1138 e8d6b6-e8d6ba 1128->1138 1129->1134 1130->1124 1140 e8d660-e8d663 1130->1140 1131->1130 1139 e8d657-e8d65a 1131->1139 1142 e8d7dc-e8d7ea 1134->1142 1143 e8d7c0-e8d7c3 1134->1143 1135->1128 1145 e8d693-e8d696 1135->1145 1136->1135 1144 e8d68a-e8d68d 1136->1144 1147 e8d6bc 1138->1147 1148 e8d6ce-e8d6d0 1138->1148 1139->1130 1139->1131 1140->1124 1141 e8d665-e8d66e 1140->1141 1141->1124 1151 e8d7f0-e8d7fb 1142->1151 1149 e8d7d5-e8d7d7 1143->1149 1150 e8d7c5-e8d7d2 WSAGetLastError 1143->1150 1144->1135 1144->1136 1145->1128 1152 e8d698-e8d6a7 1145->1152 1153 e8d6c0-e8d6c7 1147->1153 1154 e8d6ed-e8d6f1 1148->1154 1155 e8d6d2-e8d6d5 1148->1155 1149->1121 1150->1149 1156 e8d801-e8d80e __WSAFDIsSet 1151->1156 1157 e8d894-e8d89a 1151->1157 1152->1128 1153->1148 1158 e8d6c9-e8d6cc 1153->1158 1154->1120 1155->1154 1159 e8d6d7-e8d6e6 1155->1159 1161 e8d83a-e8d84c __WSAFDIsSet 1156->1161 1162 e8d810-e8d81a 1156->1162 1157->1151 1160 e8d8a0 1157->1160 1158->1148 1158->1153 1159->1154 1160->1107 1165 e8d858-e8d86a __WSAFDIsSet 1161->1165 1166 e8d84e-e8d852 1161->1166 1163 e8d81c-e8d821 1162->1163 1164 e8d824-e8d830 1162->1164 1163->1164 1164->1161 1167 e8d832-e8d837 1164->1167 1169 e8d86c-e8d872 1165->1169 1170 e8d88d-e8d891 1165->1170 1166->1165 1168 e8d854 1166->1168 1167->1161 1168->1165 1171 e8d874 1169->1171 1172 e8d877-e8d883 1169->1172 1170->1157 1173 e8d893 1170->1173 1171->1172 1172->1170 1174 e8d885-e8d88a 1172->1174 1173->1157 1174->1170
                                              APIs
                                              • WSASetLastError.WS2_32(00002726,?), ref: 00E8D5BB
                                              • WSASetLastError.WS2_32(00002726), ref: 00E8D73C
                                              • select.WS2_32(?,?,?,?,00000000), ref: 00E8D7B4
                                              • WSAGetLastError.WS2_32(?,?), ref: 00E8D7C5
                                              • __WSAFDIsSet.WS2_32(?,?), ref: 00E8D807
                                              • __WSAFDIsSet.WS2_32(?,?), ref: 00E8D845
                                              • __WSAFDIsSet.WS2_32(?,?), ref: 00E8D863
                                              • Sleep.KERNEL32(FFFFFFFE), ref: 00E8D8C0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLast$Sleepselect
                                              • String ID:
                                              • API String ID: 2806104629-0
                                              • Opcode ID: 8827772b4ab1dbe8fd82914c0410c42338e177bc16392761221982a1474fa915
                                              • Instruction ID: 7e01ec61aa523c5a8c864ab7186ce5b31f4319aba9df0edb05ad41c65467875f
                                              • Opcode Fuzzy Hash: 8827772b4ab1dbe8fd82914c0410c42338e177bc16392761221982a1474fa915
                                              • Instruction Fuzzy Hash: 0FA181705083458BD739AF29DC956AEB3E5FF88318F54192EE89DE21D0EB35C940CB52

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1247 e3a610-e3a66c call e64e80 1250 e3a672-e3a6c3 call e41a30 1247->1250 1251 e3a737-e3a830 call e67e00 * 10 call e64ee0 1247->1251 1256 e3a6c5-e3a6d1 1250->1256 1257 e3a6ed-e3a705 1250->1257 1291 e3a832-e3a85b call e689d0 1251->1291 1292 e3a87e-e3a8d6 call e2d420 * 3 call e3b450 call e64e60 1251->1292 1259 e3a6e3-e3a6ea call e63f6b 1256->1259 1260 e3a6d3-e3a6e1 1256->1260 1261 e3abf3-e3ac12 call e63f2d 1257->1261 1262 e3a70b-e3a717 1257->1262 1259->1257 1260->1259 1266 e3a731 _invalid_parameter_noinfo_noreturn 1260->1266 1268 e3abe9-e3abf0 call e63f6b 1262->1268 1269 e3a71d-e3a72b 1262->1269 1266->1251 1268->1261 1269->1266 1269->1268 1297 e3a860-e3a865 1291->1297 1311 e3aaed-e3ab2a 1292->1311 1312 e3a8dc-e3a8eb 1292->1312 1297->1297 1299 e3a867-e3a873 call e2e120 call e3ac20 1297->1299 1308 e3a878-e3a87b 1299->1308 1308->1292 1315 e3ab5b-e3ab70 1311->1315 1316 e3ab2c-e3ab38 1311->1316 1313 e3aa93-e3aae7 call e3df50 call e41a30 call e3ac20 1312->1313 1314 e3a8f1-e3a8fe 1312->1314 1336 e3aaea 1313->1336 1320 e3a905-e3a90d 1314->1320 1317 e3ab72-e3ab80 1315->1317 1318 e3aba0-e3abb8 1315->1318 1321 e3ab3a-e3ab48 1316->1321 1322 e3ab4e-e3ab58 call e63f6b 1316->1322 1324 e3ab82-e3ab90 1317->1324 1325 e3ab96-e3ab9d call e63f6b 1317->1325 1318->1257 1329 e3abbe-e3abca 1318->1329 1327 e3a913-e3a9e9 1320->1327 1328 e3aa80-e3aa89 1320->1328 1321->1266 1321->1322 1322->1315 1324->1266 1324->1325 1325->1318 1334 e3a9f0-e3a9fe 1327->1334 1328->1320 1331 e3aa8f-e3aa91 1328->1331 1329->1259 1335 e3abd0-e3abde 1329->1335 1331->1313 1331->1336 1334->1334 1339 e3aa00-e3aa14 strstr 1334->1339 1335->1266 1340 e3abe4 1335->1340 1336->1311 1342 e3aa16-e3aa4a call e3e0f0 strstr 1339->1342 1343 e3aa4c-e3aa51 1339->1343 1340->1259 1342->1343 1349 e3aa53 1342->1349 1344 e3aa56-e3aa69 1343->1344 1344->1327 1347 e3aa6f-e3aa79 1344->1347 1347->1328 1349->1344
                                              APIs
                                                • Part of subcall function 00E64E80: AcquireSRWLockExclusive.KERNEL32(00F26C18,?,00E32662,?,?,00000000,00000000,?,?,0000000F,00000000,00000000), ref: 00E64E86
                                                • Part of subcall function 00E64E80: ReleaseSRWLockExclusive.KERNEL32(00F26C18,00000000,00000000), ref: 00E64EAA
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3A731
                                              • strstr.VCRUNTIME140(00000000,?), ref: 00E3AA0D
                                              • strstr.VCRUNTIME140(00000000,89D9C9E7), ref: 00E3AA43
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExclusiveLockstrstr$AcquireRelease_invalid_parameter_noinfo_noreturn
                                              • String ID: b7$keyauth.win
                                              • API String ID: 3875448324-862066459
                                              • Opcode ID: 6e27c9b728611e52f9ebac59f374b529db460e32f78a72ad1b81db7012f210eb
                                              • Instruction ID: ed75070b0562f66e4da60aaae1146ee9bc2991f83ff78194d27edba6539c3229
                                              • Opcode Fuzzy Hash: 6e27c9b728611e52f9ebac59f374b529db460e32f78a72ad1b81db7012f210eb
                                              • Instruction Fuzzy Hash: 6CF13471C102488BDB01DF78DC867ADBBB5EF56344F189369E8447B242E771AAC9CB81
                                              APIs
                                              • LoadLibraryA.KERNEL32(?,?,?,?,?), ref: 00E50A46
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00E50ACF
                                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 00E50B03
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E50CDE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Virtual$AddressAllocFreeLibraryLoadProc
                                              • String ID: UjJ"
                                              • API String ID: 3087743119-1193379857
                                              • Opcode ID: 915a2a38cf17948d8196f37cca8cc1e6aef4dab5a471fc67c44634ce1b992432
                                              • Instruction ID: 57b28d2c4688604ea621aa1b2652200c81ca6a1515ae82cc57174c3d673cfb8c
                                              • Opcode Fuzzy Hash: 915a2a38cf17948d8196f37cca8cc1e6aef4dab5a471fc67c44634ce1b992432
                                              • Instruction Fuzzy Hash: 6AD1DFB4E042199BDB15CF98D881AEEFBB1FF09310F148699E969BB340E7306A45CF54
                                              APIs
                                              • GetSystemInfo.KERNELBASE(?,00000000,?,?,?,8E857614,?,?), ref: 00E50F12
                                              • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00E50F25
                                              • VirtualProtect.KERNELBASE(00000000,?,00000140,00000000), ref: 00E50F58
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Virtual$AllocInfoProtectSystem
                                              • String ID:
                                              • API String ID: 284756817-0
                                              • Opcode ID: 30b95856fb558738372c9b5d77889f20ffc6aaba82548cf0065c38d2601b84f4
                                              • Instruction ID: 84db63e9cc7e57bea8966cc65a0e768ca40984ce79cd6d3eef33583098599a15
                                              • Opcode Fuzzy Hash: 30b95856fb558738372c9b5d77889f20ffc6aaba82548cf0065c38d2601b84f4
                                              • Instruction Fuzzy Hash: 5F4179B1E04248AFCB14CFF9D881BEEBBF4EB09700F10862AE915F7281E6345805CB60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 676 e7f5c0-e7f5dc 677 e7f621-e7f628 call eb0b60 676->677 678 e7f5de-e7f5f0 WSAStartup 676->678 686 e7f62e-e7f648 GetModuleHandleA 677->686 687 e7f7fc-e7f810 call e63f2d 677->687 679 e7f607-e7f620 call e63f2d 678->679 680 e7f5f2-e7f5f8 678->680 682 e7f601 WSACleanup 680->682 683 e7f5fa-e7f5ff 680->683 682->679 683->677 683->682 689 e7f655-e7f675 GetProcAddress strpbrk 686->689 690 e7f64a-e7f650 686->690 693 e7f677-e7f679 689->693 694 e7f69f-e7f6a1 689->694 692 e7f781-e7f790 GetModuleHandleA 690->692 700 e7f792-e7f7b4 GetProcAddress * 3 692->700 701 e7f7b9-e7f7fb call eb0760 * 2 QueryPerformanceFrequency 692->701 696 e7f68d-e7f69a LoadLibraryA 693->696 697 e7f67b-e7f688 693->697 698 e7f6c4-e7f6d4 GetSystemDirectoryA 694->698 699 e7f6a3-e7f6ad GetProcAddress 694->699 703 e7f75d-e7f766 696->703 697->703 698->703 705 e7f6da-e7f6eb malloc 698->705 699->698 704 e7f6af-e7f6bf LoadLibraryExA 699->704 700->701 701->687 703->692 708 e7f768-e7f77b GetProcAddress 703->708 704->703 709 e7f753-e7f75a free 705->709 710 e7f6ed-e7f6fa GetSystemDirectoryA 705->710 708->692 709->703 710->709 712 e7f6fc-e7f6fe 710->712 714 e7f701-e7f706 712->714 714->714 715 e7f708-e7f715 714->715 716 e7f718-e7f71d 715->716 716->716 717 e7f71f-e7f72a 716->717 718 e7f730-e7f73b 717->718 718->718 719 e7f73d-e7f73f 718->719 720 e7f741-e7f748 719->720 721 e7f74a-e7f74b LoadLibraryA 719->721 722 e7f751 720->722 721->722 722->709
                                              APIs
                                              • WSAStartup.WS2_32(00000202,?), ref: 00E7F5E8
                                              • WSACleanup.WS2_32 ref: 00E7F601
                                              • GetModuleHandleA.KERNEL32(kernel32,?,00000000), ref: 00E7F638
                                              • GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 00E7F65C
                                              • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(iphlpapi.dll,00EC5864,?,?,00000000), ref: 00E7F66A
                                              • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00E7F692
                                              • GetProcAddress.KERNEL32(00000000,AddDllDirectory), ref: 00E7F6A9
                                              • LoadLibraryExA.KERNELBASE(iphlpapi.dll,00000000,00000800), ref: 00E7F6BB
                                              • GetSystemDirectoryA.KERNEL32(00000000,00000000), ref: 00E7F6C8
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(0000000D), ref: 00E7F6DE
                                              • GetSystemDirectoryA.KERNEL32(00000000,?), ref: 00E7F6F2
                                              • LoadLibraryA.KERNEL32(00000000), ref: 00E7F74B
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E7F754
                                              • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 00E7F76E
                                              • GetModuleHandleA.KERNEL32(ws2_32), ref: 00E7F786
                                              • GetProcAddress.KERNEL32(00000000,FreeAddrInfoExW), ref: 00E7F798
                                              • GetProcAddress.KERNEL32(00000000,GetAddrInfoExCancel), ref: 00E7F7A5
                                              • GetProcAddress.KERNEL32(00000000,GetAddrInfoExW), ref: 00E7F7B2
                                              • QueryPerformanceFrequency.KERNEL32(00F271E0), ref: 00E7F7F1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AddressProc$LibraryLoad$DirectoryHandleModuleSystem$CleanupFrequencyPerformanceQueryStartupfreemallocstrpbrk
                                              • String ID: AddDllDirectory$FreeAddrInfoExW$GetAddrInfoExCancel$GetAddrInfoExW$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32$ws2_32
                                              • API String ID: 2955908671-760012282
                                              • Opcode ID: 10c19a38d177a6da474a92aa9a2424f01fc8f362558c3b79450d3f627beca3f9
                                              • Instruction ID: 37b14ac93daf1a02aba0702a23347fb7242ce9a8644f9dbd0f13903720ce6876
                                              • Opcode Fuzzy Hash: 10c19a38d177a6da474a92aa9a2424f01fc8f362558c3b79450d3f627beca3f9
                                              • Instruction Fuzzy Hash: 44518A31744301AFE7245B71AC46F6A3794AF42B09F08907EF909B7292EFA2D8078791

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 724 e51000-e511bd 725 e511c0-e511c5 724->725 725->725 726 e511c7-e51228 call e41260 memset RegOpenKeyExW 725->726 729 e5128d-e512d0 memset RegOpenKeyExW 726->729 730 e5122a-e5124d RegGetValueW 726->730 732 e512d2-e512f5 RegGetValueW 729->732 733 e5132f-e51372 memset RegOpenKeyExW 729->733 730->729 731 e5124f-e5125a 730->731 734 e51260-e51264 731->734 732->733 737 e512f7-e512fc 732->737 735 e51374-e51397 RegGetValueW 733->735 736 e513d1-e51414 memset RegOpenKeyExW 733->736 741 e51266-e51268 734->741 742 e51280-e51282 734->742 735->736 743 e51399-e5139e 735->743 739 e51484-e51498 call e63f2d 736->739 740 e51416-e51439 RegGetValueW 736->740 738 e51302-e51306 737->738 744 e51322-e51324 738->744 745 e51308-e5130a 738->745 740->739 746 e5143b-e51440 740->746 747 e5127c-e5127e 741->747 748 e5126a-e51270 741->748 750 e51285-e51287 742->750 749 e513a4-e513a8 743->749 756 e51327-e51329 744->756 753 e5130c-e51312 745->753 754 e5131e-e51320 745->754 755 e51446-e5144a 746->755 747->750 748->742 757 e51272-e5127a 748->757 758 e513c4-e513c6 749->758 759 e513aa-e513ac 749->759 750->729 760 e5146f-e51483 call e63f2d 750->760 753->744 762 e51314-e5131c 753->762 754->756 763 e51466-e51468 755->763 764 e5144c-e5144e 755->764 756->733 756->760 757->734 757->747 761 e513c9-e513cb 758->761 765 e513c0-e513c2 759->765 766 e513ae-e513b4 759->766 761->736 761->760 762->738 762->754 770 e5146b-e5146d 763->770 768 e51450-e51456 764->768 769 e51462-e51464 764->769 765->761 766->758 771 e513b6-e513be 766->771 768->763 773 e51458-e51460 768->773 769->770 770->739 770->760 771->749 771->765 773->755 773->769
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,000000FF,?,?,?,?), ref: 00E511F1
                                              • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\HardwareConfig\Current\,00000000,00000001,00000000,?,?,?), ref: 00E5121E
                                              • RegGetValueW.KERNELBASE(00000000,00000000,SystemManufacturer,00000002,00000000,?,000000FF), ref: 00E51249
                                              • memset.VCRUNTIME140(?,00000000,000000FF), ref: 00E512A5
                                              • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\HardwareConfig\Current\,00000000,00000001,00000000), ref: 00E512CC
                                              • RegGetValueW.KERNELBASE(00000000,00000000,BIOSVendor,00000002,00000000,?,000000FF), ref: 00E512F1
                                              • memset.VCRUNTIME140(?,00000000,000000FF), ref: 00E51347
                                              • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\HardwareConfig\Current\,00000000,00000001,00000000), ref: 00E5136E
                                              • RegGetValueW.KERNELBASE(00000000,00000000,SystemFamily,00000002,00000000,?,000000FF), ref: 00E51393
                                              • memset.VCRUNTIME140(?,00000000,000000FF), ref: 00E513E9
                                              • RegOpenKeyExW.KERNELBASE(80000002,SYSTEM\HardwareConfig\Current\,00000000,00000001,00000000), ref: 00E51410
                                              • RegGetValueW.KERNELBASE(00000000,00000000,SystemProductName,00000002,00000000,?,000000FF), ref: 00E51435
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: OpenValuememset
                                              • String ID: BIOSVendor$Microsoft Corporation$SYSTEM\HardwareConfig\Current\$SystemFamily$SystemManufacturer$SystemProductName$Virtual Machine
                                              • API String ID: 1838555039-2738853297
                                              • Opcode ID: 433201e77d1e0f9e6f9f64c84617f74a3ea89075760ec9dcc2ed2b1e7eacd555
                                              • Instruction ID: 09dc71e1158697b3010b967b9fa5e3a330715515a745952ca6b6a80f5e3cbd62
                                              • Opcode Fuzzy Hash: 433201e77d1e0f9e6f9f64c84617f74a3ea89075760ec9dcc2ed2b1e7eacd555
                                              • Instruction Fuzzy Hash: 93C18EF490021C9ADB308F108C91BE9B7B9AF05748F0455E9DB48B7282E7719EC9CF19

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 774 e7f410-e7f424 GetModuleHandleA 775 e7f426-e7f429 774->775 776 e7f42a-e7f44f GetProcAddress strpbrk 774->776 777 e7f473-e7f475 776->777 778 e7f451-e7f453 776->778 781 e7f477-e7f485 GetProcAddress 777->781 782 e7f499-e7f4ab GetSystemDirectoryA 777->782 779 e7f455-e7f463 778->779 780 e7f464-e7f472 LoadLibraryA 778->780 781->782 783 e7f487-e7f498 LoadLibraryExA 781->783 784 e7f4b1-e7f4b3 782->784 785 e7f54f-e7f556 782->785 787 e7f4b6-e7f4bb 784->787 787->787 788 e7f4bd-e7f4d2 malloc 787->788 789 e7f545-e7f54c free 788->789 790 e7f4d4-e7f4e1 GetSystemDirectoryA 788->790 789->785 790->789 791 e7f4e3-e7f4e5 790->791 792 e7f4e8-e7f4ed 791->792 792->792 793 e7f4ef-e7f4ff 792->793 794 e7f500-e7f505 793->794 794->794 795 e7f507-e7f50d 794->795 796 e7f510-e7f51b 795->796 796->796 797 e7f51d-e7f51f 796->797 798 e7f521-e7f53b free 797->798 799 e7f53c-e7f543 LoadLibraryA 797->799 799->789
                                              APIs
                                              • GetModuleHandleA.KERNEL32(kernel32,?,?,security.dll,00EB0B8D,security.dll,00000004,00000000,00000000,00000002,00000002,00E7F626), ref: 00E7F41A
                                              • GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 00E7F432
                                              • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,00EC5864,?,?,?,security.dll,00EB0B8D,security.dll,00000004,00000000,00000000,00000002,00000002,00E7F626), ref: 00E7F444
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProcstrpbrk
                                              • String ID: AddDllDirectory$LoadLibraryExA$kernel32$security.dll
                                              • API String ID: 27745253-2138446276
                                              • Opcode ID: 305ebce49932d77c8c31d678431a2341d22843d9f628e26db91da8b33bc0c961
                                              • Instruction ID: 387443c7da7ec11a5bee598019d1ca93cdc3bdaf02c94de019249f07e8774bce
                                              • Opcode Fuzzy Hash: 305ebce49932d77c8c31d678431a2341d22843d9f628e26db91da8b33bc0c961
                                              • Instruction Fuzzy Hash: BD412A773053005FEB141F79BC44BBA7759DF8232AF28907EEA46A6142EF67D80B4660

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 801 e52010-e5208c GetModuleFileNameW 802 e52090-e52099 801->802 802->802 803 e5209b-e520db call e227e0 802->803 806 e521a1 803->806 807 e520e1-e520fc memset 803->807 809 e521a4-e521cb 806->809 808 e52101-e52107 807->808 812 e52151-e5215c 808->812 813 e52109-e5211d 808->813 810 e521d1-e52287 call e227e0 WideCharToMultiByte call e3f840 WideCharToMultiByte 809->810 811 e52710-e52715 call e226d0 809->811 833 e522c0-e5256d _time64 srand 810->833 834 e52289-e5229e 810->834 816 e5215f-e52172 812->816 813->808 814 e5211f-e5212d 813->814 818 e52130-e52136 814->818 820 e52174-e52177 816->820 821 e52197-e5219f 816->821 823 e52142-e52144 818->823 824 e52138-e52140 818->824 826 e52179-e52184 820->826 827 e5218a-e52190 820->827 821->809 823->806 829 e52146-e52149 823->829 824->823 828 e5214b-e5214f 824->828 826->820 831 e52186-e52188 826->831 827->806 832 e52192-e52195 827->832 828->809 829->818 831->821 831->827 832->816 837 e52570-e52575 833->837 835 e522b6-e522bd call e63f6b 834->835 836 e522a0-e522ae 834->836 835->833 836->835 838 e522b0 _invalid_parameter_noinfo_noreturn 836->838 837->837 840 e52577-e525ad call e2e120 rand 837->840 838->835 844 e525e0-e525e3 840->844 845 e525af 840->845 847 e525e9-e5262d strcat_s rename 844->847 848 e5270b call e64432 844->848 846 e525b0-e525de rand 845->846 846->844 846->846 849 e5262f-e5263a 847->849 850 e5265a-e52663 847->850 848->811 852 e52650-e52657 call e63f6b 849->852 853 e5263c-e5264a 849->853 854 e52665-e52674 850->854 855 e52690-e526b4 850->855 852->850 853->852 858 e526dd _invalid_parameter_noinfo_noreturn 853->858 860 e52686-e5268d call e63f6b 854->860 861 e52676-e52684 854->861 856 e526b6-e526cb 855->856 857 e526ed-e5270a call e63f2d 855->857 862 e526e3-e526ea call e63f6b 856->862 863 e526cd-e526db 856->863 858->862 860->855 861->858 861->860 862->857 863->858 863->862
                                              APIs
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,8E857614,-00000001,C8593A89), ref: 00E5205F
                                              • memset.VCRUNTIME140(?,00000000,00000100,?,?), ref: 00E520EF
                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 00E5222E
                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000000,00000000,00000000), ref: 00E52278
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 00E522B0
                                              • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00E522DE
                                              • srand.API-MS-WIN-CRT-UTILITY-L1-1-0(00000000), ref: 00E522EE
                                              • rand.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?), ref: 00E5258C
                                              • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00E525B0
                                              • strcat_s.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000014,.exe), ref: 00E525F9
                                              • rename.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,00000000), ref: 00E5261B
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E526DD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWide_invalid_parameter_noinfo_noreturnrand$FileModuleName_time64memsetrenamesrandstrcat_s
                                              • String ID: .exe
                                              • API String ID: 187646111-4119554291
                                              • Opcode ID: 43a1b49459cce4d10bc78d74b8e018ba69f57f0f9be71e7b9d0d1b1543b9d6fa
                                              • Instruction ID: 9e3a8f9ed008079bef2e12d691ee45661c74e393605f4ef9da6a87d67ff3081e
                                              • Opcode Fuzzy Hash: 43a1b49459cce4d10bc78d74b8e018ba69f57f0f9be71e7b9d0d1b1543b9d6fa
                                              • Instruction Fuzzy Hash: 821248709052288BDB26CF28DD99BA9B7B8EB45304F1006D9E94DB7290DBB16FC5CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1025 e6f230-e6f6db 1027 e6f786-e6f7a0 free 1025->1027 1028 e6f6e1-e6f70d EnterCriticalSection LeaveCriticalSection 1025->1028 1029 e6f70f-e6f711 1028->1029 1030 e6f729-e6f72b 1028->1030 1033 e6f713-e6f71a CloseHandle 1029->1033 1034 e6f71c-e6f727 call e8f1a0 1029->1034 1031 e6f72d-e6f743 GetAddrInfoExCancel WaitForSingleObject CloseHandle 1030->1031 1032 e6f749-e6f750 1030->1032 1031->1032 1037 e6f752-e6f758 call e8f1b0 1032->1037 1038 e6f75b-e6f76d call e6f7b0 free 1032->1038 1035 e6f770-e6f785 call e69730 closesocket 1033->1035 1034->1035 1035->1027 1037->1038 1038->1035
                                              APIs
                                              • EnterCriticalSection.KERNEL32(?,000006DC,?,00000000,00000088,00E76784,00000000), ref: 00E6F6F0
                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00000088,00E76784,00000000), ref: 00E6F703
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000088,00E76784,00000000), ref: 00E6F714
                                              • GetAddrInfoExCancel.WS2_32(?), ref: 00E6F731
                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000088,00E76784,00000000), ref: 00E6F73B
                                              • CloseHandle.KERNELBASE(?,?,00000000,00000088,00E76784,00000000), ref: 00E6F743
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,00000088,00E76784,00000000), ref: 00E6F767
                                              • closesocket.WS2_32(?), ref: 00E6F77E
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000088,00E76784,00000000), ref: 00E6F78F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CloseCriticalHandleSectionfree$AddrCancelEnterInfoLeaveObjectSingleWaitclosesocket
                                              • String ID: 4
                                              • API String ID: 3257786090-2200918444
                                              • Opcode ID: 45e62b3b33bf1ad52ec154039b2d0a9393ba449b80f43f6c340c9a2d141caa8f
                                              • Instruction ID: 023bca9cbd23a90ebb699eaed9a610d6c52ec026199ad5609512014367bd5561
                                              • Opcode Fuzzy Hash: 45e62b3b33bf1ad52ec154039b2d0a9393ba449b80f43f6c340c9a2d141caa8f
                                              • Instruction Fuzzy Hash: F321BE75451202EFCB00AF61FD48A86BBB8FF05396F041031FA19A2122D732F869DBE1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1046 e3ae00-e3aec0 GetModuleFileNameA 1047 e3aec7-e3aecc 1046->1047 1047->1047 1048 e3aece-e3af48 call e2e120 call e443f0 call e34ed0 1047->1048 1055 e3af4a 1048->1055 1056 e3af4c-e3afae _popen 1048->1056 1055->1056 1057 e3afb4-e3afcc fgets 1056->1057 1058 e3b10a-e3b158 call e3ea70 call e2f060 _CxxThrowException 1056->1058 1060 e3b012-e3b02c _pclose 1057->1060 1061 e3afce 1057->1061 1064 e3b02e-e3b03d 1060->1064 1065 e3b05d-e3b081 1060->1065 1063 e3afd0-e3afd9 1061->1063 1069 e3afe0-e3afe5 1063->1069 1070 e3b053-e3b05a call e63f6b 1064->1070 1071 e3b03f-e3b04d 1064->1071 1066 e3b083-e3b092 1065->1066 1067 e3b0ae-e3b0b7 1065->1067 1072 e3b0a4-e3b0ab call e63f6b 1066->1072 1073 e3b094-e3b0a2 1066->1073 1075 e3b0ea-e3b109 call e63f2d 1067->1075 1076 e3b0b9-e3b0c8 1067->1076 1069->1069 1077 e3afe7-e3b010 call e41260 fgets 1069->1077 1070->1065 1071->1070 1078 e3b0da _invalid_parameter_noinfo_noreturn 1071->1078 1072->1067 1073->1072 1073->1078 1082 e3b0e0-e3b0e7 call e63f6b 1076->1082 1083 e3b0ca-e3b0d8 1076->1083 1077->1060 1077->1063 1078->1082 1082->1075 1083->1078 1083->1082
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,8E857614,?,?), ref: 00E3AE67
                                              • _popen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00ECFB2C,?), ref: 00E3AF89
                                              • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000080,00000000), ref: 00E3AFC1
                                              • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000080,00000000,?,?), ref: 00E3B005
                                              • _pclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00E3B01A
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3B0DA
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5DA0,?,?), ref: 00E3B153
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: fgets$ExceptionFileModuleNameThrow_invalid_parameter_noinfo_noreturn_pclose_popen
                                              • String ID: certutil -hashfile "
                                              • API String ID: 3145020836-3987956816
                                              • Opcode ID: 305a4bd7f12c3c38c3393adf8d7c3b9475229bb123974c89c7630bc9a080c7ab
                                              • Instruction ID: 2a57b80c8d47719e18acf8e5106a37dd855d4fb60d5281c2154038451909492e
                                              • Opcode Fuzzy Hash: 305a4bd7f12c3c38c3393adf8d7c3b9475229bb123974c89c7630bc9a080c7ab
                                              • Instruction Fuzzy Hash: 9591C070D012188BDB24CB24DD48BEABBB4EF55304F1492D9E859B7292EB715BC8CF50

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 00E2DEC0: memchr.VCRUNTIME140 ref: 00E2DF08
                                                • Part of subcall function 00E2DEC0: memchr.VCRUNTIME140(00000001,?,?), ref: 00E2DF8B
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,8E857614,?,00000001), ref: 00E52913
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(00000092,?,8E857614,?,00000001), ref: 00E5283E
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(0000004F), ref: 00E52854
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(000000FF), ref: 00E5286D
                                              • memmove.VCRUNTIME140(?,?,?), ref: 00E528C3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ??6?$basic_ostream@D@std@@@std@@U?$char_traits@V01@$memchrmemmove$_invalid_parameter_noinfo_noreturn
                                              • String ID: [~]
                                              • API String ID: 476110309-1003381106
                                              • Opcode ID: e33b9abf1a3f2ed7e2b7ab2dd02c208a705ff645fa8ebe8eda4115ad2acd3905
                                              • Instruction ID: fb4fe58f44c19e45ecdd2003eda14855799b0583cfc701189c40698632bd6343
                                              • Opcode Fuzzy Hash: e33b9abf1a3f2ed7e2b7ab2dd02c208a705ff645fa8ebe8eda4115ad2acd3905
                                              • Instruction Fuzzy Hash: 1951C475E00108AFCF08DBA4E885AEEB7F5EF89300F10962DE91677785D7306946DB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1216 e3ac20-e3ac6e 1217 e3adf4-e3adf9 call e21690 1216->1217 1218 e3ac74-e3acac call e43770 1216->1218 1223 e3acd2-e3acde call e2dfc0 1218->1223 1224 e3acae-e3acd0 memmove 1218->1224 1226 e3ace3-e3ad35 system 1223->1226 1224->1226 1227 e3ad37-e3ad43 1226->1227 1228 e3ad5f-e3ad77 1226->1228 1229 e3ad55-e3ad5c call e63f6b 1227->1229 1230 e3ad45-e3ad53 1227->1230 1231 e3ada7-e3adb1 1228->1231 1232 e3ad79-e3ad85 1228->1232 1229->1228 1230->1229 1233 e3ad97 _invalid_parameter_noinfo_noreturn 1230->1233 1237 e3adb3-e3adbf 1231->1237 1238 e3ade1-e3adf3 1231->1238 1235 e3ad87-e3ad95 1232->1235 1236 e3ad9d-e3ada4 call e63f6b 1232->1236 1233->1236 1235->1233 1235->1236 1236->1231 1239 e3adc1-e3adcf 1237->1239 1240 e3add7-e3adde call e63f6b 1237->1240 1239->1240 1243 e3add1 _invalid_parameter_noinfo_noreturn 1239->1243 1240->1238 1243->1240
                                              APIs
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F), ref: 00E4382F
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,DCC8DA8D,?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D), ref: 00E43840
                                              • memmove.VCRUNTIME140(?, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3ACC1
                                              • system.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000011,00000000, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3AD26
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3AD97
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3ADD1
                                              Strings
                                              • start cmd /C "color b && title Error && echo , xrefs: 00E3AC83
                                              • && timeout /t 5", xrefs: 00E3ACA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$_invalid_parameter_noinfo_noreturn$system
                                              • String ID: && timeout /t 5"$start cmd /C "color b && title Error && echo
                                              • API String ID: 914278256-3357973498
                                              • Opcode ID: 22efb2cfb79180b27f0a054ceb19215b76ae11c6ce0b3ae8a30f9132449ae501
                                              • Instruction ID: 0305bf86f9b158553ae7e5ef1c0a3c04eeed1142baadf945ecb71e82d9d793a9
                                              • Opcode Fuzzy Hash: 22efb2cfb79180b27f0a054ceb19215b76ae11c6ce0b3ae8a30f9132449ae501
                                              • Instruction Fuzzy Hash: 03510871D002049FDB08CF68DD89BEEBBB1EF45304F248269E551B7692D774AE81CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1350 e22a50-e22a8b 1351 e22a90-e22a95 1350->1351 1351->1351 1352 e22a97-e22aab 1351->1352 1353 e22ac3-e22ace 1352->1353 1354 e22aad 1352->1354 1357 e22ad1-e22ae5 call e22ca0 1353->1357 1355 e22aaf-e22ab1 1354->1355 1356 e22abd-e22ac1 1354->1356 1355->1353 1358 e22ab3-e22ab5 1355->1358 1356->1357 1363 e22af1-e22b09 1357->1363 1364 e22ae7-e22bd9 1357->1364 1358->1353 1360 e22ab7 1358->1360 1360->1356 1362 e22ab9-e22abb 1360->1362 1362->1353 1362->1356 1365 e22b43-e22b5d ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z 1363->1365 1366 e22b0b 1363->1366 1369 e22bdc-e22bf4 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z ?uncaught_exception@std@@YA_NXZ 1364->1369 1370 e22b91 1365->1370 1371 e22b5f-e22b61 1365->1371 1368 e22b10-e22b12 1366->1368 1368->1365 1372 e22b14 1368->1372 1373 e22bf6-e22bf9 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ 1369->1373 1374 e22bff-e22c14 1369->1374 1376 e22b94-e22bb3 1370->1376 1371->1370 1375 e22b63-e22b65 1371->1375 1377 e22b16-e22b18 1372->1377 1378 e22b1a-e22b31 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z 1372->1378 1373->1374 1379 e22c16 1374->1379 1380 e22c1b-e22c2e 1374->1380 1375->1376 1381 e22b67 1375->1381 1376->1369 1377->1365 1377->1378 1382 e22b33-e22b36 1378->1382 1383 e22b38-e22b41 1378->1383 1379->1380 1384 e22b69-e22b6b 1381->1384 1385 e22b6d-e22b87 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z 1381->1385 1382->1376 1383->1368 1384->1376 1384->1385 1385->1370 1386 e22b89-e22b8f 1385->1386 1386->1375
                                              APIs
                                              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?,?,8E857614), ref: 00E22B28
                                              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z.MSVCP140(?,?,00000000,?,8E857614), ref: 00E22B54
                                              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z.MSVCP140(?,?,8E857614), ref: 00E22B7E
                                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000000,00000000,?,8E857614), ref: 00E22BE6
                                              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,8E857614), ref: 00E22BEC
                                              • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140(?,8E857614), ref: 00E22BF9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@
                                              • String ID:
                                              • API String ID: 3901553425-0
                                              • Opcode ID: 7db2e0a6495e2706094918cba9b0aa8be463bab79ffaaacd5dbc30ec7a50b1da
                                              • Instruction ID: bacd69ed778108540459f997770a1b1abedc1415b4cf20dc82b39a12d8cf176b
                                              • Opcode Fuzzy Hash: 7db2e0a6495e2706094918cba9b0aa8be463bab79ffaaacd5dbc30ec7a50b1da
                                              • Instruction Fuzzy Hash: 91516D75A005149FCB14CF68D984BA9BBF0FF49718F29529CE916BB3A2D731AC01CB54

                                              Control-flow Graph

                                              APIs
                                              • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000E08,?,00E64EC8,00000000,?,00E32662,?,?,00000000,00000000,?,?,0000000F,00000000,00000000), ref: 00E76DB8
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000000,00000000), ref: 00E76DEA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: callocfree
                                              • String ID:
                                              • API String ID: 306872129-0
                                              • Opcode ID: 3aca59ee2673ecfcda89a600b00168f51a47b1482089fe31183582bfccdb8821
                                              • Instruction ID: 2d0a5d7550d0da372b39783f9b198bee4608bb8b0a34f7110b97fa88dc59d613
                                              • Opcode Fuzzy Hash: 3aca59ee2673ecfcda89a600b00168f51a47b1482089fe31183582bfccdb8821
                                              • Instruction Fuzzy Hash: C6610AB0205B42AEE3599F38D849BC6FBA5BB41328F144319E57C5B2D1C7B62079CBD1
                                              APIs
                                                • Part of subcall function 00EB0760: GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo), ref: 00EB078E
                                                • Part of subcall function 00EB0760: GetProcAddress.KERNEL32(00000000), ref: 00EB0795
                                                • Part of subcall function 00E7F410: GetModuleHandleA.KERNEL32(kernel32,?,?,security.dll,00EB0B8D,security.dll,00000004,00000000,00000000,00000002,00000002,00E7F626), ref: 00E7F41A
                                              • GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceA), ref: 00EB0B9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                              • API String ID: 1646373207-3788156360
                                              • Opcode ID: 2b534a3ac68ae4d09a2e3f3d872398ebca9d77bc4d55a429ce727fb2a1174a2c
                                              • Instruction ID: d572fb15471f926cb99bd1f1672598c69d6c477bad3d15a4a5a44c80839892a0
                                              • Opcode Fuzzy Hash: 2b534a3ac68ae4d09a2e3f3d872398ebca9d77bc4d55a429ce727fb2a1174a2c
                                              • Instruction Fuzzy Hash: CBF06C707403066BEF2457355C57F6B31C59BC0708FA454BD7A0AF61C5EAB6DD029650
                                              APIs
                                              • FindWindowW.USER32(00000000,?), ref: 00E50355
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 00E50546
                                                • Part of subcall function 00E4E2F0: GetLastError.KERNEL32(?,00000000,00000000), ref: 00E4E3DB
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 00E50571
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 00E50592
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$ErrorFindLastWindow_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 3421515688-0
                                              • Opcode ID: ce3e084ef35438faa9ca63fb798d6a8b6bb7d2e0e09eff231267f70b0011c1a9
                                              • Instruction ID: 032c4dd67b4da39d6a88f5d39459e63754f39bb14c6b2b28c1d6ff3ececf8451
                                              • Opcode Fuzzy Hash: ce3e084ef35438faa9ca63fb798d6a8b6bb7d2e0e09eff231267f70b0011c1a9
                                              • Instruction Fuzzy Hash: 81D1F1B4D042598BCB18CFA8D981AEEBBB1FF49314F204159E949B7340E7306A85CFA1
                                              APIs
                                              • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,Function_00043470,00000000,00000000,?,00000008,?,?,8E857614), ref: 00E21499
                                              • _Thrd_detach.MSVCP140(00000000,?), ref: 00E214B6
                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000001), ref: 00E214EE
                                              • ?_Throw_Cpp_error@std@@YAXH@Z.MSVCP140(00000006), ref: 00E214FD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Cpp_error@std@@Throw_$Thrd_detach_beginthreadex
                                              • String ID:
                                              • API String ID: 1544947071-0
                                              • Opcode ID: 7fb49f449916620f7f2c2d1d434ddd11ae8d8fde2a48d2adfd8fc8692eb5dd88
                                              • Instruction ID: bb9539efaeff68d07f083e1db7af6612fb8c4b61bfbde4b6d47c2b926a6cf10f
                                              • Opcode Fuzzy Hash: 7fb49f449916620f7f2c2d1d434ddd11ae8d8fde2a48d2adfd8fc8692eb5dd88
                                              • Instruction Fuzzy Hash: 514147B4E04248DFDB05DFA8E845BEEBBB4FF08304F104169E815B7391EB756A058B64
                                              APIs
                                                • Part of subcall function 00E4EAB0: _Query_perf_frequency.MSVCP140 ref: 00E4EABE
                                                • Part of subcall function 00E4EAB0: _Query_perf_counter.MSVCP140 ref: 00E4EACA
                                              • Sleep.KERNEL32(05265C00,00000000,00000000,?,000F4240,00000000,?,?,000F4240,00000000,?,?,?), ref: 00E63380
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E63393
                                              • Sleep.KERNEL32(-00000001,00000000,?,000F4240,00000000,?,?,000F4240,00000000,?,?,?,?,?,?,00E6320F), ref: 00E633C4
                                              • Sleep.KERNEL32(00000000,00000000,?,000F4240,00000000,?,?,000F4240,00000000,?,?,?,?,?,?,00E6320F), ref: 00E633D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Sleep$Query_perf_counterQuery_perf_frequencyUnothrow_t@std@@@__ehfuncinfo$??2@
                                              • String ID:
                                              • API String ID: 182150864-0
                                              • Opcode ID: 3bc39f83053371da1cf298b239eab178a657e5001cec86fc7dcc09f6f10265d3
                                              • Instruction ID: 425b071bb7a1ce8c4ab9d2d26e9b5906d7a332bd8ca1c5cba9d04daf4a413eee
                                              • Opcode Fuzzy Hash: 3bc39f83053371da1cf298b239eab178a657e5001cec86fc7dcc09f6f10265d3
                                              • Instruction Fuzzy Hash: 45116331FC4208ABDB14EBB9A8C1AAEB3B4EB54744F102065F620F7352DA70AF444755
                                              APIs
                                              • KiUserExceptionDispatcher.NTDLL(40010005,00000000,00000000,00000000,?,?,8E857614,?,?), ref: 00E51FA8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: DispatcherExceptionUser
                                              • String ID:
                                              • API String ID: 6842923-0
                                              • Opcode ID: 91d10146cf57147e7acfd8892ed0e96c1f0319a2abbeac89c3405e1d6b3dd99a
                                              • Instruction ID: db6f4a0b3b44c6500341ef74badae529f6bd3b9d274db9eada67f896fab65dbf
                                              • Opcode Fuzzy Hash: 91d10146cf57147e7acfd8892ed0e96c1f0319a2abbeac89c3405e1d6b3dd99a
                                              • Instruction Fuzzy Hash: 4251DEB4D042489BCB14CFA8D981ADDBBF4FF08320F245269E819BB350E7716A45CF68
                                              APIs
                                              • _Cnd_do_broadcast_at_thread_exit.MSVCP140 ref: 00E6350C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Cnd_do_broadcast_at_thread_exit
                                              • String ID:
                                              • API String ID: 2632783013-0
                                              • Opcode ID: 9aa496a4fa47f4649411d94625ac6f410bd281405fde0a19277ef158a0440c8e
                                              • Instruction ID: d2b60f1b188900fc911f6d9defabe3fe50e4f4b9d55675212f27ec63cfc95cf2
                                              • Opcode Fuzzy Hash: 9aa496a4fa47f4649411d94625ac6f410bd281405fde0a19277ef158a0440c8e
                                              • Instruction Fuzzy Hash: 48F031759441099FCB04DFA8ED41BAAB7B4FB04714F10456AE815E7391DB356A05CB50
                                              APIs
                                              • _Cnd_do_broadcast_at_thread_exit.MSVCP140(?,?,Function_0009D160,000000FF), ref: 00E6349D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Cnd_do_broadcast_at_thread_exit
                                              • String ID:
                                              • API String ID: 2632783013-0
                                              • Opcode ID: 45d633329d3625a685a96a518ecd143a60a60a0ddfbf8857d78a352551e7fde3
                                              • Instruction ID: 8499851d4d45dd2e24a4ed391c3bdb0b0c37a1bc8498ad8fcc67899fa2be102c
                                              • Opcode Fuzzy Hash: 45d633329d3625a685a96a518ecd143a60a60a0ddfbf8857d78a352551e7fde3
                                              • Instruction Fuzzy Hash: B1F0AE36A45A549FC311DF59DC01F96B3E8FB09B10F00852AFD11E3780DB356D0486D0
                                              APIs
                                              • CloseHandle.KERNELBASE(DEADBEEF,?,?,8E857614,?,?), ref: 00E50DF7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: d6444efcbd08e6b08d210bc423b305ad3e74dcfa2258a55a4ac64d4a405e1853
                                              • Instruction ID: 31f86f52b3d547c2d49e326539f4fe543fa12fa2c85674adcf574260e1b4d7f5
                                              • Opcode Fuzzy Hash: d6444efcbd08e6b08d210bc423b305ad3e74dcfa2258a55a4ac64d4a405e1853
                                              • Instruction Fuzzy Hash: D231F0B5D042089FCB10CF98E981ADEBBF4FB09324F24526AE855B7350E7316A058FA4
                                              APIs
                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00E50FAB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FreeVirtual
                                              • String ID:
                                              • API String ID: 1263568516-0
                                              • Opcode ID: 40362204f93e5ede287aa980398011c62a7534763a09e8c90a2e312507045390
                                              • Instruction ID: e0634f5df9bd6277cfc51afa375616998e779d7b543b205eaa46afdb2161ccf1
                                              • Opcode Fuzzy Hash: 40362204f93e5ede287aa980398011c62a7534763a09e8c90a2e312507045390
                                              • Instruction Fuzzy Hash: 1EE03075E092488FDB14CF9494527EDB770EB48720F208299ED223B281C63519158BA0
                                              APIs
                                              • memchr.VCRUNTIME140(?,0000003D,?), ref: 00E3B847
                                              • memchr.VCRUNTIME140(?,0000003D,?), ref: 00E3B946
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(sessionid,00000009,?,?), ref: 00E3BB56
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(ownerid), ref: 00E3BBDB
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(app), ref: 00E3BC60
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(name), ref: 00E3BCE5
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(key), ref: 00E3BD6A
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(username), ref: 00E3BDEF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(password), ref: 00E3BE74
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(contents), ref: 00E3BEF9
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(secret), ref: 00E3BF7E
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(version), ref: 00E3C003
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(fileid), ref: 00E3C088
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(webhooks), ref: 00E3C10D
                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,00000007,sessionid,00000009,?), ref: 00E3C153
                                              • PathFindFileNameW.SHLWAPI(?), ref: 00E3C160
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000007,?,00000006,?,00000008), ref: 00E3C36F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn$FileNamememchr$FindModulePathmallocmemmove
                                              • String ID: /$Pn.$\Debug$\Debug\$\KeyAuth$app$contents$fileid$key$name$ownerid$password$secret$sessionid$username$version$webhooks$=u$H\
                                              • API String ID: 3080763380-2137530013
                                              • Opcode ID: 180843a523d2fcf4dcb38f15bf42082f5ebddb043e1c52042b7f5669929631d2
                                              • Instruction ID: dd29de37e9bdbcf783cb91ecb3f4ec8154551a35317d42ba2ab4bbd2c0421ae5
                                              • Opcode Fuzzy Hash: 180843a523d2fcf4dcb38f15bf42082f5ebddb043e1c52042b7f5669929631d2
                                              • Instruction Fuzzy Hash: F4A28C30D012688ADB29DB24DC99BEDBBB4AF55304F2092D9E54A77292EB745FC4CF10
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,00000000,00030000,00003000,00000004,?,?,00000000), ref: 00E2E89A
                                              • VirtualProtectEx.KERNEL32(?,00000000,00030000,00000040,?,?,00000000,00030000,00003000,00000004,?,?,00000000), ref: 00E2E8B9
                                              • WriteProcessMemory.KERNEL32(?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000,00030000,00003000,00000004,?), ref: 00E2E8FF
                                              • WriteProcessMemory.KERNEL32(?,?,?,?,00000000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2E93D
                                              • VirtualAllocEx.KERNEL32(?,00000000,0000001C,00003000,00000004,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2E969
                                              • WriteProcessMemory.KERNEL32(?,00000000,?,0000001C,00000000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2E982
                                              • VirtualAllocEx.KERNEL32(?,00000000,00001000,00003000,00000040,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2E99F
                                              • WriteProcessMemory.KERNEL32(?,00000000,00E2ED10,00001000,00000000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2E9BC
                                              • CreateRemoteThread.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E2E9D5
                                              • CloseHandle.KERNEL32(00000000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000,00030000,00003000,00000004), ref: 00E2E9E4
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00E2EA0C
                                              • ReadProcessMemory.KERNEL32(?,?,?,0000001C,00000000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?), ref: 00E2EA3A
                                              • Sleep.KERNEL32(0000000A,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000,00030000,00003000,00000004), ref: 00E2EA51
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(01400000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000,00030000,00003000,00000004), ref: 00E2EA5F
                                              • memset.VCRUNTIME140(00000000,00000000,01400000,00000000), ref: 00E2EA7D
                                              • WriteProcessMemory.KERNEL32(?,?,00000000,00001000,00000000,?,?,?,00000000), ref: 00E2EA93
                                              • WriteProcessMemory.KERNEL32(?,?,00000103,00000000,00000000,?,?,?,00000000), ref: 00E2EB6A
                                              • VirtualProtectEx.KERNEL32(?,?,?,00000002,00000000,?,?,?,00000000), ref: 00E2EBE0
                                              • VirtualProtectEx.KERNEL32(?,?,?,00000002,?,?,?,?,00000000), ref: 00E2EC0E
                                              • WriteProcessMemory.KERNEL32(?,?,00000103,00001000,00000000,?,?,?,00000000), ref: 00E2EC23
                                              • VirtualFreeEx.KERNEL32(?,?,00000000,00008000,?,?,?,00000000), ref: 00E2EC38
                                              • VirtualFreeEx.KERNEL32(?,?,00000000,00008000,?,?,?,00000000), ref: 00E2EC45
                                              • VirtualFreeEx.KERNEL32(?,?,00000000,00008000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000), ref: 00E2EC6E
                                              • VirtualFreeEx.KERNEL32(?,00000000,00000000,00008000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000), ref: 00E2EC7B
                                              • VirtualFreeEx.KERNEL32(?,00000000,00000000,00008000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000), ref: 00E2EC89
                                              • VirtualFreeEx.KERNEL32(?,?,00000000,00008000,?,?,00EFA688,00001000,00000000,?,00000000,00030000,00000040,?,?,00000000), ref: 00E2ECEC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Virtual$Process$Memory$Write$Free$AllocProtect$CloseCodeCreateExitHandleReadRemoteSleepThreadmallocmemset
                                              • String ID: .pdata$.reloc$.rsrc$@@@
                                              • API String ID: 2738092353-1643141565
                                              • Opcode ID: ca90f68a2c43816c3a6cf0b7c7e440eedc50db72996548edf33e502ffe7aa8c8
                                              • Instruction ID: ea1ede3360831a885f86ac545c51d95a0a9d723b796c296377da9bec48ef6019
                                              • Opcode Fuzzy Hash: ca90f68a2c43816c3a6cf0b7c7e440eedc50db72996548edf33e502ffe7aa8c8
                                              • Instruction Fuzzy Hash: DAE1C371A40234AFDB208BE5DC41FAEBBB9BF45704F185059FA05BB281D776AC05CB54
                                              APIs
                                              • _dclass.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,00000000), ref: 00E46E52
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000), ref: 00E47231
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000), ref: 00E47247
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E472C0
                                              • __std_exception_destroy.VCRUNTIME140(?,00000000,object key,0000000A), ref: 00E473A3
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E473B9
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(?,?,?,?,?,?,?,?,00000000), ref: 00E47412
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000), ref: 00E47591
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000), ref: 00E475A7
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,00000000), ref: 00E47720
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,00000000), ref: 00E47E89
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E47E9F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$Xbad_function_call@std@@_dclass_invalid_parameter_noinfo_noreturn
                                              • String ID: array$number overflow parsing '$object$object key$object separator$value
                                              • API String ID: 2454285746-2528100155
                                              • Opcode ID: 63a692b39293b84b8c8092222144b92e89c8a27d28c697f713c87db5dbe3c158
                                              • Instruction ID: 1a067ba762eaec9556c687ee62fa000d23cd447ff10ffc3c6b39351ce9ff5a2e
                                              • Opcode Fuzzy Hash: 63a692b39293b84b8c8092222144b92e89c8a27d28c697f713c87db5dbe3c158
                                              • Instruction Fuzzy Hash: 57C20571E042188FDB18CF68EC84BEEBBB5EF45304F145299E449F7682D770AA85CB91
                                              APIs
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,D7C8C78D,?,00000001,8E857614,00000000,00000000), ref: 00E35AD6
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E3AC20: memmove.VCRUNTIME140(?, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3ACC1
                                                • Part of subcall function 00E3AC20: system.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000011,00000000, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3AD26
                                              • memmove.VCRUNTIME140(?,00E6042A,00EBDAF9,?,00000000,?,D7C8C78D,?,00000001,8E857614,00000000,00000000), ref: 00E35B33
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                                • Part of subcall function 00E3F790: memmove.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,00E324D2,?,?,00000000,00000000,?,?,0000000F,00000000), ref: 00E3F7CF
                                              • memmove.VCRUNTIME140(00000000,?,?,00000000), ref: 00E35C03
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,00000000), ref: 00E35FE5
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,00000000,DDDEC9C6,?,00000001), ref: 00E3613A
                                              • memset.VCRUNTIME140(?,00000000,000000B0,00000000,?,00000000,DDDEC9C6,?,00000001), ref: 00E36173
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(DDDEC9C6,?,00000001), ref: 00E36195
                                              • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140(?,00000000), ref: 00E361B8
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,00000001), ref: 00E361F2
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z.MSVCP140(Function_0000F740), ref: 00E362A0
                                              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(CBDDD5DF,00000002,00000000), ref: 00E362BD
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(?), ref: 00E362E2
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00E3639D
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F), ref: 00E4382F
                                                • Part of subcall function 00E43770: memmove.VCRUNTIME140(?,?,DCC8DA8D,?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D), ref: 00E43840
                                                • Part of subcall function 00E3AC20: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3AD97
                                                • Part of subcall function 00E3AC20: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3ADD1
                                                • Part of subcall function 00E41600: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00000000,00F260AC), ref: 00E417BF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(CDCED9D8,?,00000001,00000000,?,message,success,?), ref: 00E365AB
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,message,success,?), ref: 00E366F3
                                              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(CDCED9D8,?,00000001,00000000,?,message,success,?), ref: 00E36769
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E36775
                                                • Part of subcall function 00E63F3B: _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F43
                                                • Part of subcall function 00E63F3B: _CxxThrowException.VCRUNTIME140(?,00ED5CAC,?), ref: 00E64ABF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3688E
                                              Strings
                                              • Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: , xrefs: 00E363E4
                                              • message, xrefs: 00E36428
                                              • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00E3591E
                                              • success, xrefs: 00E36412
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn$memmove$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?setw@std@@D@std@@@1@@ExceptionJ@1@_Smanip@_ThrowU?$_V21@@V?$basic_streambuf@Vios_base@1@_callnewhmallocmemsetsystem
                                              • String ID: Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions$message$success
                                              • API String ID: 3384273977-4017831015
                                              • Opcode ID: db907025ae1701a38a0c077324d0728891274155b550c62d6b261bbe8eb43c10
                                              • Instruction ID: fe12a62cb8085241b781b02767a4bbfd51616031333c79b763bff3e1378f21d4
                                              • Opcode Fuzzy Hash: db907025ae1701a38a0c077324d0728891274155b550c62d6b261bbe8eb43c10
                                              • Instruction Fuzzy Hash: 28A2BD71D002589FDB29CB24DC88BEDBBB1AF46304F1482D9E049BB292DB759E85CF51
                                              APIs
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E3AC20: memmove.VCRUNTIME140(?, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3ACC1
                                                • Part of subcall function 00E3AC20: system.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000011,00000000, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3AD26
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,CCC8DB8D,?,00000001,?,?,?,8E857614,?,00F26E10), ref: 00E39242
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                                • Part of subcall function 00E34C10: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,C0DAC38D,C0DAC396,?,8E857614,?,00000000,?,?,?,?,?,?,C0DAC38D), ref: 00E34CFC
                                                • Part of subcall function 00E3F790: memmove.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,00E324D2,?,?,00000000,00000000,?,?,0000000F,00000000), ref: 00E3F7CF
                                              • memmove.VCRUNTIME140(?,?,?,?,00000000,?,CCC8DB8D,?,00000001,?,?,?,8E857614,?,00F26E10), ref: 00E39297
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,C0C2CF8D,?,?,?,?,00000001,?,?,?,8E857614,?,00F26E10), ref: 00E39462
                                              • memmove.VCRUNTIME140(00000000,?,?,?,00000000,00000000,C0C2CF8D,?,?,?,?,00000001,?,?,?,8E857614), ref: 00E394BF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000001,?,?,?,8E857614,?,00F26E10), ref: 00E399D2
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,00000000,DDDEC9C6,?,00000001), ref: 00E39B49
                                              • memset.VCRUNTIME140(?,00000000,000000B0,00000000,?,00000000,DDDEC9C6,?,00000001), ref: 00E39B82
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(DDDEC9C6,?,00000001), ref: 00E39BA4
                                              • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140(?,00000000), ref: 00E39BC8
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,00000001), ref: 00E39C02
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z.MSVCP140(Function_0000F740), ref: 00E39CC0
                                              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(CBDDD5DF,00000002,00000000), ref: 00E39CDD
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(?), ref: 00E39D02
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00E39DAB
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(00000100,00000100,00000018,00000000,00000000,?,message,success,?), ref: 00E3A265
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3A271
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3A427
                                              Strings
                                              • Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: , xrefs: 00E39DEE
                                              • message, xrefs: 00E39E39
                                              • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00E3901D
                                              • success, xrefs: 00E39E1D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: U?$char_traits@$D@std@@@std@@_invalid_parameter_noinfo_noreturnmemmove$??6?$basic_ostream@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?setw@std@@D@std@@@1@@J@1@_Smanip@_U?$_V21@@V?$basic_streambuf@Vios_base@1@mallocmemsetsystem
                                              • String ID: Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions$message$success
                                              • API String ID: 1312736169-4017831015
                                              • Opcode ID: cfab49da7678bd02debb818f06159c9efb6032f3977e544b5b74f26cd4e0032c
                                              • Instruction ID: 9f3dbbdcb649551e2ef633ceb15b7a9f6196790caa005ca6af4a7af0f4f60ca5
                                              • Opcode Fuzzy Hash: cfab49da7678bd02debb818f06159c9efb6032f3977e544b5b74f26cd4e0032c
                                              • Instruction Fuzzy Hash: 61D29A71D002588FDB29DB24DC88BEDBBB1AF45304F1482D9E449BB292DB749EC4DB91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,?,00EBDC34,00F26E10), ref: 00E36A4B
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E3AC20: memmove.VCRUNTIME140(?, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3ACC1
                                                • Part of subcall function 00E3AC20: system.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000011,00000000, && timeout /t 5",00000011,?,00EBE2C8,start cmd /C "color b && title Error && echo ,0000002D,?,00EBE2C8,8E857614,00000000), ref: 00E3AD26
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                                • Part of subcall function 00E34C10: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,C0DAC38D,C0DAC396,?,8E857614,?,00000000,?,?,?,?,?,?,C0DAC38D), ref: 00E34CFC
                                                • Part of subcall function 00E3F790: memmove.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,00E324D2,?,?,00000000,00000000,?,?,0000000F,00000000), ref: 00E3F7CF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00EBDC34,00F26E10), ref: 00E36D98
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,DDDEC9C6,?,00000001), ref: 00E36F06
                                              • memset.VCRUNTIME140(?,00000000,000000B0,00000000,?,?,DDDEC9C6,?,00000001), ref: 00E36F3F
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(DDDEC9C6,?,00000001), ref: 00E36F61
                                              • ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140(?,00000000), ref: 00E36F84
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,?,?,?,00000001), ref: 00E36FBE
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAVios_base@1@AAV21@@Z@Z.MSVCP140(Function_0000F740), ref: 00E37073
                                              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(DDC8DF8D,00000002,00000000), ref: 00E37090
                                              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z.MSVCP140(?), ref: 00E370B8
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00E3717F
                                                • Part of subcall function 00E41260: memmove.VCRUNTIME140(?,?,00E3AFF8,00000000,?,?,00E3AFF8,?,?), ref: 00E4128D
                                              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(00000000,?,message,success,?), ref: 00E372CD
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E372D9
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E373B3
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,8E857614), ref: 00E374BA
                                              Strings
                                              • Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: , xrefs: 00E371C6
                                              • message, xrefs: 00E3720A
                                              • You need to run the KeyAuthApp.init(); function before any other KeyAuth functions, xrefs: 00E3693E
                                              • success, xrefs: 00E371F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: U?$char_traits@$D@std@@@std@@memmove$_invalid_parameter_noinfo_noreturn$??6?$basic_ostream@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?setw@std@@D@std@@@1@@J@1@_Smanip@_U?$_V21@@V?$basic_streambuf@Vios_base@1@memsetsystem
                                              • String ID: Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Message: $You need to run the KeyAuthApp.init(); function before any other KeyAuth functions$message$success
                                              • API String ID: 2154783015-4017831015
                                              • Opcode ID: 903cba071934447c13d3a26ec7b79c37251dde1efc22c0ab46f204e9cad72816
                                              • Instruction ID: 08335d06f1170e2066bc59a5ca7dcadf06f17a4656e568886ddd290c72e3c7d6
                                              • Opcode Fuzzy Hash: 903cba071934447c13d3a26ec7b79c37251dde1efc22c0ab46f204e9cad72816
                                              • Instruction Fuzzy Hash: DC72BE71D002589FDB29DB24DC88BEDBBB1AF45304F1482D9E449BB292D771AE84CF91
                                              APIs
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,00000000), ref: 00E494AB
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E494C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy
                                              • String ID: array$object$object key$object separator$value
                                              • API String ID: 2453523683-2448007618
                                              • Opcode ID: 2ddaab02805e93b25e8d85d39bcf88c3f76832d32b0e7b48056f6e5c125a4f89
                                              • Instruction ID: e856b41b58206e61bc916a293d32bd2e0a2a63ce06d795035137bd01391aaa8a
                                              • Opcode Fuzzy Hash: 2ddaab02805e93b25e8d85d39bcf88c3f76832d32b0e7b48056f6e5c125a4f89
                                              • Instruction Fuzzy Hash: F282E671D002188FDB18CB68ED94BEDBBB5BF45304F148299E509BB782DB74AE84CB51
                                              APIs
                                              • VirtualAlloc.KERNEL32(00000000,00021200,00003000,00000004,8E857614), ref: 00E5398A
                                              • VirtualAllocEx.KERNEL32(?,00000000,00025000,00003000,00000040), ref: 00E53BC0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: ,,(>}W^$;6>>}W^$Eof$e4'3
                                              • API String ID: 4275171209-2422216670
                                              • Opcode ID: f9fad94d5ab8057b22d09507645ff611bf1c32f16e74b9284f7c7a4ec875bb65
                                              • Instruction ID: 2941eb2435b8004a34bf0087a4e74cdd651de3112d5552ca2518bfa3aa66423c
                                              • Opcode Fuzzy Hash: f9fad94d5ab8057b22d09507645ff611bf1c32f16e74b9284f7c7a4ec875bb65
                                              • Instruction Fuzzy Hash: 00034535E156148FDB06CF38C850AE8F7B1FF56349F15D35AE8017B2A2EB31A9868B40
                                              APIs
                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,000F003F,?,00000001), ref: 00E52983
                                              • GetLastError.KERNEL32 ref: 00E52994
                                                • Part of subcall function 00E4E970: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00E4E979
                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000024), ref: 00E52B49
                                              • CloseServiceHandle.ADVAPI32(?), ref: 00E52B5E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: OpenService$CloseErrorHandleLastManager__acrt_iob_func
                                              • String ID: VI@
                                              • API String ID: 1605991056-509713428
                                              • Opcode ID: b1ab93bbaaddf574122355c48923b235079ea0f8a82f6eedc48a3349e26a179b
                                              • Instruction ID: f1896790775aac90242add5230947f9099ed9a812eceb05be8e05e8419ce2e79
                                              • Opcode Fuzzy Hash: b1ab93bbaaddf574122355c48923b235079ea0f8a82f6eedc48a3349e26a179b
                                              • Instruction Fuzzy Hash: 32529EB4E06218EFCB14CF98E991A9DBBB2FF49314F245199E849BB351D7306A85CF40
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,00000000,00000014,00003000,00000040), ref: 00E53386
                                                • Part of subcall function 00E53550: Thread32First.KERNEL32(00000000,0000001C), ref: 00E53613
                                                • Part of subcall function 00E53550: Thread32Next.KERNEL32(00000000,0000001C), ref: 00E53640
                                              • OpenThread.KERNEL32(001FFFFF,00000000,00000000,?,00000000,00000014,00003000,00000040), ref: 00E533A7
                                              • SuspendThread.KERNEL32(00000000,?,00000000,00000014,00003000,00000040), ref: 00E533BE
                                              • GetThreadContext.KERNEL32(00000000,?,?,00000000,00000014,00003000,00000040), ref: 00E533D6
                                              • WriteProcessMemory.KERNEL32(?,00000000,00006660,00000003,00000000,?,00000000,00000014,00003000,00000040), ref: 00E53431
                                              • WriteProcessMemory.KERNEL32(?,00000003,00000068,00000005,00000000,?,00000000,00006660,00000003,00000000,?,00000000,00000014,00003000,00000040), ref: 00E53440
                                              • WriteProcessMemory.KERNEL32(?,00000008,000000E8,00000005,00000000,?,00000003,00000068,00000005,00000000,?,00000000,00006660,00000003,00000000), ref: 00E5344F
                                              • WriteProcessMemory.KERNEL32(?,0000000D,fa`f,00000003,00000000,?,00000008,000000E8,00000005,00000000,?,00000003,00000068,00000005,00000000), ref: 00E5345E
                                              • WriteProcessMemory.KERNEL32(?,00000010,000000E9,00000005,00000000,?,0000000D,fa`f,00000003,00000000,?,00000008,000000E8,00000005,00000000), ref: 00E5346D
                                              • SetThreadContext.KERNEL32(?,0001003F,?,00000010,000000E9,00000005,00000000,?,0000000D,fa`f,00000003,00000000,?,00000008,000000E8,00000005), ref: 00E5347D
                                              • ResumeThread.KERNEL32(?,?,00000010,000000E9,00000005,00000000,?,0000000D,fa`f,00000003,00000000,?,00000008,000000E8,00000005,00000000), ref: 00E53484
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: MemoryProcessThreadWrite$ContextThread32$AllocFirstNextOpenResumeSuspendVirtual
                                              • String ID: ?$`f$fa`f$h
                                              • API String ID: 3168608564-1748709450
                                              • Opcode ID: 78a7b7193904c711b213caa8d3f79b8cc75b20815b6ff081c528ed310281dcee
                                              • Instruction ID: 3b31a591a2779cbef6bc7d3822e664b592c13434674eff24ef70fcde2c4aa5ad
                                              • Opcode Fuzzy Hash: 78a7b7193904c711b213caa8d3f79b8cc75b20815b6ff081c528ed310281dcee
                                              • Instruction Fuzzy Hash: 5851A135A002199FDB25CF64CC84FBEBBB8EF45744F1441AAE915AB251D731AE09CF90
                                              APIs
                                              • GetCurrentProcess.KERNEL32(00000008,?,00000000,00F26E10), ref: 00E24388
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00E2438F
                                              • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00E244D4
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E244D9
                                              • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00E244F2
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E24500
                                              • ConvertSidToStringSidA.ADVAPI32(?,?), ref: 00E24637
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E24646
                                              • LocalFree.KERNEL32(00000000,00000000,?), ref: 00E2479F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E247A6
                                              • CloseHandle.KERNEL32(00000000), ref: 00E247B2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Tokenfree$InformationProcess$CloseConvertCurrentFreeHandleLocalOpenStringmalloc
                                              • String ID: ,$ ,$oqD\
                                              • API String ID: 753083310-193674564
                                              • Opcode ID: a5025aad2270711e4daf3eef0f735ab00341f2452b6e010b2237144705a4ed10
                                              • Instruction ID: 43dbb15df557d8b9eba0c5ad7dc70314eba0f3faca83e4854ae38b108f1d2aea
                                              • Opcode Fuzzy Hash: a5025aad2270711e4daf3eef0f735ab00341f2452b6e010b2237144705a4ed10
                                              • Instruction Fuzzy Hash: 93F1DDB8D052189FDB14CFA8E985AEDBBB1FF49304F245219E849B7351D7312A86CF44
                                              APIs
                                                • Part of subcall function 00E65030: AcquireSRWLockExclusive.KERNEL32(00F26C18,00E2BB06), ref: 00E65035
                                                • Part of subcall function 00E65030: ReleaseSRWLockExclusive.KERNEL32(00F26C18), ref: 00E65075
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E2BB32
                                              • GetUserNameA.ADVAPI32(?,?), ref: 00E2BBAC
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,8E857614,?), ref: 00E2C8F1
                                                • Part of subcall function 00E24350: GetCurrentProcess.KERNEL32(00000008,?,00000000,00F26E10), ref: 00E24388
                                                • Part of subcall function 00E24350: OpenProcessToken.ADVAPI32(00000000), ref: 00E2438F
                                                • Part of subcall function 00E2D9C0: memmove.VCRUNTIME140(?,?,?), ref: 00E2DA06
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,8E857614,?), ref: 00E2CE41
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 00E2D1C7
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?), ref: 00E2D32A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn$ExclusiveLockProcess$AcquireCurrentNameOpenReleaseTokenUsermemmove
                                              • String ID: 7<,{$_Vf=$_Vf=$et*|$oqD\$|3
                                              • API String ID: 1999400758-2244986176
                                              • Opcode ID: 36e8b715c6e94dbaee75e4960650afe42a7d8b189b6128b90e0c2de33572848b
                                              • Instruction ID: 5c52fb54482ba6b03aa068647beae95dcb94bc20382f7653749375fcf2d39231
                                              • Opcode Fuzzy Hash: 36e8b715c6e94dbaee75e4960650afe42a7d8b189b6128b90e0c2de33572848b
                                              • Instruction Fuzzy Hash: 0EA376B4D056688BDBA5CF18DD807A9BBB5AF89314F1051DA9A4DB7342DB302EC1CF18
                                              APIs
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,000F003F,00000000,00000000), ref: 00E24A04
                                              • memchr.VCRUNTIME140(?,00000049,?,?,?,?,?,?,?,F964096D), ref: 00E27779
                                              • memchr.VCRUNTIME140(00000001,00000049,?,?,?,?,?,?,?,?,?,?,F964096D), ref: 00E277F2
                                              • RegCreateKeyExA.ADVAPI32(80000001,?,00000000,00000000,00000000,000F003F,00000000,00000000,00000000), ref: 00E24A2A
                                                • Part of subcall function 00E2D9C0: memmove.VCRUNTIME140(?,?,?), ref: 00E2DA06
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 00E2802F
                                                • Part of subcall function 00E2DEC0: memchr.VCRUNTIME140 ref: 00E2DF08
                                                • Part of subcall function 00E2DEC0: memchr.VCRUNTIME140(00000001,?,?), ref: 00E2DF8B
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 00E27F66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memchr$_invalid_parameter_noinfo_noreturn$CreateOpenmallocmemmove
                                              • String ID: 7<,{$IP_PLACEHOLDER$user$et*|
                                              • API String ID: 4066840904-1141489582
                                              • Opcode ID: eddf52a749d3cacdefc4cd1cafdb42fbb0c7cd8225c2ae9b273808e4651de17b
                                              • Instruction ID: 18dfd214ce92fca2c95ec5dce3b3f7982cc0a0b6929fe037fafa53da52e2ba1c
                                              • Opcode Fuzzy Hash: eddf52a749d3cacdefc4cd1cafdb42fbb0c7cd8225c2ae9b273808e4651de17b
                                              • Instruction Fuzzy Hash: AA8376B8D053688BDB65CFA8D981ADCBBB1BF4A314F204199D94DBB351DB306A81CF44
                                              APIs
                                              • GetFileAttributesExW.KERNEL32(?,00000000,?,?), ref: 00E63C83
                                              • GetLastError.KERNEL32 ref: 00E63C8D
                                              • FindFirstFileW.KERNEL32(?,?), ref: 00E63CA4
                                              • GetLastError.KERNEL32 ref: 00E63CAF
                                              • FindClose.KERNEL32(00000000), ref: 00E63CBB
                                              • ___std_fs_open_handle@16.LIBCPMT ref: 00E63D74
                                              • ___std_fs_close_handle@4.MSVCPRT ref: 00E63E3B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorFileFindLast$AttributesCloseFirst___std_fs_close_handle@4___std_fs_open_handle@16
                                              • String ID:
                                              • API String ID: 3584187540-0
                                              • Opcode ID: c8fcd0832ba7bdeab51b06df33e7bdbf8589ec0a77bf080eb4c2c5a642056070
                                              • Instruction ID: 64bd48d92d7bb85d3f5973daa477a927f9cc505c57b4bce68bbbe57845004081
                                              • Opcode Fuzzy Hash: c8fcd0832ba7bdeab51b06df33e7bdbf8589ec0a77bf080eb4c2c5a642056070
                                              • Instruction Fuzzy Hash: 5471BF74A807199FCB20CF39EC85BA9B7B8BF053A4F145299E855F3281DB319E45CB60
                                              APIs
                                              • _dclass.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00E481E4
                                              • __std_exception_destroy.VCRUNTIME140 ref: 00E48BAC
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E48BC2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$_dclass
                                              • String ID: number overflow parsing '$object key
                                              • API String ID: 1615805995-1994755323
                                              • Opcode ID: 6a5b9de9faae578765ae16241f73c7c42af2eedfaa465da9d6eabe64d6e60889
                                              • Instruction ID: 024fca2fe57acb9d06ed79f8efc95083888d039e07862734d719b812ebe25be8
                                              • Opcode Fuzzy Hash: 6a5b9de9faae578765ae16241f73c7c42af2eedfaa465da9d6eabe64d6e60889
                                              • Instruction Fuzzy Hash: C402E171D002188FDB18CF68DD84BEDF7B1BF49304F149299E509BB682DB74AA84CB90
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,00000100,?,?,?,?), ref: 00E507B5
                                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,?,?,?), ref: 00E507DA
                                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E507DE
                                              • VerSetConditionMask.KERNEL32(00000000), ref: 00E507E2
                                              • VerifyVersionInfoW.KERNEL32(0000011C,00000023,00000000), ref: 00E50809
                                              • GetLastError.KERNEL32 ref: 00E50828
                                              • GetLastError.KERNEL32 ref: 00E508E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ConditionMask$ErrorLast$InfoVerifyVersionmemset
                                              • String ID: print
                                              • API String ID: 844649642-366378086
                                              • Opcode ID: 74135ec7abb86db334ca8524055b56ffe1bf12f7dc6ed6bac78471b612fe7dc4
                                              • Instruction ID: 4bb0c60eb849e357a5cc7512edb9c544a0d26c1850d9c1850d0184df805adf40
                                              • Opcode Fuzzy Hash: 74135ec7abb86db334ca8524055b56ffe1bf12f7dc6ed6bac78471b612fe7dc4
                                              • Instruction Fuzzy Hash: F9A1E274A042289BDB25CF28DC95BD9BBB4EF49304F0441DAE949AB351DB31AF85CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: %2lld.%0lldG$%2lld.%0lldM$%4lldG$%4lldM$%4lldP$%4lldT$%4lldk$%5lld
                                              • API String ID: 0-3476178709
                                              • Opcode ID: 5b7434464126aee10a0c572c76b316b1260a53e0e1728ebd35ad2f8f0480b0d6
                                              • Instruction ID: e9dde739ab473bb84c69ef267c69cb86aec5551366c6795525d952e09ca9cbbe
                                              • Opcode Fuzzy Hash: 5b7434464126aee10a0c572c76b316b1260a53e0e1728ebd35ad2f8f0480b0d6
                                              • Instruction Fuzzy Hash: 2B5137B27057051BE708A86DDD82B6BB1C9E786714F98193CB94EE73D2F1A9CC0143A6
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00E64AE1
                                              • memset.VCRUNTIME140(?,00000000,00000003), ref: 00E64B07
                                              • memset.VCRUNTIME140(?,00000000,00000050), ref: 00E64B91
                                              • IsDebuggerPresent.KERNEL32 ref: 00E64BAD
                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E64BC6
                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00E64BD0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterPresentUnhandledmemset$DebuggerFeatureProcessor
                                              • String ID:
                                              • API String ID: 1045392073-0
                                              • Opcode ID: 33669caeb57afb810501d6eb2afc7c3e59af4b07437c389058c6b111ca60656a
                                              • Instruction ID: 7e8d4cc38dde1082bed44a65cb05c3837f486a88323ca9eeb41192b8bb33a210
                                              • Opcode Fuzzy Hash: 33669caeb57afb810501d6eb2afc7c3e59af4b07437c389058c6b111ca60656a
                                              • Instruction Fuzzy Hash: 373129B5C05218DBDB20DFA5D949BCDBBF8BF08740F1051EAE40CAB291E7719A858F45
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00E5B057
                                                • Part of subcall function 00E4E970: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00E4E979
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLast__acrt_iob_func
                                              • String ID: @PG@Q5$XI3;$lp4<
                                              • API String ID: 220543977-3768292294
                                              • Opcode ID: 25302f3f98dd7e633421c68757d155674e0e22e0e49d4dd435b873032f99ab62
                                              • Instruction ID: 9429cc66c5fb5fcca474d2eebc8f1a04ca2231da85e053a7d0b3c51fe99fed62
                                              • Opcode Fuzzy Hash: 25302f3f98dd7e633421c68757d155674e0e22e0e49d4dd435b873032f99ab62
                                              • Instruction Fuzzy Hash: 8B021774A04229CFDB29CF08C890BA9B7B1BF48705F1995DDD9496B311DB71AE85CF80
                                              APIs
                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00E537E2
                                              • wcstombs.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,00000104), ref: 00E53813
                                              • strstr.VCRUNTIME140(?,?), ref: 00E53825
                                              • Process32NextW.KERNEL32(?,0000022C), ref: 00E5383F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Process32$FirstNextstrstrwcstombs
                                              • String ID:
                                              • API String ID: 2424144712-0
                                              • Opcode ID: b5967f46daa0bb1cfda0df64010834f3b70c337c09c099727aff5cd5725fde0a
                                              • Instruction ID: ef6a7a60c09c3a52a01c727453af0b3bfb0fc32b2d6d4dceff6ce4baba4bcda2
                                              • Opcode Fuzzy Hash: b5967f46daa0bb1cfda0df64010834f3b70c337c09c099727aff5cd5725fde0a
                                              • Instruction Fuzzy Hash: 4061D074A002198FCB29CF28C890AA9B3B5EF48758F1555DAE848AF351D731BF49CB80
                                              APIs
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E41035
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn
                                              • String ID: %.2X$\u%04x
                                              • API String ID: 3668304517-1814277092
                                              • Opcode ID: 017af0a7eb12726f92f7c6fba3fb96a1c0c6ada29c002fe339f9c3ba75746e3f
                                              • Instruction ID: 5a1c2d773d5c978f3e9425bdec70756f4e66be51bb197c036c4e2a3d60bdbdf3
                                              • Opcode Fuzzy Hash: 017af0a7eb12726f92f7c6fba3fb96a1c0c6ada29c002fe339f9c3ba75746e3f
                                              • Instruction Fuzzy Hash: C2B1E331E001159BCB24CF68E884ABEBBB1EF49304F1492BAE615FB251D736DA55CB90
                                              APIs
                                              • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,?,00000002,8E857614,?,00E2F623,?,8E857614), ref: 00E63EC3
                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,?,8E857614,00000000,00000000,?,?,00E2F623,?,8E857614), ref: 00E63EEA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FormatInfoLocaleMessage
                                              • String ID: !x-sys-default-locale
                                              • API String ID: 4235545615-2729719199
                                              • Opcode ID: e780a80b4f85c560d3e93a6b4f783614b1a9aab474991dccee99d7df95403f42
                                              • Instruction ID: 672d406a179a02080f2ffd24d0aa0e0fb7f7ff5700fec5e2b77affc50fa21cc0
                                              • Opcode Fuzzy Hash: e780a80b4f85c560d3e93a6b4f783614b1a9aab474991dccee99d7df95403f42
                                              • Instruction Fuzzy Hash: 26F03076654209FFEB049BD5DD0ADEB7AACEF097D5F005059B602E6041E2B2AF009770
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 1.C$\T\US[?$`|a{U
                                              • API String ID: 0-1763564542
                                              • Opcode ID: d59e1460f7568bf0ce4a7e1043cc66961fc436e1596cbfd245f6d663169eba69
                                              • Instruction ID: 33d93299decb74d49e79c0ce1b56ae4e0c02b53a06bbe6af497e4be30ba49d44
                                              • Opcode Fuzzy Hash: d59e1460f7568bf0ce4a7e1043cc66961fc436e1596cbfd245f6d663169eba69
                                              • Instruction Fuzzy Hash: 27124775D167498FEB02CF79D8013E9F7B5AFAB244F14D36AE80076262E731A6C68740
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: G'xC$hXMV$hXMV
                                              • API String ID: 0-3779631648
                                              • Opcode ID: dde45cd617de0a2239f28acbc8bac91d60940a11dbf30734da7b8d28e4a9b1aa
                                              • Instruction ID: 5a3087ccbc16180c524243c7dfcb0762cbd4ae7611809666337b7bb2a820a3dd
                                              • Opcode Fuzzy Hash: dde45cd617de0a2239f28acbc8bac91d60940a11dbf30734da7b8d28e4a9b1aa
                                              • Instruction Fuzzy Hash: F651DEB5D19658ABCB04CFA9E881ADDFBB4FF49310F14822AE855BB350E7306905CF54
                                              APIs
                                                • Part of subcall function 00E426A0: memmove.VCRUNTIME140(00000000,00000000,00E34792,?,00000000), ref: 00E4276D
                                              • ___std_fs_get_current_path@8.LIBCPMT ref: 00E31F82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ___std_fs_get_current_path@8memmove
                                              • String ID: .tex
                                              • API String ID: 2466531287-1946526065
                                              • Opcode ID: c2da73405d67c28765e21d70e3db928edfc84714f62fca9ad9b2075210bb57e0
                                              • Instruction ID: e27ef183e8a63d68828ba0ce992aa7d1d9e36b3edc67f7ff47c5999c431fe99e
                                              • Opcode Fuzzy Hash: c2da73405d67c28765e21d70e3db928edfc84714f62fca9ad9b2075210bb57e0
                                              • Instruction Fuzzy Hash: 47A1BCB0A043459FCB14CF28D9446AEFBF1FF88704F108A2EE595A7340E771A944CB91
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00E59B57
                                                • Part of subcall function 00E4E970: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00E4E979
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLast__acrt_iob_func
                                              • String ID: @PG@Q5
                                              • API String ID: 220543977-96674166
                                              • Opcode ID: 11280a67973e8b13d14f0d501413a210a9e7138309d4bfa70bdbdbc2b1e41239
                                              • Instruction ID: 386b8a1e9364ba603bafd693c555e6c825abaaca5ace70be16dc21c352dcd922
                                              • Opcode Fuzzy Hash: 11280a67973e8b13d14f0d501413a210a9e7138309d4bfa70bdbdbc2b1e41239
                                              • Instruction Fuzzy Hash: 2D02F434904229CBDB29CF08C890BA9B7B1FF49705F1595DDD94A6B352DB70AE85CF80
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00E5A9A7
                                                • Part of subcall function 00E4E970: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00E4E979
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLast__acrt_iob_func
                                              • String ID: @PG@Q5
                                              • API String ID: 220543977-96674166
                                              • Opcode ID: 04288e44315b914aedc960d53d3cc99a998770270238c570353776d751a50374
                                              • Instruction ID: 953dd8ac5dadc622a0ba1099a1e45ff52cbdbfacca97be4c05cdbbf1445d3c8e
                                              • Opcode Fuzzy Hash: 04288e44315b914aedc960d53d3cc99a998770270238c570353776d751a50374
                                              • Instruction Fuzzy Hash: D90207749002258FDB29CF08C8A0BA9B7B1FF49705F1996DED9496B311D731AE85CF80
                                              APIs
                                              • GetLastError.KERNEL32 ref: 00E567CC
                                                • Part of subcall function 00E4E970: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 00E4E979
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ErrorLast__acrt_iob_func
                                              • String ID: @PG@Q5
                                              • API String ID: 220543977-96674166
                                              • Opcode ID: bad08894396f49d8ba438af09204145d54a0ea2034c953143054f7f44954dfb6
                                              • Instruction ID: e299d34bdca22a5d29e013a18d7f453ab2c338fd2e4ccf2299099434e49cbda3
                                              • Opcode Fuzzy Hash: bad08894396f49d8ba438af09204145d54a0ea2034c953143054f7f44954dfb6
                                              • Instruction Fuzzy Hash: D7A1EF74905269CFEB29CF08C890BA9B7B1FF49305F0992DAD949AB351D730AE85CF40
                                              APIs
                                              • Thread32First.KERNEL32(00000000,0000001C), ref: 00E53613
                                              • Thread32Next.KERNEL32(00000000,0000001C), ref: 00E53640
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Thread32$FirstNext
                                              • String ID:
                                              • API String ID: 3555619780-0
                                              • Opcode ID: 48f28a18adb853a08e633cd58cf60cb48c68fc0cc268c68cd9b1b7b57c71bd85
                                              • Instruction ID: dbdfd6208577dd3621350285942cf683ea537697fc8114e6df653b8e75cbf36a
                                              • Opcode Fuzzy Hash: 48f28a18adb853a08e633cd58cf60cb48c68fc0cc268c68cd9b1b7b57c71bd85
                                              • Instruction Fuzzy Hash: A5518A34A002198FCB14CF68C4D0EA9F3F1EF49359B1965AED915AB322D731EE09CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5$\~`[
                                              • API String ID: 0-873556266
                                              • Opcode ID: 853f98cdf0b6e2da9c7d087e18ac91ffc44a2d237a5c92ea3672329f8b52ce1d
                                              • Instruction ID: 466cf0d60a11f29d64f1c4a0c714f651303b8a59b6c6b0d52d17245d759b6e07
                                              • Opcode Fuzzy Hash: 853f98cdf0b6e2da9c7d087e18ac91ffc44a2d237a5c92ea3672329f8b52ce1d
                                              • Instruction Fuzzy Hash: 95516C34A052258FDB29CF08C460BA5B7B1FF89709F1A55DEC98A6B351DB30AE45CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5$}Ej
                                              • API String ID: 0-3380338130
                                              • Opcode ID: f8897eddd327116d35c41f7bb53a33a19aafb1e4499931d04ca24409007d09d7
                                              • Instruction ID: bb2cb0dae1955399bd4500715f073c54b4a401c8c9e4f570ebfd1beaa72cdff6
                                              • Opcode Fuzzy Hash: f8897eddd327116d35c41f7bb53a33a19aafb1e4499931d04ca24409007d09d7
                                              • Instruction Fuzzy Hash: CA519A34A052258FCB28CF18C4A0B69B3F1FF49709F1A55DEC88A6B351DB30AD46CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: &o4M$@PG@Q5
                                              • API String ID: 0-1811181629
                                              • Opcode ID: f5d22ec8832411ff8ca78cd66323c65170111dd46c26011d3bd6239f08f3a36a
                                              • Instruction ID: 1801ee8c94ae2d9a486c70b7d498869797b3dab4582a4857f181dcd8cb859b4f
                                              • Opcode Fuzzy Hash: f5d22ec8832411ff8ca78cd66323c65170111dd46c26011d3bd6239f08f3a36a
                                              • Instruction Fuzzy Hash: BD513735A011258FDB28CF18C5A0AA5B7B1FF49709F1A55DAC84A6B362DB70AD45CB80
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(?), ref: 00E4ADC3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: ef729e633cecfbaaa0c92093d03fe6daabdf51af270874485d0ab7b815c1c0d9
                                              • Instruction ID: aeac3bf5ad0cd6207f220b6a1f4369e74b07723384b0f25a0555ef72f2f4323b
                                              • Opcode Fuzzy Hash: ef729e633cecfbaaa0c92093d03fe6daabdf51af270874485d0ab7b815c1c0d9
                                              • Instruction Fuzzy Hash: F6C16971E1065A9FCB05CFA8D4806ADFBF1FF59310F58926AE806EB345D730A944CB91
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(8E857614,?,00000000), ref: 00E4BA49
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: b68b0841467cc20ceb5f03667859402e101578d1eb187d59c0e68369633b0481
                                              • Instruction ID: bd376919cc5097c214e24518663715d153281e50dad3330ed62ccbfa5d9a41f9
                                              • Opcode Fuzzy Hash: b68b0841467cc20ceb5f03667859402e101578d1eb187d59c0e68369633b0481
                                              • Instruction Fuzzy Hash: 6BB15771A0465A8FCB15CFA8E480AADFBF1FF99300F549299E846EB345D730E940CB90
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(8E857614,?,00000000,?,?,?,?,?,?), ref: 00E4B400
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: 9859b71a9d20569e6d3b1f54cee8f82681533b7c7cc5b94c71edc0e89c544bf8
                                              • Instruction ID: aeb5dbd4d6592b7b777748b5ba2ac251d86d3e8dc0a9131a642d780784976ba8
                                              • Opcode Fuzzy Hash: 9859b71a9d20569e6d3b1f54cee8f82681533b7c7cc5b94c71edc0e89c544bf8
                                              • Instruction Fuzzy Hash: D4B14875A0465A8FCB15CFACD480AADFBF1BF99300F159699E846EB345E730E940CB90
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(8E857614,?,00000000,?,?,?,00EBF4DD,000000FF), ref: 00E4B720
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: b76717ada35e5838c855a710dad1f109d069ee4acf0d75f5c1a9f3bfcd2e5971
                                              • Instruction ID: 3df6d0a0c37e97e7665409df1369cf1cac8e1afa5291dc483914c0297adadbb6
                                              • Opcode Fuzzy Hash: b76717ada35e5838c855a710dad1f109d069ee4acf0d75f5c1a9f3bfcd2e5971
                                              • Instruction Fuzzy Hash: 1BB16875A046098FCB18CF68E480AADFBF1FF99300F55969AE846EB345D730E840CB90
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(8E857614,?,00000000), ref: 00E4B0DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: 47bb1c55640209324df09a0eaff1ac8b298f6f91e741f16437b0ec5224e6176b
                                              • Instruction ID: 922a3b2cd7e0f7b00cdecb8626f5c34e75f9b2fe3226b33b17d8b2ab0c3c480a
                                              • Opcode Fuzzy Hash: 47bb1c55640209324df09a0eaff1ac8b298f6f91e741f16437b0ec5224e6176b
                                              • Instruction Fuzzy Hash: 69B15771A0064A8FCB05CFA8D890AADFBF1BF99300F149659E856FB355D770E940CB94
                                              APIs
                                              • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(00000000,8E857614,?,00000000), ref: 00E4BD70
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Xbad_function_call@std@@
                                              • String ID:
                                              • API String ID: 1029415015-0
                                              • Opcode ID: d8978391332b5ffd58931d5f5f1d39307d0c1296fc37ab37e4da988342d05f95
                                              • Instruction ID: e2c338c681c3e0242e5df8f72d84d825a012dcd5a06c98b1084ad472798cba73
                                              • Opcode Fuzzy Hash: d8978391332b5ffd58931d5f5f1d39307d0c1296fc37ab37e4da988342d05f95
                                              • Instruction Fuzzy Hash: D2B15771A0064ACFCB04CFA8D890AADFBF1BF89300F549699E806EB345D730E945CB90
                                              APIs
                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00E64779
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: FeaturePresentProcessor
                                              • String ID:
                                              • API String ID: 2325560087-0
                                              • Opcode ID: edd84bd098547ceed6aa140cea3f23ac023b666a420ed645b291f6632da4d204
                                              • Instruction ID: e0193f71d262268a5bfa2b534fade10057416a64ac3d7838b8d6c8f26c0d4e4c
                                              • Opcode Fuzzy Hash: edd84bd098547ceed6aa140cea3f23ac023b666a420ed645b291f6632da4d204
                                              • Instruction Fuzzy Hash: D2A18EB1A41615DFDB18CF96FC816A9BBB0FB88324F24912BE425FB2A1D3749844CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0a77085fcb5963fc2eef8a5b5570297ae71cff60d99f716f1182e5039cdd7ab5
                                              • Instruction ID: 035a704d7ff418ba2b4fa2cd4d58239e21c61be45c4e5fc1b9e067c8dc250774
                                              • Opcode Fuzzy Hash: 0a77085fcb5963fc2eef8a5b5570297ae71cff60d99f716f1182e5039cdd7ab5
                                              • Instruction Fuzzy Hash: BCE10572E046298FDF08CF99D8915EEBBB2FBD8314B1A826DD85677344CA306D05CB90
                                              APIs
                                              • BCryptGenRandom.BCRYPT(00000000,?), ref: 00E8F9E0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CryptRandom
                                              • String ID:
                                              • API String ID: 2662593985-0
                                              • Opcode ID: 9ac035f5276f6cc66017e2bf61d3e5b74974bd8de2fa688597ab63d23b058e58
                                              • Instruction ID: ae004d5b13e6b7d4c8d5f55d0995998ffb90ca5615869ef623a82be1e097106c
                                              • Opcode Fuzzy Hash: 9ac035f5276f6cc66017e2bf61d3e5b74974bd8de2fa688597ab63d23b058e58
                                              • Instruction Fuzzy Hash: 4B1159722043459AE710DE69ED40B27B7D8EBD1368F5459BBF54CF3281D721C8058761
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,000002C8,?,?), ref: 00E51BFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memset
                                              • String ID:
                                              • API String ID: 2221118986-0
                                              • Opcode ID: 9a332d5ccb39b31cb3c07e963da58901ca102ffeabde6946e2ae708c1dc46185
                                              • Instruction ID: ca065d0d937a931fd0026360565fdc75c34f6218475cf8a80314dbf1644cb4b9
                                              • Opcode Fuzzy Hash: 9a332d5ccb39b31cb3c07e963da58901ca102ffeabde6946e2ae708c1dc46185
                                              • Instruction Fuzzy Hash: 31C13574A412698FCB29CF18C898BA8B7B4FF48305F1455EAD849BB351DB70AE85CF44
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: 178d246145e9492539196281bd346b379594bcd008dd0f5f7fe5a4bcb66189c5
                                              • Instruction ID: d949d3cbe2bc3f7a455b8d762363e664bb8a9873aeebf4f11922450b69984846
                                              • Opcode Fuzzy Hash: 178d246145e9492539196281bd346b379594bcd008dd0f5f7fe5a4bcb66189c5
                                              • Instruction Fuzzy Hash: 5EB122359166558FDB16CF35C860BA4F3F0FF66245F1593DAD8087B262EB30AA86CB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 908d1136104204d679281c92e3c4dad7694b61311362a5b44d9880609a68f6ff
                                              • Instruction ID: c027b9f7040a3618437aab4764243b27d28850f2b43ffe3d3901aaff1ae5b201
                                              • Opcode Fuzzy Hash: 908d1136104204d679281c92e3c4dad7694b61311362a5b44d9880609a68f6ff
                                              • Instruction Fuzzy Hash: AD715DB1E0111A9FCB18CFA9D8416AEF7B2FF89300F55926AD915F7344E730AA10CB85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: null
                                              • API String ID: 0-634125391
                                              • Opcode ID: 68ed8d74ee69e0ed852d4dc135833fe056176e27a69c4c8dfed0f026e6eb741a
                                              • Instruction ID: 338ad7c71f716d45709b1e29ce88d37cbc513184496384f916cc919cc73a4e8d
                                              • Opcode Fuzzy Hash: 68ed8d74ee69e0ed852d4dc135833fe056176e27a69c4c8dfed0f026e6eb741a
                                              • Instruction Fuzzy Hash: 125180B1B005189BCF24EFB8F4527ADB3F5DF49314F40619EF92AAB6C2CA755A048781
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: 2580cc0a61de09f105fb54eea51c9a61cc73ab16632cc1af6ff748391640c2b6
                                              • Instruction ID: c1712d9f737a3705edb3cf1d5f287624ed9f227e008358dfb271cefd8a52202b
                                              • Opcode Fuzzy Hash: 2580cc0a61de09f105fb54eea51c9a61cc73ab16632cc1af6ff748391640c2b6
                                              • Instruction Fuzzy Hash: E3714C34A002258FCB29CF08C5A0AA9B7B1FF49709F1A95DEC94A7B311DB30AD45CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: 9108faa47032647dbbf3373e1363a1aa42a01a3f905a45aa17ab3dff672c65b6
                                              • Instruction ID: 6db67df9cf155beb99995668c36603b307890f230f88d77178add9ad01f35c52
                                              • Opcode Fuzzy Hash: 9108faa47032647dbbf3373e1363a1aa42a01a3f905a45aa17ab3dff672c65b6
                                              • Instruction Fuzzy Hash: A6515D349051258FDB29CF08C4A0BA5B7B1FF49709F1A95DEC98A6B361EB31AD45CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: 365e402604e17aeb270c654bc910ce1873e111d4f9b8c8512d2125bcf6925df0
                                              • Instruction ID: e4cfd204d5a2678304dc494f3837c80ee7d7d639478a6a863c2584eb06bf461a
                                              • Opcode Fuzzy Hash: 365e402604e17aeb270c654bc910ce1873e111d4f9b8c8512d2125bcf6925df0
                                              • Instruction Fuzzy Hash: 98516B34A052258FDB29CF04C4A0BA5B7B1FF49709F1A55DEC98A6B351DB31AD45CF80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: a3870ce17df2e2ddc0515a962fdffb51c44dba0811bc97de96b9dd29fcc14448
                                              • Instruction ID: 7541b8dcbddf8fbb25f3277009a478a3554c212e3d822bbec7b84ef5cea6613e
                                              • Opcode Fuzzy Hash: a3870ce17df2e2ddc0515a962fdffb51c44dba0811bc97de96b9dd29fcc14448
                                              • Instruction Fuzzy Hash: AF515C34A012258FDB28CF08C4A0B79B7B1FF49709F1A95DEC95A6B352DB31AD45CB80
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: @PG@Q5
                                              • API String ID: 0-96674166
                                              • Opcode ID: 36726b5435061ce296d9d789d77b631582cfec22cbac6e2e363a3b41982e9e6a
                                              • Instruction ID: c6ddfd647aee1bbc7e45c51082fe2867706a256757d4dfb161f9a646354c3643
                                              • Opcode Fuzzy Hash: 36726b5435061ce296d9d789d77b631582cfec22cbac6e2e363a3b41982e9e6a
                                              • Instruction Fuzzy Hash: AB517A35A005258FDB29CF08C4A0BA5B7B1FF49709F1A95DEC84A6B312DB31AE45CF80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 01def42dd6ca1105f64d7c652b82dd057e89b74811c95c3d8bcef13947a58aae
                                              • Instruction ID: 0b1d335a5b7caf5f6579115c34d6af1b37c8508cfafb34ee706fa9bf5f4b38b4
                                              • Opcode Fuzzy Hash: 01def42dd6ca1105f64d7c652b82dd057e89b74811c95c3d8bcef13947a58aae
                                              • Instruction Fuzzy Hash: 0822EFB1A083418FC714EF18D48036AFBE1FF88354F54596EEA9EA7381E735D9458B82
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a6f33583e4855e455d30f219b2aa449d9c1ca3f6d6f40a1d767f5497d444547f
                                              • Instruction ID: 4069fd479909d88c53f5a804913066f1ff8ad26b52b207e4c14335e3f2b46011
                                              • Opcode Fuzzy Hash: a6f33583e4855e455d30f219b2aa449d9c1ca3f6d6f40a1d767f5497d444547f
                                              • Instruction Fuzzy Hash: C3A18F71A0424A8FCB09CF68E4806ADFBF1FF99310F5992A9E845FB345D730A841CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 976b439138cae4aff959418f3a7e28305ee8c5c0296ec256efeb98879b84d72e
                                              • Instruction ID: a6ed0da940d3a7414e56ce10e1256ac806d86e329481a3757c36b43714b8a46d
                                              • Opcode Fuzzy Hash: 976b439138cae4aff959418f3a7e28305ee8c5c0296ec256efeb98879b84d72e
                                              • Instruction Fuzzy Hash: 97512D72E0051A9FCB04CFA9D980AAEB7F5FB48310F55926AE815F7741E731AD10CB94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc4413aa54db0751eae914992ab68d472a66c5de46c0ce382f3ee32c2b4c9ab2
                                              • Instruction ID: 7d98f8a0ae296f0345e7a10ab75207d7eb2ced08b442200ec1885e21af452d3b
                                              • Opcode Fuzzy Hash: bc4413aa54db0751eae914992ab68d472a66c5de46c0ce382f3ee32c2b4c9ab2
                                              • Instruction Fuzzy Hash: 7671BFB5E002189FCB48CFA9D9856ADFBF1FF4C310B1581AAE819E7305D734AA518F94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 92cd6d70b484a2e5ff47d394f83d7b7b2b14b3a3b505d54de5a58e292943b035
                                              • Instruction ID: 0c851d4ee713caf2418538201c199cca556c1ec5118760ab00bde92c918c2e58
                                              • Opcode Fuzzy Hash: 92cd6d70b484a2e5ff47d394f83d7b7b2b14b3a3b505d54de5a58e292943b035
                                              • Instruction Fuzzy Hash: 3E2189386045118FCB28CF08C8A0E65B3B2FF95309F5995DDC8496B362DB32AD4ACB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                              • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                              • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                              • Instruction Fuzzy Hash:
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E76658
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000088,00000000), ref: 00E7667A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E76690
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E766B8
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?), ref: 00E76758
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00E7676E
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000), ref: 00E7678A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?), ref: 00E767CA
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00E767E0
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E767F6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 00E7680C
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?), ref: 00E76822
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00E76838
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E7684E
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E76864
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E7687A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E76890
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E768A6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E768BC
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?), ref: 00E768D2
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E768E8
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E76909
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,00000000,00000D30), ref: 00E76935
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 2cb89759e26d0888ecdc510e48b2a8a87ad25f3b84b4cd88a4214346ccffda09
                                              • Instruction ID: 7e485f2aa18264ef7eab8800c31b7c2270924a57864c551cdda3e7abda451dc4
                                              • Opcode Fuzzy Hash: 2cb89759e26d0888ecdc510e48b2a8a87ad25f3b84b4cd88a4214346ccffda09
                                              • Instruction Fuzzy Hash: 2A812C70601A02BFEB496FB5EC49BD9FBA5FF04309F005216F52C651A2CB766068DBE1
                                              APIs
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CDE3
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CE7B
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CE9E
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CEB1
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CEEF
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CF4D
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CF74
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CF87
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8CFD9
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8D0EB
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8D0F7
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8D11D
                                              • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,%3lld %s %3lld %s %3lld %s %s %s %s %s %s %s,?,?,00000000,?,?,00000000,?,?,00000000,?,?,00000000), ref: 00E8D214
                                              Strings
                                              • %3lld %s %3lld %s %3lld %s %s %s %s %s %s %s, xrefs: 00E8D1FE
                                              • ** Resuming transfer from byte position %lld, xrefs: 00E8CE0E
                                              • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00E8CE21
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$fflush
                                              • String ID: %3lld %s %3lld %s %3lld %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %lld
                                              • API String ID: 1893817590-1872798829
                                              • Opcode ID: 54caa27b5828a995c160e64cbe2a6835ea067bb90953e0d78ad24f49b803acf9
                                              • Instruction ID: 1bb2a29eb919115680338f471214d470efc97332daa91179c34b2756ce5295f1
                                              • Opcode Fuzzy Hash: 54caa27b5828a995c160e64cbe2a6835ea067bb90953e0d78ad24f49b803acf9
                                              • Instruction Fuzzy Hash: 0ED16F75A08705AFD321AB64CC81FABB7EAFF88304F10691DFA9DA2251D735B8018F51
                                              APIs
                                              • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(# Your alt-svc cache. https://curl.se/docs/alt-svc.html# This file was generated by libcurl! Edit at your own risk.,?,000006E0), ref: 00E8003D
                                              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00000088), ref: 00E8019C
                                              • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?), ref: 00E801CC
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000006E0), ref: 00E801DA
                                              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000088), ref: 00E80202
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: fclose$_unlinkfputsfree
                                              • String ID: # Your alt-svc cache. https://curl.se/docs/alt-svc.html# This file was generated by libcurl! Edit at your own risk.$%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %d$(O$(O$,O$,O$xX$xX$|X$|X
                                              • API String ID: 549198444-664595106
                                              • Opcode ID: 602c0cf03fdd60062d921888df92ae555307feb1377598d690df6078eeff3b7b
                                              • Instruction ID: 6e778fce0a459e632720c83ec2a2f1f910b1c28f207efa86bee39ea52f758a04
                                              • Opcode Fuzzy Hash: 602c0cf03fdd60062d921888df92ae555307feb1377598d690df6078eeff3b7b
                                              • Instruction Fuzzy Hash: D961C1B2605300AFDB109F94DD45A2BB7E5FF84358F00292DF99EE2211E732E959CB52
                                              APIs
                                              • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000088,00000088,?,?,?,?,?,?,?,?,?,?,00E70088,?), ref: 00E6E763
                                              • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(# Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.,?,?,?,00000088,00000088,?), ref: 00E6E7A2
                                              • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,?,?,?,?,?,00000088,00000088,?), ref: 00E6E7C1
                                              • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(00000000,00000000,00000004,00E6E9D0,?,?,?,?,?,?,00000088,00000088,?), ref: 00E6E7FF
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,%s,00000000,?,?,?,?,?,?,?,?,?,?,?,00000088), ref: 00E6E831
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00000088,00000088,?), ref: 00E6E844
                                              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00E6E85E
                                              Strings
                                              • # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00E6E79D
                                              • %s, xrefs: 00E6E822
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$__acrt_iob_funccallocfclosefputsqsort
                                              • String ID: # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s
                                              • API String ID: 935424440-959389649
                                              • Opcode ID: f86661c8dcb88e1757e095ff8fb084a70a07c126cc4b731b2a8a76f0dd7e4d7a
                                              • Instruction ID: e31e057c176d9a93443e0050e82e75061ab8f6f1801d9d6c6e58ddc2d51c7f6c
                                              • Opcode Fuzzy Hash: f86661c8dcb88e1757e095ff8fb084a70a07c126cc4b731b2a8a76f0dd7e4d7a
                                              • Instruction Fuzzy Hash: F951F375A443005FD7109F68FC45BAB7B98EF41388F081479FC4AA7392E632E91D87A2
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,00ED16D4,?), ref: 00E21317
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E2134C
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00E21368
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_taskHandleModulememmove
                                              • String ID: Cheat user$Cutter$Ghidra$OLLYDBG$OllyDbg$PEExplorer$Radare2$WinDbgFrameClass$x32dbg$x64dbg
                                              • API String ID: 4272886007-698559490
                                              • Opcode ID: 9f2d1eaff4d5fb2e4ddbf0f9d307837b1898069abdd1e3b0b8e17dd97af960cc
                                              • Instruction ID: c0116132291514c7aa0d1c61319065b7fdec1e6984c9b83bf45ce30c8a59efa9
                                              • Opcode Fuzzy Hash: 9f2d1eaff4d5fb2e4ddbf0f9d307837b1898069abdd1e3b0b8e17dd97af960cc
                                              • Instruction Fuzzy Hash: 513195B5D0021CEFCB10DFA4F8455DEBBB4EB55344F4011AAE815B7361E7719A0ACB91
                                              APIs
                                                • Part of subcall function 00E7B110: free.API-MS-WIN-CRT-HEAP-L1-1-0(BE83378B,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E7B154
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,-00000050,00000070,00000040,00000028,00E72EB8,00E72EB8,Closing connection,00E72EB8,00000000,00000000,00000000,?,?,00000088), ref: 00E7764F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E77666
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E7767D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E77694
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000070,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E776A7
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(-00000050,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E776B5
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E776CB
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E776E1
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E776F7
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E7770D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E77723
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000028,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00E77735
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000040), ref: 00E77747
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E77757
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E77767
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E7777A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 00E77796
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E777A7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 663fea82984da4475ec072a5c904320006e88a3c73a20509d88b5db45405c861
                                              • Instruction ID: 1200ccf7b9aec470f59996a63a87db5c2cc7b141c75f5c9293cd0eb073e5cd45
                                              • Opcode Fuzzy Hash: 663fea82984da4475ec072a5c904320006e88a3c73a20509d88b5db45405c861
                                              • Instruction Fuzzy Hash: E041E575005700EFDB516FA1EC48BCABBB5FF49316F004409FA8E6A262CB766458DFA1
                                              APIs
                                              • GetModuleHandleA.KERNEL32(ntdll,RtlVerifyVersionInfo), ref: 00EB078E
                                              • GetProcAddress.KERNEL32(00000000), ref: 00EB0795
                                              • memset.VCRUNTIME140(?,00000000,0000010C,00000000), ref: 00EB07FC
                                              • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 00EB0861
                                              • VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 00EB086B
                                              • VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00EB0888
                                              • VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00EB0894
                                              • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 00EB08BC
                                              • VerifyVersionInfoW.KERNEL32(?,00000004,00000000), ref: 00EB0949
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProcmemset
                                              • String ID: D?w$RtlVerifyVersionInfo$ntdll
                                              • API String ID: 2720349688-3637026075
                                              • Opcode ID: e136b9c63e7b193f864666c3ff32652ba2b78355da6d7324abaac58eefcdfbd6
                                              • Instruction ID: fa914e48e155f973f2160f77615bfe34399e6e8324c2b3f672b6a5808a9ab011
                                              • Opcode Fuzzy Hash: e136b9c63e7b193f864666c3ff32652ba2b78355da6d7324abaac58eefcdfbd6
                                              • Instruction Fuzzy Hash: 67513871609341AFE7209B65DC46FEFBBD8AFC9304F04441EF589B32A1C675A844CB52
                                              APIs
                                              • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,?,00000000,000006DC,?,00000088), ref: 00E80F13
                                              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00E80FD8
                                              • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?), ref: 00E81005
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,000006DC,?,00000088), ref: 00E81013
                                              Strings
                                              • unlimited, xrefs: 00E80F4E
                                              • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00E80FBB
                                              • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00E80F0E
                                              • %s%s "%s", xrefs: 00E80F5F
                                              • %d%02d%02d %02d:%02d:%02d, xrefs: 00E810F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _unlinkfclosefputsfree
                                              • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$unlimited
                                              • API String ID: 820369455-2451391588
                                              • Opcode ID: 35cc2996320fcbe65a4f6bd461caaf42baf086bd6aa825f2f81a2f38260b0988
                                              • Instruction ID: 25a4556c58b62430dc18ac8bf8b116a67b088eea00dfb2bac4c781bc4ecaf51d
                                              • Opcode Fuzzy Hash: 35cc2996320fcbe65a4f6bd461caaf42baf086bd6aa825f2f81a2f38260b0988
                                              • Instruction Fuzzy Hash: 9281D071608301AFDB20EF64CC81A6BB7E8FF88314F04596DF95DA3251E732E8458B92
                                              APIs
                                              • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00EC77C4,?,00000088,?,754B6BF0), ref: 00E8E748
                                              • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,754B6BF0), ref: 00E8E764
                                              • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000), ref: 00E8E76E
                                              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00E8E79A
                                                • Part of subcall function 00E8F990: BCryptGenRandom.BCRYPT(00000000,?), ref: 00E8F9E0
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,%s%s.tmp,00000000,?), ref: 00E8E86F
                                              • _fdopen.API-MS-WIN-CRT-MATH-L1-1-0(00000000,00EC77C4), ref: 00E8E8A8
                                              • _close.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00E8E8BC
                                              • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000), ref: 00E8E8C3
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,754B6BF0), ref: 00E8E8DE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$CryptRandom_close_fdopen_fileno_fstat64_unlinkfclosefopen
                                              • String ID: %s%s.tmp
                                              • API String ID: 2683694328-1935936288
                                              • Opcode ID: a0331abaf5085fd642d127dfafc78276db6651c8bc283cc2f89bb97f15344202
                                              • Instruction ID: fce1069e890c8dbed78fb2dcb2abbc5ce95d82e25318c777f23e308bffc2eeaa
                                              • Opcode Fuzzy Hash: a0331abaf5085fd642d127dfafc78276db6651c8bc283cc2f89bb97f15344202
                                              • Instruction Fuzzy Hash: C451E331A043049FD724AB64DC45BAF77E8AF45348F081979F88DF3382E63699198B92
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,00000040,?,00000020), ref: 00E4D4E7
                                              • memset.VCRUNTIME140(?,00000036,00000040,?,00000020), ref: 00E4D4F7
                                              • memset.VCRUNTIME140(?,0000005C,00000040,?,?,?,?,00000020), ref: 00E4D50A
                                              • memmove.VCRUNTIME140(?,?,00000040,?,?,?,?,?,?,?,00000020), ref: 00E4D5C8
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000050,?,?,?,?,?,?,?,?,?,?,00000020), ref: 00E4D617
                                              • memmove.VCRUNTIME140(00000040,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000020), ref: 00E4D64C
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000020), ref: 00E4D66D
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000060), ref: 00E4D674
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000020), ref: 00E4D6CD
                                              • memmove.VCRUNTIME140(?,?,00E33B6D), ref: 00E4D6ED
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmovememset$freemalloc
                                              • String ID: gj
                                              • API String ID: 1323586892-4203073231
                                              • Opcode ID: 4fe5448e673f093cc101afba28b91ef137db83da51bc07b231e9478b7932e5b5
                                              • Instruction ID: 0b9e5db86ae43454a4b21bf18037f56af1cfe7ac4ffec5bdd11bc76f8449cea8
                                              • Opcode Fuzzy Hash: 4fe5448e673f093cc101afba28b91ef137db83da51bc07b231e9478b7932e5b5
                                              • Instruction Fuzzy Hash: ED61B371D0475C97DB219F68DD05BEAB3B4BF69304F04A2A5E94CB6112FB706AD88B40
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,00000078,8E857614,?,?), ref: 00E42C07
                                              • __std_exception_destroy.VCRUNTIME140(?,?), ref: 00E42D7C
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E42D92
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E42E16
                                              • __std_exception_destroy.VCRUNTIME140(?,?,?,?), ref: 00E42FE1
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E42FF7
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E43081
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,8E857614,?,?), ref: 00E4316A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$_invalid_parameter_noinfo_noreturn$memset
                                              • String ID: value
                                              • API String ID: 2005958071-494360628
                                              • Opcode ID: d8bf861103e489876ef70bc37091e52b968d55c4b52ac5806b9f8402e0ad93bb
                                              • Instruction ID: 2226c7127d57a1c834e058666d5d576b1656539b835ff2f48f65b6094034297f
                                              • Opcode Fuzzy Hash: d8bf861103e489876ef70bc37091e52b968d55c4b52ac5806b9f8402e0ad93bb
                                              • Instruction Fuzzy Hash: D1F1BD71D002588BDB28DB28DC85BEEBBB5AF45300F1482E9E559B7682DB706F84CF51
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00E74AF6,00000020,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74187
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74196
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741A6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741B6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741C6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741D6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741E6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E741F6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74206
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(0000000A,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74216
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74226
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00000000,00E76674,00000000,00000088,00000000), ref: 00E74236
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 93f62576fa83250ca4057e6866e5715f29c8c225718473959cd58effe739e8ba
                                              • Instruction ID: 371dbac16eec0c364cc8babc3b348fb9ebd04f080133040bfc800a634c265165
                                              • Opcode Fuzzy Hash: 93f62576fa83250ca4057e6866e5715f29c8c225718473959cd58effe739e8ba
                                              • Instruction Fuzzy Hash: AC110D75005B00EFDB615FA2FC08786BBF1FF08316F004A09E99E55AA1C776A09C9FA1
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,00000060,8E857614,00000000,00000000), ref: 00E4DFE4
                                                • Part of subcall function 00E31060: GetProcessHeap.KERNEL32(00E4E00A,8E857614,00000000,00000000), ref: 00E310A1
                                              • GetCurrentProcess.KERNEL32 ref: 00E4E085
                                              • OpenProcessToken.ADVAPI32(00000000,00020008,?), ref: 00E4E098
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00ED15B4), ref: 00E4E143
                                              • UnloadUserProfile.USERENV(00000000,00000000,none,00000004), ref: 00E4E16E
                                              • CloseHandle.KERNEL32(00000000,none,00000004), ref: 00E4E183
                                                • Part of subcall function 00E4E760: GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,8E857614,?,?,?,?,80070057,?), ref: 00E4E7A8
                                                • Part of subcall function 00E4E760: GetLastError.KERNEL32(?,?,?,?,80070057,?), ref: 00E4E7AE
                                                • Part of subcall function 00E4E760: GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000008,?,?,?,?,80070057,?), ref: 00E4E830
                                                • Part of subcall function 00E4E760: IsValidSid.ADVAPI32(?), ref: 00E4E875
                                                • Part of subcall function 00E4E760: GetLengthSid.ADVAPI32(?), ref: 00E4E884
                                                • Part of subcall function 00E4E760: CopySid.ADVAPI32(00000000,00000000,?), ref: 00E4E899
                                                • Part of subcall function 00E4E760: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,80070057,?), ref: 00E4E8C3
                                                • Part of subcall function 00E4DDA0: ConvertSidToStringSidW.ADVAPI32(00000000,?), ref: 00E4DDEB
                                                • Part of subcall function 00E4DDA0: LocalFree.KERNEL32(?,?), ref: 00E4DE02
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,80004005,8E857614,00000000,00000000), ref: 00E4E1FA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ProcessTokenfree$Information$CloseConvertCopyCurrentErrorFreeHandleHeapLastLengthLocalOpenProfileStringUnloadUserValidmemset
                                              • String ID: none
                                              • API String ID: 793324379-2140143823
                                              • Opcode ID: d552b454d676eea8fac62a89bfcf909769314ef8f4bf5e7ad20d5daa85b0a9d8
                                              • Instruction ID: 771a5c961f0c0cf7e5dded3ba655d3251d347e329e5b1aeaab2acf2fa80687b9
                                              • Opcode Fuzzy Hash: d552b454d676eea8fac62a89bfcf909769314ef8f4bf5e7ad20d5daa85b0a9d8
                                              • Instruction Fuzzy Hash: FE719970A002499BDB14DFA4DD49BEEBBF4BF45304F1482ADE505B7381DB75AA48CBA0
                                              APIs
                                                • Part of subcall function 00E6ED50: QueryPerformanceCounter.KERNEL32(754B6BF0,754B6BF0,?,?,754B6BF0), ref: 00E6ED63
                                                • Part of subcall function 00E6ED50: __alldvrm.LIBCMT ref: 00E6ED7D
                                                • Part of subcall function 00E6ED50: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E6EDA4
                                              • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,?,754B6BF0), ref: 00E8E643
                                              • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00E8E64B
                                              • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00E8E65C
                                              • Sleep.KERNEL32(00000001), ref: 00E8E6A9
                                              • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00E8E6AF
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E8E6C0
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E8E6CA
                                                • Part of subcall function 00E6ED50: GetTickCount.KERNEL32 ref: 00E6EDC1
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E8E6E4
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E8E6EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                              • String ID:
                                              • API String ID: 2436438912-0
                                              • Opcode ID: 0c5055e6f58f3c4feb43c00f62a250b1020fc015266f6a1d9414189cef5f0b02
                                              • Instruction ID: 977df82bed23c77b2d967ce2b07b30996d1dadde3ff8f63e30232e0e99700869
                                              • Opcode Fuzzy Hash: 0c5055e6f58f3c4feb43c00f62a250b1020fc015266f6a1d9414189cef5f0b02
                                              • Instruction Fuzzy Hash: B1212B31D003145BE2213725AC81ABF7764EF96798F081134FD0C73352FA1AE99953E6
                                              APIs
                                                • Part of subcall function 00E41600: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00000000,00F260AC), ref: 00E417BF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,CDCED9D8,?,00000001,00000000,?,message,success), ref: 00E38B27
                                                • Part of subcall function 00E3A460: strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,00000010,?,00000002,8E857614,1FFFB800), ref: 00E3A550
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,?,?,?,?,CDCED9D8,?,00000001,00000000,?,message,success), ref: 00E38C67
                                              • memmove.VCRUNTIME140(?,?,?,?,00000000,?,?,?,?,?,?,?,?,CDCED9D8,?,00000001), ref: 00E38D0C
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,CDCED9D8,?,00000001,00000000,?,message,success), ref: 00E38EA3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn$memmovestrtol
                                              • String ID: !$message$success
                                              • API String ID: 43302329-2055558241
                                              • Opcode ID: d8d0ed7e6693c3ffffe1c662fa33d5c68d6a06880c96b3948a1a0b418d7630ee
                                              • Instruction ID: 472888566b75a5d6ffe8929015439b134f16f8966e28f9ae095bb4bd0cdd0a78
                                              • Opcode Fuzzy Hash: d8d0ed7e6693c3ffffe1c662fa33d5c68d6a06880c96b3948a1a0b418d7630ee
                                              • Instruction Fuzzy Hash: D7F10F709002188FDB18DB24DD98BEDBBB1AF41304F2492D9F04ABB692CB749EC4DB51
                                              APIs
                                              • __std_exception_destroy.VCRUNTIME140 ref: 00E48881
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E48897
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E4891F
                                              • __std_exception_destroy.VCRUNTIME140(?,00000000,object key,0000000A), ref: 00E48A02
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E48A18
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$_invalid_parameter_noinfo_noreturn
                                              • String ID: object key$object separator
                                              • API String ID: 2506729964-2279923633
                                              • Opcode ID: a6e03fce831d36427a7d7fbe25ac6878aa3a3e100b0f287ba63a094020444990
                                              • Instruction ID: cd282a07deb00e3865a28c98a0d52ca347db49651a7e0d28d660ef90cfcbf7da
                                              • Opcode Fuzzy Hash: a6e03fce831d36427a7d7fbe25ac6878aa3a3e100b0f287ba63a094020444990
                                              • Instruction Fuzzy Hash: F5E1D370D002188FDB18CF68ED94BEEB7B5BF45304F1096A9E50AF7681DB74AA84CB51
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00EA4E8F,?,?,00E79FA0,?), ref: 00EA6147
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA6150
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA6159
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA6162
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00EA616B
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(0000000F), ref: 00EA6174
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA617D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA6186
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA618F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EA6198
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: dc9b1ea63b5f5a028c46fd43725c6b5bfbd45df5dfb43085e0c79b2fc732cd99
                                              • Instruction ID: 83b0b47f0dd2c86277019b34e3cfc78bb4c1aaa9b3fd8dba0aeb023cdf0f9f16
                                              • Opcode Fuzzy Hash: dc9b1ea63b5f5a028c46fd43725c6b5bfbd45df5dfb43085e0c79b2fc732cd99
                                              • Instruction Fuzzy Hash: 02F09432012610EFCB211F66FD098C57BB5FF086117104916F99A654B2C73358AD9B81
                                              APIs
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E2FB40: memmove.VCRUNTIME140(?,parse error,0000000B,00000000), ref: 00E2FC20
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E4891F
                                              • __std_exception_destroy.VCRUNTIME140(?,00000000,object key,0000000A), ref: 00E48A02
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E48A18
                                              • __std_exception_destroy.VCRUNTIME140 ref: 00E49376
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E4938C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$memmove$_invalid_parameter_noinfo_noreturn
                                              • String ID: object key$value
                                              • API String ID: 2901057578-3662756203
                                              • Opcode ID: 653bfa746f1f1a49a1431924494c2e7bc38519ff7599c0fdef70aac326a6d3ee
                                              • Instruction ID: e90908017d9d344bfc5b7da7f129f782a18bdb57c734c7b8d936cc4dea455e3e
                                              • Opcode Fuzzy Hash: 653bfa746f1f1a49a1431924494c2e7bc38519ff7599c0fdef70aac326a6d3ee
                                              • Instruction Fuzzy Hash: ED71F771D0022C8BDB18DB64ED98BDEBBB5BF45304F148299E149B7682DB706B84CF51
                                              APIs
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E2FB40: memmove.VCRUNTIME140(?,parse error,0000000B,00000000), ref: 00E2FC20
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E472C0
                                              • __std_exception_destroy.VCRUNTIME140(?,00000000,object key,0000000A), ref: 00E473A3
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E473B9
                                              • __std_exception_destroy.VCRUNTIME140 ref: 00E47D39
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E47D4F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy$memmove$_invalid_parameter_noinfo_noreturn
                                              • String ID: object key$value
                                              • API String ID: 2901057578-3662756203
                                              • Opcode ID: 4892f982dd966ef3970cb0e7fdb87c6fd11418b29bd94f5efe2762e4ee14c8a0
                                              • Instruction ID: 8b983191c9af8e1aa6fbbaae988e57ff80ac7b41523b55a07e239b078e118ad4
                                              • Opcode Fuzzy Hash: 4892f982dd966ef3970cb0e7fdb87c6fd11418b29bd94f5efe2762e4ee14c8a0
                                              • Instruction Fuzzy Hash: 2171D3B1D003188FEB24DB64DD99BDEBBB4EF05304F108299E449B7682D7B56A84CF91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,7FFFFFFF,?,?,?,?), ref: 00E2E3FC
                                              • memmove.VCRUNTIME140(?,?,?,00000000,7FFFFFFF,?,?,?,?), ref: 00E2E40A
                                              • memmove.VCRUNTIME140(?,?,?,?,?,?,00000000,7FFFFFFF,?,?,?,?), ref: 00E2E41E
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E2E45B
                                              • memmove.VCRUNTIME140(00000000,?,?,?,?,?), ref: 00E2E463
                                              • memmove.VCRUNTIME140(7FFFFFFF,?,?,00000000,?,?,?,?,?), ref: 00E2E46F
                                              • memmove.VCRUNTIME140(?,?,?,7FFFFFFF,?,?,00000000,?,?,?,?,?), ref: 00E2E483
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E2E49D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: 4d26ecf71acff4d579b3e26ab5de6e0e20db1098d46ec4332f43c33de56d2aa9
                                              • Instruction ID: 04526203856f62989c6822d74bc0e138b94d699c9424585e4762949b7c369f5f
                                              • Opcode Fuzzy Hash: 4d26ecf71acff4d579b3e26ab5de6e0e20db1098d46ec4332f43c33de56d2aa9
                                              • Instruction Fuzzy Hash: 1041AD72E001299BCF15EF68E8819EEBBB5FF48301B141269E815B7355D730DE618B91
                                              APIs
                                              • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000000,00000000,?,8E857614,?,?,?,?,80070057,?), ref: 00E4E7A8
                                              • GetLastError.KERNEL32(?,?,?,?,80070057,?), ref: 00E4E7AE
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,80070057,?), ref: 00E4E7F9
                                              • GetTokenInformation.ADVAPI32(00000000,00000001(TokenIntegrityLevel),00000008,?,?,?,?,80070057,?), ref: 00E4E830
                                              • IsValidSid.ADVAPI32(?), ref: 00E4E875
                                              • GetLengthSid.ADVAPI32(?), ref: 00E4E884
                                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E4E899
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,80070057,?), ref: 00E4E8C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: InformationToken$CopyErrorLastLengthValidfreemalloc
                                              • String ID:
                                              • API String ID: 2357097940-0
                                              • Opcode ID: 9027822dae9f8b5a6f7ff8872f289ef88690fb0bc117dac234ad819fc8b4855b
                                              • Instruction ID: 93ff1c5c89c812e9f62bcf7a44e84ee52317271453372b0f1b499802c0d00bef
                                              • Opcode Fuzzy Hash: 9027822dae9f8b5a6f7ff8872f289ef88690fb0bc117dac234ad819fc8b4855b
                                              • Instruction Fuzzy Hash: 4951F671A00205AFDB14DF65EC8AFAEBBA8FF09304F185469E501B7352D731B958CB90
                                              APIs
                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E4E597
                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E4E5A9
                                              • memmove.VCRUNTIME140(?,?,?,?,?), ref: 00E4E5C0
                                              • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00E4E60D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _errno$_invalid_parameter_noinfomemmove
                                              • String ID:
                                              • API String ID: 351588475-0
                                              • Opcode ID: c7fb5ffff226a146ad7dfb29e829e2e9947d8b1c133ddfcc1b03d078d1cb5c93
                                              • Instruction ID: 3b99ba2f8041e307957e976ecd278b1c6d2ad36860acdd7f0dad51bc66fdef56
                                              • Opcode Fuzzy Hash: c7fb5ffff226a146ad7dfb29e829e2e9947d8b1c133ddfcc1b03d078d1cb5c93
                                              • Instruction Fuzzy Hash: C4310876A00610CFCB24DF68EC49AAAB7A5FF95304F1156A9EC02F7354EA32AC018691
                                              APIs
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                              • memmove.VCRUNTIME140(?,parse error,0000000B,00000000), ref: 00E2FC20
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000002,00000000,00ECF9AC,00000002,?,?,?,0000000B,00000000,parse error,0000000B,00000000), ref: 00E2FECE
                                              • __std_exception_copy.VCRUNTIME140(?,0000000F,?,00000002,00000000,00ECF9AC,00000002,?,?,?,0000000B,00000000,parse error,0000000B,00000000), ref: 00E2FF20
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E2FF5F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturnmemmove$__std_exception_copy
                                              • String ID: parse error$parse_error
                                              • API String ID: 2013804569-1820534363
                                              • Opcode ID: 7d9a8d886ccba0568c1209bb87fa12d5d67c4cf05f0cd41af87da2103a7f0055
                                              • Instruction ID: 925d3363eaeb994a6613eaf4b5b256a5de83bc5d20f4f6d49f9277ac38541e56
                                              • Opcode Fuzzy Hash: 7d9a8d886ccba0568c1209bb87fa12d5d67c4cf05f0cd41af87da2103a7f0055
                                              • Instruction Fuzzy Hash: FFD1E271D002588FDB18CF68ED85BADBBB1FF45304F248269F414BB692D770AA85CB91
                                              APIs
                                              • fgetc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00E21EE0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: fgetc
                                              • String ID:
                                              • API String ID: 2807381905-0
                                              • Opcode ID: 2b417860b58452fae2f2a516bf6fb6b274c70ad4bb67fd63049ec8160b5378ac
                                              • Instruction ID: eb8de747736e5aaeafd71dc459b037268786c0b0287ade87b8a4a31135e31519
                                              • Opcode Fuzzy Hash: 2b417860b58452fae2f2a516bf6fb6b274c70ad4bb67fd63049ec8160b5378ac
                                              • Instruction Fuzzy Hash: 84918A71D00119DFCB14CFA8D894AAEBBB5FF48314F24826EE922B7291D731A945CF90
                                              APIs
                                              • memmove.VCRUNTIME140(00000001,?,00000001,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E43614
                                              • memmove.VCRUNTIME140(00000001,?,00000001,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E4365F
                                              • memmove.VCRUNTIME140(?,DCC8DA8D,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E43675
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E436F6
                                              • memmove.VCRUNTIME140(00000002,DCC8DA8D,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E43726
                                              • memmove.VCRUNTIME140(DCC8DA8D,?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E43743
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4375B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 2016347663-0
                                              • Opcode ID: a801447c2a14f6632dbcd8bec1f6925060009a0770f7990f8d3f0bdeea8d7dfc
                                              • Instruction ID: 3b1008657bcfa48214a8b9b3bf49833993bd303003f79ee0fcfa3175ca71aa0a
                                              • Opcode Fuzzy Hash: a801447c2a14f6632dbcd8bec1f6925060009a0770f7990f8d3f0bdeea8d7dfc
                                              • Instruction Fuzzy Hash: 9951A2B1A00206DBD724DF78E884AAAB7F4FF44304F2016AEE455A7641E731EA54CBA1
                                              APIs
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(8E857614,00000000,00000000), ref: 00E3DE3D
                                              • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140(?,00000000,00000000), ref: 00E3DE5B
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140 ref: 00E3DE85
                                              • ?_Xbad_alloc@std@@YAXXZ.MSVCP140 ref: 00E3DEB3
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3DEE4
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • memmove.VCRUNTIME140(00000000,00E3B7BD,CC8BFFFF), ref: 00E3DEFA
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E3DF3F
                                                • Part of subcall function 00E215F0: _CxxThrowException.VCRUNTIME140(?,00ED5D48,?,?,?,76230E50), ref: 00E21607
                                                • Part of subcall function 00E215F0: __std_exception_copy.VCRUNTIME140(?,00000000,?,?,?,00ED5D48,?,?,?,76230E50), ref: 00E2162E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@Concurrency::cancel_current_taskD@std@@@1@_ExceptionThrowV?$basic_streambuf@Xbad_alloc@std@@__std_exception_copy_invalid_parameter_noinfo_noreturnmallocmemmove
                                              • String ID:
                                              • API String ID: 3583517682-0
                                              • Opcode ID: 8b174cecb0046a342fb5760a26c30427bc6df155a969011849650b62e9459492
                                              • Instruction ID: e7ada695712fe57c4683276d1798e609a1bbdbeeb18716fcafc1f01e14de4bb5
                                              • Opcode Fuzzy Hash: 8b174cecb0046a342fb5760a26c30427bc6df155a969011849650b62e9459492
                                              • Instruction Fuzzy Hash: 4841AFB5A00204DFCB10DF19D888B9ABBF8FF59314F1145AAE816AB391D775ED04CBA1
                                              APIs
                                              • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00000088,00000088), ref: 00E6EB97
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(0000000F,?), ref: 00E6EC44
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6EC4D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E6EC56
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6EC5F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6EC68
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6EC6F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$_time64
                                              • String ID:
                                              • API String ID: 3087401894-0
                                              • Opcode ID: b691751573ff90463cf43baa3bb40461fe5f60f1455bb8a2093ed9fb2b4fd2ac
                                              • Instruction ID: fbb0aea96e6835d8b827dcf33a6d03f33f07b52b78125d7bbebd531d0532fffe
                                              • Opcode Fuzzy Hash: b691751573ff90463cf43baa3bb40461fe5f60f1455bb8a2093ed9fb2b4fd2ac
                                              • Instruction Fuzzy Hash: D031B0755447408FCB24CF08F88499ABBE0FF94354F145A7DED9AAB3E1D731A8888B91
                                              APIs
                                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,?,00E6A8B5,?), ref: 00E6F59B
                                              • CloseHandle.KERNEL32(?,?,000000FF,00000000,?,00E6A8B5,?), ref: 00E6F5A3
                                              • EnterCriticalSection.KERNEL32(?,000006DC,?,00000000,00000088,00E76784,00000000), ref: 00E6F6F0
                                              • LeaveCriticalSection.KERNEL32(?,?,00000000,00000088,00E76784,00000000), ref: 00E6F703
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000088,00E76784,00000000), ref: 00E6F714
                                              • closesocket.WS2_32(?), ref: 00E6F77E
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,00000088,00E76784,00000000), ref: 00E6F78F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CloseCriticalHandleSection$EnterLeaveObjectSingleWaitclosesocketfree
                                              • String ID:
                                              • API String ID: 768628753-0
                                              • Opcode ID: 3f8bf49f956907d725fbd914653476a16528a74d7efddb9f015432f376cabc78
                                              • Instruction ID: 15920c23ed9cf1fb8d12affbf72aee7940de0e70f0dc0d851a885bb71387de69
                                              • Opcode Fuzzy Hash: 3f8bf49f956907d725fbd914653476a16528a74d7efddb9f015432f376cabc78
                                              • Instruction Fuzzy Hash: EF21B0B6501601BFD7109F25FC48B96BBB8BF45395F080039E95AA3222C772FC64CB91
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000088,00E766E3,00000000,00000088), ref: 00E79EEB
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F01
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F17
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F2D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F43
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F59
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F6F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E79F85
                                                • Part of subcall function 00EA4E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00E79FA0,?), ref: 00EA4E90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 9d273683b769940e985828c78eb92f360f0870c00e7764f3aa371490c3bb35fa
                                              • Instruction ID: 1bca6e944f47c757af1b20c8ce8a62aad8f097d51894ff8832282f0bc1ba952e
                                              • Opcode Fuzzy Hash: 9d273683b769940e985828c78eb92f360f0870c00e7764f3aa371490c3bb35fa
                                              • Instruction Fuzzy Hash: 00113379005B40AFEB665F61EC58BC6BBE1FB08306F100A09E9AE552A1CB76209C9B51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 2580228974-0
                                              • Opcode ID: 790187881dea94abd528b8986a15acd12cf8fb9557d7c1aaf11d55d591c60667
                                              • Instruction ID: e7bc38842623a4f5f5d6da9901621b752baec1c6d7fbaec334eec7f4a1ab0088
                                              • Opcode Fuzzy Hash: 790187881dea94abd528b8986a15acd12cf8fb9557d7c1aaf11d55d591c60667
                                              • Instruction Fuzzy Hash: 4D12D2B4A04745CFC725CF64E480BAABBF1BF45308F245A9DD4526B792D332E906CBA1
                                              APIs
                                              • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3D5EC
                                              • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3D5F8
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3D604
                                              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3D838
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3D844
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,\Debug,?), ref: 00E3D963
                                              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140(7FFFFFFF,?,00000000,?,00000000,-00000002), ref: 00E3D9D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_istream@$??1?$basic_ostream@??1?$basic_streambuf@_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 2127113060-0
                                              • Opcode ID: 301f3e67c144e1f043c9bd8d90049ccbbc34ff5e978fdad41486b3e0d965880c
                                              • Instruction ID: 29d9f8d105b601f0d39129c9d8d3b3d21bdd549dc43d8517b6a72cb44f8067cd
                                              • Opcode Fuzzy Hash: 301f3e67c144e1f043c9bd8d90049ccbbc34ff5e978fdad41486b3e0d965880c
                                              • Instruction Fuzzy Hash: 7491D171A040148BDB1D9B28ECDC7ADBBB5EB85314F2492D8E419AB696CB749FC1CF40
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,0000026C,8E857614,00000000,00000000), ref: 00E3F044
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • memset.VCRUNTIME140(?,00000000,00000040), ref: 00E3F0E3
                                              • localeconv.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 00E3F0EB
                                              • memset.VCRUNTIME140(?,00000000,00000200), ref: 00E3F134
                                              • memset.VCRUNTIME140(00000000,00000020,00000200), ref: 00E3F17D
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,00000000,00000000), ref: 00E3F205
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memset$_invalid_parameter_noinfo_noreturnlocaleconvmalloc
                                              • String ID:
                                              • API String ID: 4120556116-0
                                              • Opcode ID: 24a32cc269ba446eb1c1391fbe8e4f5cff27e29dfaa0c640bc9d4c7d9fee9f20
                                              • Instruction ID: 3e537b3abd4e1caabdb674852e8de8cfbcca365d3a99926b8a95130b74bb709e
                                              • Opcode Fuzzy Hash: 24a32cc269ba446eb1c1391fbe8e4f5cff27e29dfaa0c640bc9d4c7d9fee9f20
                                              • Instruction Fuzzy Hash: 82818BB0D01318CFEB20DF64DC8979ABBB0AF45714F2442A9E449BB391DBB55A84CF91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,7FFFFFFF,?,00000000), ref: 00E428EF
                                              • memset.VCRUNTIME140(?,?,?,00000000,7FFFFFFF,?,00000000), ref: 00E428FD
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000), ref: 00E42940
                                              • memmove.VCRUNTIME140(00000000,?,?,00000000), ref: 00E42948
                                              • memset.VCRUNTIME140(7FFFFFFF,?,?,00000000,?,?,00000000), ref: 00E42954
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E42974
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmovememset$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 4119555314-0
                                              • Opcode ID: 9486a779f785252ac8a75347b0dffc03ff930351dff071909d60734429452a5f
                                              • Instruction ID: fbea82e2c0846cda7dd3339b5e9fb85c7cf25d5bc84f79bdacad3772d599e76b
                                              • Opcode Fuzzy Hash: 9486a779f785252ac8a75347b0dffc03ff930351dff071909d60734429452a5f
                                              • Instruction Fuzzy Hash: B541F372E001149BCB19DFA8E880AAEB7E5FF88310F5416ADFA15EB241D730DE519B91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                              • memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?), ref: 00E2E0DF
                                              • memmove.VCRUNTIME140(00000000,?,00000000,?,?), ref: 00E2E0E7
                                              • memmove.VCRUNTIME140(7FFFFFFF,?,?,00000000,?,00000000,?,?), ref: 00E2E0F3
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E2E113
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: 1196c6863a76703e45fb30fa46463227b3de36927499cd6f2b070dd6ad7c292e
                                              • Instruction ID: 6eba9ab7195358f0e01960b94ae643c6f1bf6a50ead1a6b29b38893cd1c76376
                                              • Opcode Fuzzy Hash: 1196c6863a76703e45fb30fa46463227b3de36927499cd6f2b070dd6ad7c292e
                                              • Instruction Fuzzy Hash: E341D072E001249BDB15EFACEC80AAEB7E5EF49300F1412A9E815F7301DB71DE129B91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,00000000,?,?), ref: 00E496EC
                                              • memmove.VCRUNTIME140(00000000,00000001,00000001,00000000,00000000,?,?), ref: 00E496FA
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?), ref: 00E49737
                                              • memmove.VCRUNTIME140(00000000,00000000,?,?), ref: 00E4973D
                                              • memmove.VCRUNTIME140(00000000,?,00000001,00000000,00000000,?,?), ref: 00E49747
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E49761
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: f45a1ab10a874ced6a2716c3cddd830f856f9a8adb7cee3641c84d9e00632f86
                                              • Instruction ID: db9f76a50583ee7d729599bfa427229ce373ff30b743da842b828a2ed22cad1b
                                              • Opcode Fuzzy Hash: f45a1ab10a874ced6a2716c3cddd830f856f9a8adb7cee3641c84d9e00632f86
                                              • Instruction Fuzzy Hash: DA410772E001149FDB14EF68EC849AFB7E5EB84350B2512BAE815F7216EB309E108B91
                                              APIs
                                              • memset.VCRUNTIME140(?,?,?), ref: 00E3F882
                                              • memset.VCRUNTIME140(?,?,?), ref: 00E3F90F
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E3F92E
                                              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3F96F
                                              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 00E3F977
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@memset$??1?$basic_ios@??1?$basic_istream@Concurrency::cancel_current_task
                                              • String ID:
                                              • API String ID: 915423947-0
                                              • Opcode ID: 3e16201fd3fd67fac837a63078c3c9dd818768c3118cdab44618d5bbb5c87bdd
                                              • Instruction ID: b836f3a58b5a982a5b9a1099f6517fb17c54ffeffeaa2e10af49cbf16a9bb3f2
                                              • Opcode Fuzzy Hash: 3e16201fd3fd67fac837a63078c3c9dd818768c3118cdab44618d5bbb5c87bdd
                                              • Instruction Fuzzy Hash: 0A415672A003049FD328DF68E888BAEBBE8EF95314F14027EF4569B342D7719A05C791
                                              APIs
                                              • _Query_perf_frequency.MSVCP140 ref: 00E4EABE
                                              • _Query_perf_counter.MSVCP140 ref: 00E4EACA
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E4EB0E
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E4EB41
                                              • __alldvrm.LIBCMT ref: 00E4EB58
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E4EB7D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$Query_perf_counterQuery_perf_frequency__alldvrm
                                              • String ID:
                                              • API String ID: 1339266948-0
                                              • Opcode ID: 5c3df0a7919e51b1e89edaaff5087089fae179c73c7ce1943bf71ff933476a0f
                                              • Instruction ID: 2ddbab061427266ba9d638ba2999276720613c59c626d5f65f45e22d57242462
                                              • Opcode Fuzzy Hash: 5c3df0a7919e51b1e89edaaff5087089fae179c73c7ce1943bf71ff933476a0f
                                              • Instruction Fuzzy Hash: FF218271A043187EEB289B699C85FBBBBFCEB84754F2041A9F909F7341E6706D004B64
                                              APIs
                                              • ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z.MSVCP140(00000001,?,00000040,8E857614,?,?,?,00E33106,?,00000001,00000000,?,?,?,?,?), ref: 00E41120
                                              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ.MSVCP140(?,?,?,?,00E33106,?,00000001,00000000,?,?,?,?,?,?,00000000,?), ref: 00E4113D
                                              • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,?,?), ref: 00E41165
                                              • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,00E33106,?,00000001,00000000,?,?), ref: 00E411AA
                                                • Part of subcall function 00E226E0: ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000,8E857614,00000000,00ECF874,?,00EBCDA6,000000FF,?,00E411BE), ref: 00E22715
                                                • Part of subcall function 00E226E0: ??Bid@locale@std@@QAEIXZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E22730
                                                • Part of subcall function 00E226E0: ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E2275B
                                                • Part of subcall function 00E226E0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,?,00EBCDA6,000000FF), ref: 00E2277E
                                                • Part of subcall function 00E226E0: std::_Facet_Register.LIBCPMT ref: 00E22797
                                                • Part of subcall function 00E226E0: ??1_Lockit@std@@QAE@XZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E227B2
                                              • ?always_noconv@codecvt_base@std@@QBE_NXZ.MSVCP140(?,?,?,?,?,?,?,?,00E33106,?,00000001), ref: 00E411C2
                                              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ.MSVCP140(?,?,?,?,?,?,?,?,00E33106,?,00000001), ref: 00E411DA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
                                              • String ID:
                                              • API String ID: 3911317180-0
                                              • Opcode ID: 98357a96f0eede094199c152c96360e9903eca4dda5427cc96981e736bf64c33
                                              • Instruction ID: 6a279d31c064d398795ce4c05a8f981110d0d80461063ec103d9952cdad9298d
                                              • Opcode Fuzzy Hash: 98357a96f0eede094199c152c96360e9903eca4dda5427cc96981e736bf64c33
                                              • Instruction Fuzzy Hash: 75416A74A007488FCB20CF69D848BABBBF4FB49314F00456EE916E7790DB75A905CB90
                                              APIs
                                              • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000,8E857614,00000000,00ECF874,?,00EBCDA6,000000FF,?,00E411BE), ref: 00E22715
                                              • ??Bid@locale@std@@QAEIXZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E22730
                                              • ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E2275B
                                              • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,?,00EBCDA6,000000FF), ref: 00E2277E
                                              • std::_Facet_Register.LIBCPMT ref: 00E22797
                                              • ??1_Lockit@std@@QAE@XZ.MSVCP140(?,00EBCDA6,000000FF), ref: 00E227B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Facet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
                                              • String ID:
                                              • API String ID: 3960873448-0
                                              • Opcode ID: e23a17eb7f7bc58037685f64f2fda786d0e2c44aea53496741e42c9aa58b81a4
                                              • Instruction ID: db13c66d09aac23700e6f5084100be4225775ab4e48a129edcec55bb19990bd9
                                              • Opcode Fuzzy Hash: e23a17eb7f7bc58037685f64f2fda786d0e2c44aea53496741e42c9aa58b81a4
                                              • Instruction Fuzzy Hash: B2319835D042299FCB10CF68E848AAEFBB0FB05724F1542AAE815B7261DB35AD05CBD0
                                              APIs
                                              • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000,8E857614,00E3AFF8,?,?,?,00000000,?,?,00E3AFF8,?,?), ref: 00E413C6
                                              • ??Bid@locale@std@@QAEIXZ.MSVCP140(?,?,00000000,?), ref: 00E413E1
                                              • ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(?,?,00000000,?), ref: 00E4140C
                                              • ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,?,?,00000000,?), ref: 00E4142F
                                              • std::_Facet_Register.LIBCPMT ref: 00E41448
                                              • ??1_Lockit@std@@QAE@XZ.MSVCP140(?,?,00000000,?), ref: 00E41463
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@D@std@@Facet_Getcat@?$ctype@Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@std::_
                                              • String ID:
                                              • API String ID: 295490909-0
                                              • Opcode ID: 39f73b4392f08005ca95825e436c069e7ea5e8ecf891b660acc91a45d757e965
                                              • Instruction ID: 9f3c8b639f43e20acbbc1b4f68e71c618a0cf0886d13057100203c6b87669e5f
                                              • Opcode Fuzzy Hash: 39f73b4392f08005ca95825e436c069e7ea5e8ecf891b660acc91a45d757e965
                                              • Instruction Fuzzy Hash: 49319A75D002198FCF25CF94E848AAEBBB0FB05764F04469AE821B7251D735AD45CBD0
                                              APIs
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8D320
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E8D40D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                              • String ID: %2lld:%02lld:%02lld$%3lldd %02lldh$%7lldd
                                              • API String ID: 885266447-1743532675
                                              • Opcode ID: 6854f854c2afa6a06ac000231c65ec031f0bddfcc43e38b50e42d9fc33f1397d
                                              • Instruction ID: 808f3bc67c70f1b57cb5aebc9e12dc262eb77be4bd17252e0c64f4f588eb2491
                                              • Opcode Fuzzy Hash: 6854f854c2afa6a06ac000231c65ec031f0bddfcc43e38b50e42d9fc33f1397d
                                              • Instruction Fuzzy Hash: F1513372B083045BE308AE2C8C41B6EB7D9E7C8754F494A3DF85CE33A2E6B69D054781
                                              APIs
                                              • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(ALLUSERSPROFILE,8E857614,00000000,?), ref: 00E3B1AF
                                              • ___std_fs_convert_wide_to_narrow@20.LIBCPMT ref: 00E3B260
                                              • ___std_fs_convert_wide_to_narrow@20.LIBCPMT ref: 00E3B28B
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,?,?,00000000,?,00000000,00000000,?,00000000,00000000), ref: 00E3B2C0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ___std_fs_convert_wide_to_narrow@20$_invalid_parameter_noinfo_noreturngetenv
                                              • String ID: ALLUSERSPROFILE
                                              • API String ID: 2152966803-1909236125
                                              • Opcode ID: 750d431dbc929ba1f0e4b1138af03094fbc9f5a4b915a10e5fb303f7cc6f1cdf
                                              • Instruction ID: 6c0aba8f413276fc5bc3c30c1dc84899e328034985fa8442830c6759405fa2f6
                                              • Opcode Fuzzy Hash: 750d431dbc929ba1f0e4b1138af03094fbc9f5a4b915a10e5fb303f7cc6f1cdf
                                              • Instruction Fuzzy Hash: 57411170E002049BDB24DF68D849BAFBBF5EF85704F10462DE952B7391DB75AA44CBA0
                                              APIs
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E319CE
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E319EF
                                              • __std_exception_destroy.VCRUNTIME140(?), ref: 00E31AE7
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E31AF2
                                              • __std_exception_copy.VCRUNTIME140(?,?,8E857614,?,?,?,00000000,00EBD563,000000FF), ref: 00E31B42
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __std_exception_destroy_invalid_parameter_noinfo_noreturn$__std_exception_copy
                                              • String ID:
                                              • API String ID: 3884296093-0
                                              • Opcode ID: 87d844539d4c8a6e268ddc2643ecf072427b04a12b01139f7da1bb9d3bc7787e
                                              • Instruction ID: 991169235065c17f620e1144a409a0b9d0b7fa6167fd72f0a95363fb9c7c0c2e
                                              • Opcode Fuzzy Hash: 87d844539d4c8a6e268ddc2643ecf072427b04a12b01139f7da1bb9d3bc7787e
                                              • Instruction Fuzzy Hash: 6D8121B19006408FD328DF28DC98BAABBE9EF44314F144A5DE086E7E91E775FA44CB50
                                              APIs
                                              • memmove.VCRUNTIME140(?,?,?), ref: 00E2DA06
                                              • memmove.VCRUNTIME140(?,?,?), ref: 00E2DA37
                                              • memmove.VCRUNTIME140(?,?,?,?,?,?), ref: 00E2DA49
                                              • memmove.VCRUNTIME140(?,?,?), ref: 00E2DAC9
                                              • memmove.VCRUNTIME140(0000000F,?,?,?,?,?), ref: 00E2DAD5
                                              • memmove.VCRUNTIME140(0000000F,?,?,0000000F,?,?,?,?,?), ref: 00E2DAEC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: 75b90f57de89330d196d8308c89122bae3420953883efa01a3897ddf521cd6b3
                                              • Instruction ID: 89997fea9fb6702b88eb87769913b9c91c809baa9227cdfb20ead9849be7978c
                                              • Opcode Fuzzy Hash: 75b90f57de89330d196d8308c89122bae3420953883efa01a3897ddf521cd6b3
                                              • Instruction Fuzzy Hash: 42417FB2E04129ABCB14DFACDC81DAEBBB9FF44354B24556AE905E3301D3319E509BE0
                                              APIs
                                              • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z.MSVCP140(00000000,8E857614,00000000,?,?,00E3B7F3,00EBED7D,000000FF,?,00E3DD9A,8E857614,00000000,?,?,?,00EBE890), ref: 00E4248A
                                              • ?getloc@ios_base@std@@QBE?AVlocale@2@XZ.MSVCP140(?,?,?,00E3B7F3,00EBED7D,000000FF,?,00E3DD9A,8E857614,00000000,?,?,?,00EBE890,000000FF), ref: 00E424AD
                                              • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(?,00E3B7F3,00EBED7D,000000FF,?,00E3DD9A,8E857614,00000000,?,?,?,00EBE890,000000FF), ref: 00E42520
                                              • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(00000000,00000000,?,?,00E3B7F3,00EBED7D,000000FF), ref: 00E42594
                                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000000,00000000,?,?,00E3B7F3,00EBED7D,000000FF,?,00E3DD9A,8E857614,00000000,?,?,?,00EBE890,000000FF), ref: 00E425EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@$?getloc@ios_base@std@@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@Vlocale@2@
                                              • String ID:
                                              • API String ID: 481934583-0
                                              • Opcode ID: c6176f99084d0cc9da882068764814c1eef1969b9957aeee78bddaf5edd2c35d
                                              • Instruction ID: b0941ce90948d14d39f683ff05276d6180b75ad26bdaaa719b0f7f3a0d6a7f20
                                              • Opcode Fuzzy Hash: c6176f99084d0cc9da882068764814c1eef1969b9957aeee78bddaf5edd2c35d
                                              • Instruction Fuzzy Hash: D4619870A04245DFCB14CF59D494BAABBF1FF08308F1441ACEA16AB7A2C775E904CB51
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,?,?,?,00000030,?,00E4452B,?,?,?,00E467E0), ref: 00E4A2D7
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • memmove.VCRUNTIME140(00000000,?,00E4452B,?,00000030,?,00E4452B,?,?,?,00E467E0), ref: 00E4A2E6
                                              • memmove.VCRUNTIME140(?,00E4452B,?,00000000,?,00E4452B,?,00000030,?,00E4452B,?,?,?,00E467E0), ref: 00E4A2FC
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000030,?,00E4452B,?,?,?,00E467E0), ref: 00E4A351
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4A35C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: e7c96c9f4ceb6cbb73ef57cc65851b95199e7bb06082759a348c37db8faf2490
                                              • Instruction ID: 82efd3b4a002097608f59c741ddd3680897d264f2a2a1754622a2c5e356c537c
                                              • Opcode Fuzzy Hash: e7c96c9f4ceb6cbb73ef57cc65851b95199e7bb06082759a348c37db8faf2490
                                              • Instruction Fuzzy Hash: A441E171B405119FD704EF7CE8949AEB7E8EB483247285239E825E3351EB70EE008791
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,?,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00E4C11B
                                              • memmove.VCRUNTIME140(00000000,?,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00E4C12A
                                              • memmove.VCRUNTIME140(?,?,?,00000000,?,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00E4C140
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,00000000), ref: 00E4C197
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4C19D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 2016347663-0
                                              • Opcode ID: 31b6231e7ae152454832e30b10e47be01bda564a72db968d5df325d072845320
                                              • Instruction ID: 7cb5979f4bbdd90b21b7012af75acbb23afb1dcd9661111801638fd3012fc4a4
                                              • Opcode Fuzzy Hash: 31b6231e7ae152454832e30b10e47be01bda564a72db968d5df325d072845320
                                              • Instruction Fuzzy Hash: 5B41D3B2A015019FD708DF78DC958AEB7B5EF48310B249639E816E3385E730EE51CB81
                                              APIs
                                              • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z.MSVCP140(00000001,8E857614,?,?), ref: 00E4650E
                                              • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(?,?), ref: 00E4654E
                                              • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(?,?), ref: 00E46576
                                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000000,00000000,?,?), ref: 00E46622
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: D@std@@@std@@U?$char_traits@$?sbumpc@?$basic_streambuf@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@Ipfx@?$basic_istream@
                                              • String ID:
                                              • API String ID: 926534625-0
                                              • Opcode ID: ad73cebc1c013c342c3550becf30f4d19b087e3cb44da520351c5cec32d46445
                                              • Instruction ID: bb369139627f9077b4f8866a6717e74f92a18191cad7957f86d128456172039a
                                              • Opcode Fuzzy Hash: ad73cebc1c013c342c3550becf30f4d19b087e3cb44da520351c5cec32d46445
                                              • Instruction Fuzzy Hash: 5351CE34A04240CFCB14CF19D584BA9BBF1FF5A308F2485ADE406AB7A2C776AD05CB51
                                              APIs
                                              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(8E857614,00000000,7FFFFFFF), ref: 00E3DC5B
                                              • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140(?,00000000,00000000), ref: 00E3DC79
                                              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140 ref: 00E3DCA3
                                              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ.MSVCP140 ref: 00E3DCB9
                                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(00000002,00000000,00E3C7AF,0000000A), ref: 00E3DCFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?setstate@?$basic_ios@D@std@@@1@_Init@?$basic_streambuf@V?$basic_streambuf@
                                              • String ID:
                                              • API String ID: 1830095303-0
                                              • Opcode ID: 46a161a221ed7e7e047d0144391f670d0903469dd4cf6992fc9e7dba0e2ee53e
                                              • Instruction ID: 4fbe16cd8c0fe3fd521b1f8b5ab0a7fce9bba1c2989364410774ba0125ad7753
                                              • Opcode Fuzzy Hash: 46a161a221ed7e7e047d0144391f670d0903469dd4cf6992fc9e7dba0e2ee53e
                                              • Instruction Fuzzy Hash: CF316674A00345DFCB14CF49D988B5AFBF8FB49308F10816EE806A7791C7B2A905CB90
                                              APIs
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5D48,?,?,?,76230E50), ref: 00E21607
                                              • __std_exception_copy.VCRUNTIME140(?,00000000,?,?,?,00ED5D48,?,?,?,76230E50), ref: 00E2162E
                                              • _callnewh.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F43
                                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5CAC,?), ref: 00E64ABF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$__std_exception_copy_callnewhmalloc
                                              • String ID:
                                              • API String ID: 3601187372-0
                                              • Opcode ID: f2040869db30936c275dd8199aea148d800f5db3373281544fd1f224347c8fed
                                              • Instruction ID: 98406b63cebb348e0489792df7c3aa94287fa8b3b0755294cdcabc53358741dd
                                              • Opcode Fuzzy Hash: f2040869db30936c275dd8199aea148d800f5db3373281544fd1f224347c8fed
                                              • Instruction Fuzzy Hash: 5C112171D4430D6BCB14ABB8EC02DDA77ACDE01790F2065A5F914F6082FB70EA5683D4
                                              APIs
                                              • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000001,00000000,754B7170,?,00000088,00E75CD5,CURL_SSL_BACKEND,00000000,754B7170,00E74947,00000000,00E76F50), ref: 00E929CB
                                              • GetEnvironmentVariableA.KERNEL32(?,00000000,00000001,00000000,00E76F50,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E929EA
                                              • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E92A08
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,00E76F50,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E92A18
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E92A30
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: freerealloc$EnvironmentVariable
                                              • String ID:
                                              • API String ID: 4071857516-0
                                              • Opcode ID: a86570c720b642c7b56a5e16ff65657281b278a1755d2e4610fc5e14aca260f7
                                              • Instruction ID: 12e39b29ebd61b38e7e60589cad6adb1bfbe18fef6449a2b310c1c5ec7b2b184
                                              • Opcode Fuzzy Hash: a86570c720b642c7b56a5e16ff65657281b278a1755d2e4610fc5e14aca260f7
                                              • Instruction Fuzzy Hash: 46017137A021246F8E31279A7C489ABBB98DBC567770A007AFF09F3201DA675C1991E1
                                              APIs
                                              • DeleteCriticalSection.KERNEL32(?,?,00E6F764,?,?,00000000,00000088,00E76784,00000000), ref: 00E6F7BD
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00000088,00E76784,00000000), ref: 00E6F7C6
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E6F764,?,?,00000000,00000088,00E76784,00000000), ref: 00E6F7D2
                                              • closesocket.WS2_32(?), ref: 00E6F7F4
                                              • memset.VCRUNTIME140(?,00000000,00000090), ref: 00E6F802
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$CriticalDeleteSectionclosesocketmemset
                                              • String ID:
                                              • API String ID: 1764800466-0
                                              • Opcode ID: f56b30b2c8548b0d1f0dafb7585887612fdc503b73afecfd9eadd7e852080c76
                                              • Instruction ID: c0469c7f7af88398e4ad60b3752274ae338e1116d0c72e56ae13c9a58cd7312c
                                              • Opcode Fuzzy Hash: f56b30b2c8548b0d1f0dafb7585887612fdc503b73afecfd9eadd7e852080c76
                                              • Instruction Fuzzy Hash: 29F05EB0900700AFD6205B69BC49E8737A8AF01758F041835F94BF22A2D732F859C691
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(0000000F,?,00000000,00E6E6B8,?,00000088,00000088), ref: 00E6DD55
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6DD5E
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00E6DD67
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6DD70
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6DD79
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E6DD80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 4d5d2676bc5f16984a834bc88c7c8bd1d42c626cd725a583cd851aa3e39ab320
                                              • Instruction ID: b32557f99c5df03a58a7c325f33107958708c36d9fa6d447a2f094c553f45048
                                              • Opcode Fuzzy Hash: 4d5d2676bc5f16984a834bc88c7c8bd1d42c626cd725a583cd851aa3e39ab320
                                              • Instruction Fuzzy Hash: 46F01C32402610AFCB212F56FC0889A7BB1FF447553054559F95E7A172C732A89D9BD0
                                              APIs
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00E40749
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • _CxxThrowException.VCRUNTIME140(00000000,00000000,?,?,?), ref: 00E409F9
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E409FE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_taskExceptionThrow_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID: m
                                              • API String ID: 3455115287-2577643605
                                              • Opcode ID: d66e7801b2df12347df8a6431fa59cdca4720e22a3b2cba38708b76c6e282c96
                                              • Instruction ID: 1e0e6e67b1162e5c5d95d22179fac718179760788a45fe71079873d1fe76b27a
                                              • Opcode Fuzzy Hash: d66e7801b2df12347df8a6431fa59cdca4720e22a3b2cba38708b76c6e282c96
                                              • Instruction Fuzzy Hash: BFD146B1E002588FDB14DFA8D8846EEFBF1AF98314F24912AD955BB352D730A945CF90
                                              APIs
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000002,00000000,00ECF9E8,00000002,?,?,?,00000001,00000000,00ECF9EC,00000001,?,?,[json.exception.,00000010,?), ref: 00E2FAB9
                                              • __std_exception_destroy.VCRUNTIME140(0000000F,?,?,8E857614,?,?), ref: 00E2FB01
                                              • __std_exception_destroy.VCRUNTIME140(?,?,8E857614,?,?), ref: 00E2FB11
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                                • Part of subcall function 00E2DFC0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?), ref: 00E2E0DF
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,00000000,?,?), ref: 00E2E0E7
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(7FFFFFFF,?,?,00000000,?,00000000,?,?), ref: 00E2E0F3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$__std_exception_destroy_invalid_parameter_noinfo_noreturn
                                              • String ID: [json.exception.
                                              • API String ID: 1357646913-791563284
                                              • Opcode ID: 0c5f256a81c7b3822ab81c5c820e40878ca77c24cbdf9385b38eb5aeece82493
                                              • Instruction ID: 1f8f816fd074f13ab455fb488c2c0d13d7e0d15a6b2cf49328d346a1390ca6f9
                                              • Opcode Fuzzy Hash: 0c5f256a81c7b3822ab81c5c820e40878ca77c24cbdf9385b38eb5aeece82493
                                              • Instruction Fuzzy Hash: 8A910671D002489FDB08DFA8DD45BEEBBB5EF45304F24822DE414BB692D770AA85CB91
                                              APIs
                                              • memmove.VCRUNTIME140(?,, column ,00000009,?, at line ,00000009,?,?,?,?,?,?,8E857614,?,?), ref: 00E300E4
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,7FFFFFFF,00000000,?,?), ref: 00E2E08E
                                                • Part of subcall function 00E2DFC0: memmove.VCRUNTIME140(00000000,?,?,00000000,7FFFFFFF,00000000,?,?), ref: 00E2E09C
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,00000009,00000000,, column ,00000009,?, at line ,00000009,?,?,?,?,?,?), ref: 00E30229
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$_invalid_parameter_noinfo_noreturn
                                              • String ID: at line $, column
                                              • API String ID: 2580228974-191570568
                                              • Opcode ID: c78f8ee05acab88501193314fc5518fd72e5a63044a5eee627e1a04f455b903e
                                              • Instruction ID: 91bf02f2dffdc26f311c20130bee688b7ce7b6ad51554915edd2ff26fd93ec0c
                                              • Opcode Fuzzy Hash: c78f8ee05acab88501193314fc5518fd72e5a63044a5eee627e1a04f455b903e
                                              • Instruction Fuzzy Hash: A791D171E002488FDB18CFA8DC99BEEBBB5EF45304F248259E415BB392D7749A85CB50
                                              APIs
                                              • memmove.VCRUNTIME140(?,00000001,00000001), ref: 00E35576
                                              • memmove.VCRUNTIME140(000000FF,?,00000000), ref: 00E35679
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,?,00000000), ref: 00E356BE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$_invalid_parameter_noinfo_noreturn
                                              • String ID: signature
                                              • API String ID: 2580228974-2928148801
                                              • Opcode ID: c3c3c61cd92a45c621a580ad806ed713dbbda863ebb54284eff43fc897c8988c
                                              • Instruction ID: 2db1d5cf043bc009fb99016f3d4fd82bfb5e169c93d82b5f8d4b6e2291790da6
                                              • Opcode Fuzzy Hash: c3c3c61cd92a45c621a580ad806ed713dbbda863ebb54284eff43fc897c8988c
                                              • Instruction Fuzzy Hash: 6681C272D005089FCB18DFA8DC95BEEBBB5EF45304F249219E815BB385D730AA46CB91
                                              APIs
                                                • Part of subcall function 00E2E120: memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                                • Part of subcall function 00E3F790: memmove.VCRUNTIME140(00000000,00000000,?,?,00000000,?,?,00E324D2,?,?,00000000,00000000,?,?,0000000F,00000000), ref: 00E3F7CF
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E30412
                                              • __std_exception_copy.VCRUNTIME140(?,?), ref: 00E3045C
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 00E30498
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturnmemmove$__std_exception_copy
                                              • String ID: out_of_range
                                              • API String ID: 2013804569-3053435996
                                              • Opcode ID: 45c0958f4f8039baf9ca03393224365793e9eff6dfff78bbff21f928806f5615
                                              • Instruction ID: b92ebdba7bf704c9b36f9c60d335e0f6d3a508b568a969692a76be8731883f51
                                              • Opcode Fuzzy Hash: 45c0958f4f8039baf9ca03393224365793e9eff6dfff78bbff21f928806f5615
                                              • Instruction Fuzzy Hash: F451C471D002489FDB08DFA8DC95BADBBB4FF85314F148319E525BB681E774AA84CB90
                                              APIs
                                              • __current_exception.VCRUNTIME140 ref: 00E64C7C
                                              • __current_exception_context.VCRUNTIME140 ref: 00E64C86
                                              • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E64C8D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: __current_exception__current_exception_contextterminate
                                              • String ID: csm
                                              • API String ID: 2542180945-1018135373
                                              • Opcode ID: 6e0cd085d4f968ffdaaa73632ad8b8aa1ce9f75291e59383da7947cc97b2dcb0
                                              • Instruction ID: 2006ab97966750920e450c33858ac00ad6d67bc039775aebeb7d31c038fbd8f1
                                              • Opcode Fuzzy Hash: 6e0cd085d4f968ffdaaa73632ad8b8aa1ce9f75291e59383da7947cc97b2dcb0
                                              • Instruction Fuzzy Hash: FBF027B10412058BDB305EA9A40444AFBADAE107A43642615E848EB764C730EE51C6D2
                                              APIs
                                              • memset.VCRUNTIME140(?,00000030,?), ref: 00E30924
                                              • memmove.VCRUNTIME140(?), ref: 00E30954
                                              • memmove.VCRUNTIME140 ref: 00E3097B
                                              • memset.VCRUNTIME140(?,00000030), ref: 00E30990
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmovememset
                                              • String ID:
                                              • API String ID: 1288253900-0
                                              • Opcode ID: 3b26b7cd52328fb2d4af8e63db6303faed9bafb032100bbec1e8b9a1c558cbb0
                                              • Instruction ID: 0caa8529ebf844cb69f4b5b3874484d5e5c9292a66df0a90cdef86cbbccae081
                                              • Opcode Fuzzy Hash: 3b26b7cd52328fb2d4af8e63db6303faed9bafb032100bbec1e8b9a1c558cbb0
                                              • Instruction Fuzzy Hash: 0851F737A052069FD710CE6DD886BD6FB99EBD5310F5842BBD848D7342E262E919C390
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00EBEA7D,000000FF), ref: 00E3F5CE
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E3F61B
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E3F625
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task$memmove
                                              • String ID:
                                              • API String ID: 3458649463-0
                                              • Opcode ID: d2ba755b0d2aaf04c313ce2e8dd30c4920329dc15b03bbccf3a353a90170a1a4
                                              • Instruction ID: 6dcc2a99f2698694f7ad665cc5f4dbe2646414e6fb8855b0d4d22e87dda014a2
                                              • Opcode Fuzzy Hash: d2ba755b0d2aaf04c313ce2e8dd30c4920329dc15b03bbccf3a353a90170a1a4
                                              • Instruction Fuzzy Hash: DDC147B1D00259DFCB00CF68D49469EFBF0BF49314F2891AAE819AB352D775A946CF90
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB1E6A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB1E8F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00EA8421,000002E0,00E72EB8,00E76AAE,00E72EB8,00000000,?,00000000,00E72EB8,00000000,00000000,00000000,?), ref: 00EB1EB1
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB1EC1
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB1ED8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 7e03b62c927bdee6296c74eed186386047ac5ff9917f13d7888d89e6b9f84bfb
                                              • Instruction ID: d86f0ef23c875301085a01bef0582aaff2747ace244fa360ab55f3c95f0cad2a
                                              • Opcode Fuzzy Hash: 7e03b62c927bdee6296c74eed186386047ac5ff9917f13d7888d89e6b9f84bfb
                                              • Instruction Fuzzy Hash: D611D3B0101B019FEB609F25ED48B47BBF4FF08309F405859E89AA6AA1C776F858DF51
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(000006E0,000006E0,00000000,?,00000088,00E76711,000006E0,00000000,000006E0,?,00000000,00000001,000008A0,00000000,00000088), ref: 00E7F86D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,00E76711,000006E0,00000000,000006E0,?,00000000,00000001,000008A0,00000000,00000088), ref: 00E7F876
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(000006E0,?,00000088,00E76711,000006E0,00000000,000006E0,?,00000000,00000001,000008A0,00000000,00000088), ref: 00E7F87D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000088,00000000,?,00000088,00E76711,000006E0,00000000,000006E0,?,00000000,00000001,000008A0,00000000,00000088), ref: 00E7F88D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000088,?,00000088,00E76711,000006E0,00000000,000006E0,?,00000000,00000001,000008A0,00000000,00000088), ref: 00E7F894
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 7399856b057b3c8644dd1d06d79f1d3a605a7dc0243b2aad50761005bc17338c
                                              • Instruction ID: b28af62d3d6edb26188a834f1ee43bb7cacc1943140cd8605400b31ffc30aa24
                                              • Opcode Fuzzy Hash: 7399856b057b3c8644dd1d06d79f1d3a605a7dc0243b2aad50761005bc17338c
                                              • Instruction Fuzzy Hash: D4F05E36101200FFDB115F46FC48A8ABB79FF84325B148136FE1D6B222C732A9688B91
                                              APIs
                                                • Part of subcall function 00E639EA: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(00E41BB3,8E857614,?,00E34792), ref: 00E639EA
                                              • memmove.VCRUNTIME140(?,?,00000001), ref: 00E316DA
                                              • memmove.VCRUNTIME140(?,?,00000002), ref: 00E31746
                                              • memmove.VCRUNTIME140(?,?,00000000,00ECFAF4,?,?,00000002,00000000,?,00000002), ref: 00E317EB
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000022,?,?,00000002,00000000,?,00000002), ref: 00E318AC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$___lc_codepage_func_invalid_parameter_noinfo_noreturn
                                              • String ID:
                                              • API String ID: 4026628035-0
                                              • Opcode ID: 62d3d7ffb6f99008adb4ba5cefdf3f62aaeeeffd2149004b910174bff721eac5
                                              • Instruction ID: 78c632467db12cc1d4ee54cf88474bb183dc0164103a9c3cf5185d9bea7e6b05
                                              • Opcode Fuzzy Hash: 62d3d7ffb6f99008adb4ba5cefdf3f62aaeeeffd2149004b910174bff721eac5
                                              • Instruction Fuzzy Hash: E8B1D170E002049FDB28DF68D888BAEBBF5FF89704F14866DE412A7741D770A945CB95
                                              APIs
                                              • strchr.VCRUNTIME140(?,?,0123456789abcdef,?,?), ref: 00E92F50
                                              • strchr.VCRUNTIME140 ref: 00E92F6A
                                                • Part of subcall function 00E92E30: strchr.VCRUNTIME140(0123456789,00ECF8DC,?,000006E0,00ECF8DC,?,?,00E92E2C,00000017,00000017), ref: 00E92E5C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: strchr
                                              • String ID: 0123456789ABCDEF$0123456789abcdef
                                              • API String ID: 2830005266-885041942
                                              • Opcode ID: 48d874c7faca52c854c188603e672a26c11d33a83b66e077720037728d7755ef
                                              • Instruction ID: c14b055a9d7e65f2f7433159a70b614948e8b9ff0f0cf162d4c3317609ae63d6
                                              • Opcode Fuzzy Hash: 48d874c7faca52c854c188603e672a26c11d33a83b66e077720037728d7755ef
                                              • Instruction Fuzzy Hash: 4D51B171A083418BCB24DF28C58056FFBF1AF99348F446A1EF499A7201E721EA48C793
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,00000000,00E34792,?,00000000), ref: 00E4276D
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000), ref: 00E427D5
                                              • memmove.VCRUNTIME140(00000000,?,00E34792,?,00000000), ref: 00E427DD
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E42815
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: 94bb9ae92674918551655af86da5098029faa47e5a31f3466db0702d6b55e1fe
                                              • Instruction ID: 662e89318646127817a7d2fea8ee4a6ec291ec3e8b2bbdfd10609f345c4e5fcf
                                              • Opcode Fuzzy Hash: 94bb9ae92674918551655af86da5098029faa47e5a31f3466db0702d6b55e1fe
                                              • Instruction Fuzzy Hash: 8241D371A002199BCB08DF68E8859AEB3A5EF58314B64567EFA12E7355E730AD108790
                                              APIs
                                              • memset.VCRUNTIME140(?,00000000,?,00000030), ref: 00E4A448
                                              • memmove.VCRUNTIME140(00000000,?,?,00000030), ref: 00E4A47A
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000030), ref: 00E4A4D8
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4A4DE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemmovememset
                                              • String ID:
                                              • API String ID: 2090792099-0
                                              • Opcode ID: dd2579ba17643f793b4a69a94852f71da0653e867f9a34148792cf53b72a54fa
                                              • Instruction ID: 56cd74610712ed40fb6ced82ee2defe46949ea562ba64f9fa9a7cae4d4138534
                                              • Opcode Fuzzy Hash: dd2579ba17643f793b4a69a94852f71da0653e867f9a34148792cf53b72a54fa
                                              • Instruction Fuzzy Hash: A341EA719401059FC714DF78E889AAEB7B5FF44320F289639E825B7245E770EE14CB91
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,00000001,00000002), ref: 00E22993
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E229DE
                                              • memmove.VCRUNTIME140(00000000,?,00000002), ref: 00E229E6
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E22A0E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: a515b279bab5261a53ddccce132c0b794915c089c5d1bb1301ed1c628bf71817
                                              • Instruction ID: 2d6147d9da2e4f3c149a0f8545561a4f6b5892027c5e07e76dd132000c13f2ea
                                              • Opcode Fuzzy Hash: a515b279bab5261a53ddccce132c0b794915c089c5d1bb1301ed1c628bf71817
                                              • Instruction Fuzzy Hash: F3414B72A002609FCB15DF78E880AAEB7A6EFD5300F2452BDE905EB345D631DE51C791
                                              APIs
                                              • memmove.VCRUNTIME140(?,?,00E3AFF8,00000000,?,?,00E3AFF8,?,?), ref: 00E4128D
                                              • memmove.VCRUNTIME140(00000023,?,00E3AFF8,?,00E3AFF8,?,?), ref: 00E41332
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00E3AFF8,?,?), ref: 00E4137F
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4138A
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: 3bb8eb8bc7e0b791fd61b018213970ba3914a5600e80765be29734348c4191db
                                              • Instruction ID: 6edd9cb47e80f7b7d119016b5a995913fd11a0c9b9a7e2346147d90fcbfef30e
                                              • Opcode Fuzzy Hash: 3bb8eb8bc7e0b791fd61b018213970ba3914a5600e80765be29734348c4191db
                                              • Instruction Fuzzy Hash: 84313771A002409BCB249F78E8809ADF7E9EF55350F2453BEF825EB791D7709D808791
                                              APIs
                                              • memmove.VCRUNTIME140(00E34792,00E34792,?,?,00000000,?,00E34792,?), ref: 00E41A91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: fed5af6bce38a1996c96ca846d6e2233bd39e7460abbbdbf9a7c8c5d9cd6bf1e
                                              • Instruction ID: 25d86af29efe0dd5e640c8821c658e8a88906c62602e990d0a2765980c199869
                                              • Opcode Fuzzy Hash: fed5af6bce38a1996c96ca846d6e2233bd39e7460abbbdbf9a7c8c5d9cd6bf1e
                                              • Instruction Fuzzy Hash: 7031F672B013048BDB309F68E84076AFBE8DF95325F2406BEE855D7291E7718A9487A1
                                              APIs
                                              • memmove.VCRUNTIME140(00000000,?,00E316C1,?,00E316C0,?), ref: 00E4227A
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00E316C0,?), ref: 00E422B7
                                              • memmove.VCRUNTIME140(00000000,?,00E316C1,?,00E316C0,?), ref: 00E422BF
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E422D9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: 6c7a25c44f4af587a2154a7620f7e33e08b1a5f2f26142f9c549bfdaf5a5d286
                                              • Instruction ID: 85e02e273be911c72ed3a2a10c25d9f0545f455dd4a101446c3462ddbc0a7ae4
                                              • Opcode Fuzzy Hash: 6c7a25c44f4af587a2154a7620f7e33e08b1a5f2f26142f9c549bfdaf5a5d286
                                              • Instruction Fuzzy Hash: 67314973E001108BCB189F7CA8805AEB7E9EB94350B6452BDFA15FB315EA70DE4087D5
                                              APIs
                                              • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,000000FF), ref: 00E22815
                                              • memmove.VCRUNTIME140(00000000,?,?,?,?,?,?,?,?,000000FF), ref: 00E228AF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove
                                              • String ID:
                                              • API String ID: 2162964266-0
                                              • Opcode ID: c6b1b097ccdcbb120878918d7bb2e89284e5723735a95cf76d9fbdb757e851d4
                                              • Instruction ID: 18584ace6bf4db6c6d5ee06a1dea3c586a75cb936ef4e7566776615e2dc51501
                                              • Opcode Fuzzy Hash: c6b1b097ccdcbb120878918d7bb2e89284e5723735a95cf76d9fbdb757e851d4
                                              • Instruction Fuzzy Hash: AC210E71D00320ABC71CAF68A84499E77E8EF95360B20126DF92AA7391E771DD0087D1
                                              APIs
                                                • Part of subcall function 00E31460: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E3156E
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5DCC,?,?,00000000,?,create_directory,8E857614,00000000), ref: 00E31C2F
                                              • _CxxThrowException.VCRUNTIME140(?,00ED5DCC,?,?,?,current_path(),8E857614,?,?), ref: 00E31CB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$_invalid_parameter_noinfo_noreturn
                                              • String ID: create_directory$current_path()
                                              • API String ID: 2822070131-686078018
                                              • Opcode ID: dd392a8bd81d44a55ea68df0a49f48e18531a0d7b46f5b34a98e345360c03fe9
                                              • Instruction ID: b82b0bf9af2bd33e64dbb5e2328f21b7caeffb958748e9c15692d1a2444ff74b
                                              • Opcode Fuzzy Hash: dd392a8bd81d44a55ea68df0a49f48e18531a0d7b46f5b34a98e345360c03fe9
                                              • Instruction Fuzzy Hash: 692153B1900218ABCB10DF55DD45FDBBBBCFB19720F145265F925B3291EB70BA08CAA1
                                              APIs
                                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F,00000000,00000000), ref: 00E4380B
                                              • memmove.VCRUNTIME140(?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D,?,00000001,0000000F), ref: 00E4382F
                                              • memmove.VCRUNTIME140(?,?,DCC8DA8D,?,?,?,DCC8DA8D,?,?,?,?,?,?,?,?,DCC8DA8D), ref: 00E43840
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E4385A
                                                • Part of subcall function 00E63F3B: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00E2E1C8,?,?,?,?,76230E50), ref: 00E63F50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
                                              • String ID:
                                              • API String ID: 2075926362-0
                                              • Opcode ID: f853bbc619d63335e108189a089f4307531bfbc62d2d997d1cdcc55acd44d15c
                                              • Instruction ID: 2bae6914108030a8e78ce79e3d17056ad29304da71ee5150b97d38aaba034b0e
                                              • Opcode Fuzzy Hash: f853bbc619d63335e108189a089f4307531bfbc62d2d997d1cdcc55acd44d15c
                                              • Instruction Fuzzy Hash: 5931B2B1E002049BDB189F78E891AAFB7E5AF98340F24526AF815A7281D731DE108B91
                                              APIs
                                              • memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E152
                                              • memmove.VCRUNTIME140(?,76230E50,?,?,?,?,76230E50), ref: 00E2E1DB
                                              • Concurrency::cancel_current_task.LIBCPMT ref: 00E2E1F8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: memmove$Concurrency::cancel_current_task
                                              • String ID:
                                              • API String ID: 1247048853-0
                                              • Opcode ID: d2fd596ef7b222303cb1710d7981642fb9a812cb1f1cd670c780353434ca562e
                                              • Instruction ID: 83ff4f7c5762ddbfc4a4447f8e4a7472b1fbba718630e0c292da95caf6c50e0c
                                              • Opcode Fuzzy Hash: d2fd596ef7b222303cb1710d7981642fb9a812cb1f1cd670c780353434ca562e
                                              • Instruction Fuzzy Hash: 6A2130729022349BD7149F68F8816AFBBD8EF55360F101276E815EB391D6308D6187D2
                                              APIs
                                              • memmove.VCRUNTIME140(00000010,?,00000000,?,?,?,80070057,?), ref: 00E4E6EC
                                              • memset.VCRUNTIME140(00000010,00000000,00000000,?,?,?,80070057,?), ref: 00E4E6F9
                                              • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,80070057,?), ref: 00E4E701
                                              • _invalid_parameter_noinfo.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,80070057,?), ref: 00E4E70D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _errno_invalid_parameter_noinfomemmovememset
                                              • String ID:
                                              • API String ID: 524079128-0
                                              • Opcode ID: b0a4ba775a4e63c9aeffc312e8cbe313ef8a5e959d6be8ccd64d7ef305081c4e
                                              • Instruction ID: fef47bff234939af27fdf98a84d9f143cb0eacde1f7655323928769f9cff9a2d
                                              • Opcode Fuzzy Hash: b0a4ba775a4e63c9aeffc312e8cbe313ef8a5e959d6be8ccd64d7ef305081c4e
                                              • Instruction Fuzzy Hash: 33213D75A01605EFD714DF68D889AADB7F4FF49350B1041AAE905E7361EB30ED01CB91
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00E76F50,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00E75D19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID: CURL_SSL_BACKEND$Po
                                              • API String ID: 1294909896-1262323336
                                              • Opcode ID: e16226b38afc028d66cbac7195309724232f654dab2d91fe8aae4be5936c4d67
                                              • Instruction ID: e5b51f7f129c07741da8f620f7842e8d42af2d092ea14c39a628302cde67ad4b
                                              • Opcode Fuzzy Hash: e16226b38afc028d66cbac7195309724232f654dab2d91fe8aae4be5936c4d67
                                              • Instruction Fuzzy Hash: EA01C4726032129FD7249B66BD4CB6737F4EB80709F06506EED09B3252E772C80ACA91
                                              APIs
                                              • QueryPerformanceCounter.KERNEL32(754B6BF0,754B6BF0,?,?,754B6BF0), ref: 00E6ED63
                                              • __alldvrm.LIBCMT ref: 00E6ED7D
                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E6EDA4
                                              • GetTickCount.KERNEL32 ref: 00E6EDC1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                              • String ID:
                                              • API String ID: 1296068966-0
                                              • Opcode ID: aa2a3b3255819f07403008baa1f6960b6d33c0f3842cd8f52397d0084eee792f
                                              • Instruction ID: 6bcf709e76c731b97c2fcf71badc9240ada65ebc576e2124fb8ee2294e3f3d57
                                              • Opcode Fuzzy Hash: aa2a3b3255819f07403008baa1f6960b6d33c0f3842cd8f52397d0084eee792f
                                              • Instruction Fuzzy Hash: B511E571508309AFC705EF78FD45A2A7FE9EB88300F54446EF508D6261E632A91ADB15
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,00000400,8E857614,00000000,00000000,00000000,00000000,00000000,?,?,?,00E4195C,00000000,?,00000000,00000000), ref: 00E63B0C
                                              • GetLastError.KERNEL32(?,00E4195C,00000000,?,00000000,00000000,00000000,8E857614,?,?), ref: 00E63B18
                                              • WideCharToMultiByte.KERNEL32(?,00000000,8E857614,00000000,00000000,00000000,00000000,00000000,?,00E4195C,00000000,?,00000000,00000000,00000000,8E857614), ref: 00E63B3E
                                              • GetLastError.KERNEL32(?,00E4195C,00000000,?,00000000,00000000,00000000,8E857614,?,?), ref: 00E63B4A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: ByteCharErrorLastMultiWide
                                              • String ID:
                                              • API String ID: 203985260-0
                                              • Opcode ID: 79d7dda4fcb33329fdbf43d78782dc20894d18d63fe36e79b6fed69937dd69ad
                                              • Instruction ID: 799fdd420b6bca592f3d8748cb2f07a51566148d122bc8fc69f285af0312e5dc
                                              • Opcode Fuzzy Hash: 79d7dda4fcb33329fdbf43d78782dc20894d18d63fe36e79b6fed69937dd69ad
                                              • Instruction Fuzzy Hash: A8011232640156BF8F221F52EC08DDB3E6AEBD97E0B145124FE05A6121C632CD32E7A0
                                              APIs
                                              • _dclass.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00E403F1
                                              • _dsign.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00E40415
                                                • Part of subcall function 00E30900: memset.VCRUNTIME140(?,00000030,?), ref: 00E30924
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: _dclass_dsignmemset
                                              • String ID: null
                                              • API String ID: 2282577375-634125391
                                              • Opcode ID: e35b1269e6ad51c112e16576f05f3eb373fb01742b7a61f4bfac76e671e0f9ea
                                              • Instruction ID: 0f4ba338eb95a8aae2d1aeb8d9c7ecd11386ff3a3e4cef0bb3a35c357d323241
                                              • Opcode Fuzzy Hash: e35b1269e6ad51c112e16576f05f3eb373fb01742b7a61f4bfac76e671e0f9ea
                                              • Instruction Fuzzy Hash: 6C61AD71C0061D8BDB01DFA8C9416EDFBB0FF59314F149369E955BB252EB30AA98CB90
                                              APIs
                                                • Part of subcall function 00EBC5E5: memset.VCRUNTIME140(?,00000000,00000018,?,?,00EBC59A,?,00E2151A), ref: 00EBC5F2
                                                • Part of subcall function 00E30F40: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,?,00ED5E4C), ref: 00E30F45
                                                • Part of subcall function 00E30F40: GetLastError.KERNEL32(?,00000000,00000000,?,00ED5E4C), ref: 00E30F4F
                                              • IsDebuggerPresent.KERNEL32(?,?,?,00E2151A), ref: 00EBC5C5
                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E2151A), ref: 00EBC5D4
                                              Strings
                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EBC5CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionStringmemset
                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                              • API String ID: 4206453544-631824599
                                              • Opcode ID: fccb6e8aacf909edde08d3a93aa0e53cec578213c5a1b2bd1bb428a92936eb8b
                                              • Instruction ID: a48fdf7b1a2ca5358e4d027ee24f53eeca09184f0e6b7c387afbbd39436403f9
                                              • Opcode Fuzzy Hash: fccb6e8aacf909edde08d3a93aa0e53cec578213c5a1b2bd1bb428a92936eb8b
                                              • Instruction Fuzzy Hash: 21E092702053118FD7309F25E509F437BE4AF04304F10986EE886F7652EBB5E449CB91
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,00000088,00E7692E,00000000,00000D30), ref: 00E76B44
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E76B68
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E76B8D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00E76BBB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 835b50fb5155357e5bf6b8b7152e6f7e9ae1a5e38ad09eaf2aeaa46014d3cfb6
                                              • Instruction ID: d83eee4b326b26da68af029c4865c764c97d6edbde0d99aa500fb9f2d030f4c6
                                              • Opcode Fuzzy Hash: 835b50fb5155357e5bf6b8b7152e6f7e9ae1a5e38ad09eaf2aeaa46014d3cfb6
                                              • Instruction Fuzzy Hash: 2B115EB1501A41AFEB298F34ED48BC1FBA4FF05308F040225D95D66261DB367468CBD5
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB231A
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB233F
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00EA7805,00000368,00E72EB8,00E76AB4,00E72EB8,00E72EB8,00000000,?,00000000,00E72EB8,00000000,00000000,00000000), ref: 00EB2361
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000088,?,?,?,?,00E6A1C4,?,?,00E70088,?), ref: 00EB2371
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 6301876eed6ff2bedb2fc478111f05c9af27bf3b9c3ad5dace4dffb2a6edfad4
                                              • Instruction ID: f5427e1b10ba784769ff2ea144e82fff92f58e80ba00e184fbf716849c6b69af
                                              • Opcode Fuzzy Hash: 6301876eed6ff2bedb2fc478111f05c9af27bf3b9c3ad5dace4dffb2a6edfad4
                                              • Instruction Fuzzy Hash: AF01C2B0101B019FD7609F25ED48B43BBF0FF04308F009819E89A96AA1C776F8589F50
                                              APIs
                                                • Part of subcall function 00E7F170: free.API-MS-WIN-CRT-HEAP-L1-1-0(000008A0,00000000,000008A0,00E74F3E,?,00000000,000008A0,00E7ACB9,000008A0), ref: 00E7F185
                                                • Part of subcall function 00E7F170: free.API-MS-WIN-CRT-HEAP-L1-1-0(000008A0), ref: 00E7F192
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00E712DE
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00E712EE
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00E712FE
                                              • memset.VCRUNTIME140(?,00000000,00000170,?,?,?,?,?,?,?,?), ref: 00E7130C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free$memset
                                              • String ID:
                                              • API String ID: 2717317152-0
                                              • Opcode ID: d4374a5b71ed939fda7a5a1d59be682c6c7de5e9c829360cd697d565e6c9aaa2
                                              • Instruction ID: 282154ee115b6b4d933063727198c3af5f715286711c24e9973a4439133b745b
                                              • Opcode Fuzzy Hash: d4374a5b71ed939fda7a5a1d59be682c6c7de5e9c829360cd697d565e6c9aaa2
                                              • Instruction Fuzzy Hash: 97013171402B10AFD7625F61ED09B87BBE0BF05708F44581CF88E25AA2C7B6B498DB91
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000006DC,00000000,?,00000088,00E7673E,000006DC), ref: 00E8087D
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(000006DC,?,00000088,00E7673E,000006DC), ref: 00E80884
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,00000088,00E7673E,000006DC), ref: 00E80895
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000088,?,00000088,00E7673E,000006DC), ref: 00E8089C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 79021b0c77c6f7c66c1f072044a1192495b6eb78ae7b96eac165540f603c9da3
                                              • Instruction ID: 592b0beac45edf434ee920ef836578b07feb6f45c6e8bb0110d80e9e18b6d017
                                              • Opcode Fuzzy Hash: 79021b0c77c6f7c66c1f072044a1192495b6eb78ae7b96eac165540f603c9da3
                                              • Instruction Fuzzy Hash: DCF0A736001200BFCB015F05FC44A86B778FF84325B148026FD1D6B252C732A96C8BD0
                                              APIs
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,00E7F211,000008EC,000006DC,00E76752,00000000,?), ref: 00EB06B7
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EB06E2
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EB06F5
                                              • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00EB0705
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2217120169.0000000000E21000.00000020.00000001.01000000.00000006.sdmp, Offset: 00E20000, based on PE: true
                                              • Associated: 00000000.00000002.2217101327.0000000000E20000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217174343.0000000000EC1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217194865.0000000000ED9000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217207920.0000000000EDA000.00000008.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217243208.0000000000F26000.00000004.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F28000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              • Associated: 00000000.00000002.2217259570.0000000000F42000.00000002.00000001.01000000.00000006.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e20000_SecuriteInfo.jbxd
                                              Similarity
                                              • API ID: free
                                              • String ID:
                                              • API String ID: 1294909896-0
                                              • Opcode ID: 031d06e73e875e308729652fae6b7748a39aebf538f64c2962f046ce9fc325ca
                                              • Instruction ID: 8c8153861e46414b67b9951650c7fd93c7ce21aca28dbca2b3b34920153047ab
                                              • Opcode Fuzzy Hash: 031d06e73e875e308729652fae6b7748a39aebf538f64c2962f046ce9fc325ca
                                              • Instruction Fuzzy Hash: 33F0B7B0001701DFE7209F15FC08B86BBF0FF04309F108819E99A96661D776E8A8DF95