Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1545970
MD5:fd89c359ab4ac38da6cf7fe6dabdb457
SHA1:9c2a99beb692849ba3eb11d114334636df04f5ff
SHA256:a19257d178d7f240c830b29e8bb55d9b6320dc1b56795e4fa90267419ed4070c
Tags:exeuser-Bitsight
Infos:

Detection

CredGrabber, Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CredGrabber
Yara detected Meduza Stealer
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Suricata IDS alerts with low severity for network traffic
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 5592 cmdline: "C:\Users\user\Desktop\file.exe" MD5: FD89C359AB4AC38DA6CF7FE6DABDB457)
  • cleanup
{"C2 url": "109.172.94.66", "grabber_max_size": 1048576, "anti_vm": true, "anti_dbg": true, "self_destruct": false, "extensions": ".txt", "build_name": "Install", "links": "", "port": 15666}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
      00000000.00000003.2308893653.0000012A22260000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
        Process Memory Space: file.exe PID: 5592JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
          Process Memory Space: file.exe PID: 5592JoeSecurity_CredGrabberYara detected CredGrabberJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.3.file.exe.12a22260000.4.raw.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
              0.2.file.exe.12a22260000.0.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
                0.2.file.exe.12a22260000.0.raw.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
                  0.3.file.exe.12a22260000.4.unpackJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-31T11:10:07.468567+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649719TCP
                    2024-10-31T11:10:45.635342+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649724TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-31T11:09:55.586930+010020494411A Network Trojan was detected192.168.2.649717109.172.94.6615666TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-31T11:09:55.586930+010020508061A Network Trojan was detected192.168.2.649717109.172.94.6615666TCP
                    2024-10-31T11:09:55.592027+010020508061A Network Trojan was detected192.168.2.649717109.172.94.6615666TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-31T11:09:55.586930+010020508071A Network Trojan was detected192.168.2.649717109.172.94.6615666TCP
                    2024-10-31T11:09:55.592027+010020508071A Network Trojan was detected192.168.2.649717109.172.94.6615666TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.3.file.exe.12a22260000.4.unpackMalware Configuration Extractor: Meduza Stealer {"C2 url": "109.172.94.66", "grabber_max_size": 1048576, "anti_vm": true, "anti_dbg": true, "self_destruct": false, "extensions": ".txt", "build_name": "Install", "links": "", "port": 15666}
                    Source: file.exeReversingLabs: Detection: 13%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D3B40 CryptUnprotectData,LocalFree,0_2_0000012A222D3B40
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D3E40 CryptProtectData,LocalFree,0_2_0000012A222D3E40
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22298060 CryptUnprotectData,LocalFree,0_2_0000012A22298060
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22337090 CryptUnprotectData,0_2_0000012A22337090
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22337098 CryptProtectData,0_2_0000012A22337098
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49718 version: TLS 1.2
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22297350 FindFirstFileW,FindNextFileW,0_2_0000012A22297350
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231B6BC FindClose,FindFirstFileExW,GetLastError,0_2_0000012A2231B6BC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231B76C GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_0000012A2231B76C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22337100 FindFirstFileW,0_2_0000012A22337100
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E2D90 GetLogicalDriveStringsW,0_2_0000012A222E2D90
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\wtr\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2049441 - Severity 1 - ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt : 192.168.2.6:49717 -> 109.172.94.66:15666
                    Source: Network trafficSuricata IDS: 2050806 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M2 : 192.168.2.6:49717 -> 109.172.94.66:15666
                    Source: global trafficTCP traffic: 192.168.2.6:49717 -> 109.172.94.66:15666
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewASN Name: SUMTEL-AS-RIPEMoscowRussiaRU SUMTEL-AS-RIPEMoscowRussiaRU
                    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.6:49717 -> 109.172.94.66:15666
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49719
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49724
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: unknownTCP traffic detected without corresponding DNS query: 109.172.94.66
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E0CC0 InternetOpenA,InternetOpenUrlA,HttpQueryInfoW,HttpQueryInfoW,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,InternetCloseHandle,Concurrency::cancel_current_task,0_2_0000012A222E0CC0
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.a.0/sTy
                    Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.a.0/sTyN
                    Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c.0/ti
                    Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c.0/tiA
                    Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.hotosh
                    Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.hotoshN
                    Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adoraw-se
                    Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adoraw-seN
                    Source: file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.photo/
                    Source: file.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.photo/N
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/(
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orga
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: file.exe, 00000000.00000003.2334175402.0000012A22188000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334175402.0000012A22190000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334891313.0000012A2444A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335276853.0000012A22078000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
                    Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: file.exe, 00000000.00000003.2337982467.0000012A251A9000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335627750.0000012A22055000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334175402.0000012A22190000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334891313.0000012A2444A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335276853.0000012A22078000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                    Source: file.exe, 00000000.00000003.2334175402.0000012A22188000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org#
                    Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
                    Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
                    Source: file.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.6:49718 version: TLS 1.2
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E1580 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SHCreateMemStream,SelectObject,DeleteDC,ReleaseDC,DeleteObject,EnterCriticalSection,LeaveCriticalSection,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,0_2_0000012A222E1580
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E6060 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,0_2_0000012A222E6060
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223376D0 NtAllocateVirtualMemory,LdrEnumerateLoadedModules,0_2_0000012A223376D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223376C0 NtQuerySystemInformation,0_2_0000012A223376C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E5920 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,0_2_0000012A222E5920
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DD190 RtlCreateUnicodeString,RtlCreateUnicodeString,AddVectoredExceptionHandler,HeapAlloc,NtGetContextThread,NtOpenSection,NtContinue,RtlFreeHeap,LoadLibraryExW,RemoveVectoredExceptionHandler,0_2_00007FF7A44DD190
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EA200 RtlAdjustPrivilege,RtlAdjustPrivilege,NtRaiseHardError,NtRaiseHardError,0_2_00007FF7A44EA200
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DCE20 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,0_2_00007FF7A44DCE20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DC9F0 RtlCompareUnicodeString,NtContinue,NtQueryObject,NtContinue,RtlCompareUnicodeString,RtlCompareUnicodeString,NtContinue,HeapAlloc,NtGetContextThread,NtMapViewOfSection,NtContinue,RtlFreeHeap,NtMapViewOfSection,NtContinue,NtContinue,NtContinue,NtContinue,HeapAlloc,NtGetContextThread,NtClose,NtContinue,RtlFreeHeap,NtClose,NtContinue,NtContinue,NtContinue,NtContinue,NtContinue,0_2_00007FF7A44DC9F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F8E400_2_0000012A222F8E40
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E8F600_2_0000012A222E8F60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222FEFBC0_2_0000012A222FEFBC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E0CC00_2_0000012A222E0CC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229CDE00_2_0000012A2229CDE0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222C32100_2_0000012A222C3210
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E22400_2_0000012A222E2240
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223022FC0_2_0000012A223022FC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222973500_2_0000012A22297350
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229F0600_2_0000012A2229F060
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E30400_2_0000012A222E3040
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222911300_2_0000012A22291130
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231B76C0_2_0000012A2231B76C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222A43F00_2_0000012A222A43F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E04800_2_0000012A222E0480
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E85780_2_0000012A222E8578
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E15800_2_0000012A222E1580
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E3A600_2_0000012A222E3A60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222EAAE00_2_0000012A222EAAE0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222918200_2_0000012A22291820
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222DA8F00_2_0000012A222DA8F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229D9300_2_0000012A2229D930
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229E9C00_2_0000012A2229E9C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22291E500_2_0000012A22291E50
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22299E390_2_0000012A22299E39
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2230AE2C0_2_0000012A2230AE2C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22305EC40_2_0000012A22305EC4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D1EB00_2_0000012A222D1EB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222ACF200_2_0000012A222ACF20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CEF600_2_0000012A222CEF60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231DF800_2_0000012A2231DF80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CDFC00_2_0000012A222CDFC0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CEC300_2_0000012A222CEC30
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222FFC340_2_0000012A222FFC34
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D0D500_2_0000012A222D0D50
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D6D600_2_0000012A222D6D60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F6D5C0_2_0000012A222F6D5C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222BCD2D0_2_0000012A222BCD2D
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222BB2900_2_0000012A222BB290
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222922AE0_2_0000012A222922AE
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222982B00_2_0000012A222982B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CE2C00_2_0000012A222CE2C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222B73000_2_0000012A222B7300
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229C3000_2_0000012A2229C300
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D23600_2_0000012A222D2360
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F63440_2_0000012A222F6344
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2230B3980_2_0000012A2230B398
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222670100_2_0000012A22267010
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223230100_2_0000012A22323010
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E60600_2_0000012A222E6060
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223000E40_2_0000012A223000E4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222660C00_2_0000012A222660C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F70EC0_2_0000012A222F70EC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222B01890_2_0000012A222B0189
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223011E40_2_0000012A223011E4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229B1E00_2_0000012A2229B1E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222ED60A0_2_0000012A222ED60A
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F75F40_2_0000012A222F75F4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CE5F00_2_0000012A222CE5F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CA6600_2_0000012A222CA660
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223066340_2_0000012A22306634
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F263C0_2_0000012A222F263C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F67140_2_0000012A222F6714
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223007640_2_0000012A22300764
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222AE7A90_2_0000012A222AE7A9
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223097C40_2_0000012A223097C4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231E4000_2_0000012A2231E400
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E64600_2_0000012A222E6460
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D84900_2_0000012A222D8490
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222664800_2_0000012A22266480
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D45200_2_0000012A222D4520
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F652C0_2_0000012A222F652C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223025780_2_0000012A22302578
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222C65D00_2_0000012A222C65D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222FA5CC0_2_0000012A222FA5CC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222DE9F30_2_0000012A222DE9F3
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22287A000_2_0000012A22287A00
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F4A500_2_0000012A222F4A50
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22302B000_2_0000012A22302B00
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22307B080_2_0000012A22307B08
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F2B340_2_0000012A222F2B34
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D1B800_2_0000012A222D1B80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D9BD00_2_0000012A222D9BD0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222DC8400_2_0000012A222DC840
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222AC8700_2_0000012A222AC870
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222CE9100_2_0000012A222CE910
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222669000_2_0000012A22266900
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222DE9E30_2_0000012A222DE9E3
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222899B00_2_0000012A222899B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222869C00_2_0000012A222869C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DD5E00_2_00007FF7A44DD5E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45216C00_2_00007FF7A45216C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DD2E00_2_00007FF7A44DD2E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4522DD00_2_00007FF7A4522DD0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F956C0_2_00007FF7A44F956C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EC5580_2_00007FF7A44EC558
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45205400_2_00007FF7A4520540
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44FD6740_2_00007FF7A44FD674
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A450E7770_2_00007FF7A450E777
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A454678C0_2_00007FF7A454678C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DC7E00_2_00007FF7A44DC7E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45108100_2_00007FF7A4510810
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45148100_2_00007FF7A4514810
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45157F00_2_00007FF7A45157F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F279C0_2_00007FF7A44F279C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44FF87C0_2_00007FF7A44FF87C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45028E80_2_00007FF7A45028E8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EC8E80_2_00007FF7A44EC8E8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45048DC0_2_00007FF7A45048DC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F08B40_2_00007FF7A44F08B4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45181300_2_00007FF7A4518130
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45252100_2_00007FF7A4525210
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F51A00_2_00007FF7A44F51A0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45292E00_2_00007FF7A45292E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A452E3500_2_00007FF7A452E350
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A452A3F00_2_00007FF7A452A3F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44E24700_2_00007FF7A44E2470
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DB4200_2_00007FF7A44DB420
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44FA5140_2_00007FF7A44FA514
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44E95000_2_00007FF7A44E9500
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DC4B00_2_00007FF7A44DC4B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F6D8C0_2_00007FF7A44F6D8C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4539D700_2_00007FF7A4539D70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4515D200_2_00007FF7A4515D20
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A452CD300_2_00007FF7A452CD30
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44ECDF00_2_00007FF7A44ECDF0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4500DAC0_2_00007FF7A4500DAC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44D4DA00_2_00007FF7A44D4DA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4513DB00_2_00007FF7A4513DB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F8EEC0_2_00007FF7A44F8EEC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A450DEC80_2_00007FF7A450DEC8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EBEA00_2_00007FF7A44EBEA0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4526FF00_2_00007FF7A4526FF0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45390700_2_00007FF7A4539070
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45390500_2_00007FF7A4539050
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45201000_2_00007FF7A4520100
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A451C1100_2_00007FF7A451C110
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44FF10C0_2_00007FF7A44FF10C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45050D40_2_00007FF7A45050D4
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45450B00_2_00007FF7A45450B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DC9F00_2_00007FF7A44DC9F0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DB9A00_2_00007FF7A44DB9A0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F19D00_2_00007FF7A44F19D0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4522A700_2_00007FF7A4522A70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F8A3C0_2_00007FF7A44F8A3C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44DAAB00_2_00007FF7A44DAAB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EBAD00_2_00007FF7A44EBAD0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44E2B800_2_00007FF7A44E2B80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44E5B800_2_00007FF7A44E5B80
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4513B700_2_00007FF7A4513B70
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4516B360_2_00007FF7A4516B36
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F4BB00_2_00007FF7A44F4BB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A452BBB00_2_00007FF7A452BBB0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44F2C940_2_00007FF7A44F2C94
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44E1C500_2_00007FF7A44E1C50
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EBCB80_2_00007FF7A44EBCB8
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0000012A22296EF0 appears 41 times
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0000012A22292280 appears 55 times
                    Source: C:\Users\user\Desktop\file.exeCode function: String function: 0000012A2228DA30 appears 50 times
                    Source: classification engineClassification label: mal100.troj.spyw.winEXE@1/0@1/2
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E78B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,0_2_0000012A222E78B0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22337008 AdjustTokenPrivileges,0_2_0000012A22337008
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229E9C0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0000012A2229E9C0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D0F97 CoCreateInstance,0_2_0000012A222D0F97
                    Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E6963A814A1EF
                    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeReversingLabs: Detection: 13%
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
                    Source: file.exeStatic file information: File size 1937920 > 1048576
                    Source: file.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x148e00
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229D930 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_0000012A2229D930
                    Source: file.exeStatic PE information: section name: _RDATA
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D8020 ExitProcess,OpenMutexA,ExitProcess,CreateMutexA,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,0_2_0000012A222D8020
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22297350 FindFirstFileW,FindNextFileW,0_2_0000012A22297350
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231B6BC FindClose,FindFirstFileExW,GetLastError,0_2_0000012A2231B6BC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231B76C GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_0000012A2231B76C
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22337100 FindFirstFileW,0_2_0000012A22337100
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E2D90 GetLogicalDriveStringsW,0_2_0000012A222E2D90
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F8CE0 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,0_2_0000012A222F8CE0
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\wtr\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                    Source: file.exe, 00000000.00000003.2329451640.0000012A21FDA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2400768323.0000012A21FC1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                    Source: file.exe, 00000000.00000003.2331857309.0000012A22025000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-105728
                    Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-105732
                    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E6060 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,0_2_0000012A222E6060
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F1688 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000012A222F1688
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2231D6E0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_0000012A2231D6E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A2229D930 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,0_2_0000012A2229D930
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A22309084 GetProcessHeap,0_2_0000012A22309084
                    Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223372E0 SetUnhandledExceptionFilter,0_2_0000012A223372E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F1688 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000012A222F1688
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45075E8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7A45075E8
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4507908 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7A4507908
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A44EE950 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7A44EE950
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A4507AEC SetUnhandledExceptionFilter,0_2_00007FF7A4507AEC
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222D6D60 ShellExecuteW,0_2_0000012A222D6D60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7A45068D0 cpuid 0_2_00007FF7A45068D0
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_0000012A2231B330
                    Source: C:\Users\user\Desktop\file.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_0000012A223080AC
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_0000012A222FD620
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0000012A223087AC
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_0000012A223083F8
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_0000012A223084C8
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0000012A22308560
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0000012A22308AE0
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0000012A222FDB64
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0000012A22308904
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_0000012A223089B4
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF7A450169C
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF7A450176C
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7A4501804
                    Source: C:\Users\user\Desktop\file.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF7A4501350
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00007FF7A44FC468
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7A4501D84
                    Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF7A44FC114
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00007FF7A4501A50
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF7A4501BA8
                    Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00007FF7A4501C58
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222F83E0 GetSystemTimeAsFileTime,0_2_0000012A222F83E0
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A222E1B60 GetUserNameW,0_2_0000012A222E1B60
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0000012A223022FC _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_0000012A223022FC

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5592, type: MEMORYSTR
                    Source: Yara matchFile source: 0.3.file.exe.12a22260000.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.12a22260000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.12a22260000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.12a22260000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2308893653.0000012A22260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5592, type: MEMORYSTR
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum\wallets
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\config
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21FC1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 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
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
                    Source: file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5592, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5592, type: MEMORYSTR
                    Source: Yara matchFile source: 0.3.file.exe.12a22260000.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.12a22260000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.12a22260000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.file.exe.12a22260000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2308893653.0000012A22260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: file.exe PID: 5592, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    1
                    Access Token Manipulation
                    1
                    OS Credential Dumping
                    12
                    System Time Discovery
                    Remote Services1
                    Screen Capture
                    21
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Access Token Manipulation
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop Protocol1
                    Email Collection
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Obfuscated Files or Information
                    Security Account Manager2
                    Process Discovery
                    SMB/Windows Admin Shares1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Account Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                    System Owner/User Discovery
                    SSHKeylogging3
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem34
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe13%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                    https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                    https://www.ecosia.org/newtab/0%URL Reputationsafe
                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                    https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYt0%URL Reputationsafe
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                    https://support.mozilla.org0%URL Reputationsafe
                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://ns.adobe.hotoshfile.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://duckduckgo.com/chrome_newtabfile.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/ac/?q=file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ns.adobe.c.0/tifile.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://ns.adoraw-sefile.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://ns.photo/Nfile.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://ns.photo/file.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://ns.a.0/sTyfile.exe, 00000000.00000003.2399782046.0000012A241C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399692844.0000012A241C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2399668740.0000012A241C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://ns.adobe.hotoshNfile.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.ecosia.org/newtab/file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brfile.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://api.ipify.org/(file.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://ns.adoraw-seNfile.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://ac.ecosia.org/autocomplete?q=file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://support.mozilla.org/products/firefoxgro.allizom.troppus.ZAnPVwXvBbYtfile.exe, 00000000.00000003.2334891313.0000012A24452000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ns.a.0/sTyNfile.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchfile.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://support.mozilla.orgfile.exe, 00000000.00000003.2334175402.0000012A22188000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334175402.0000012A22190000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2334891313.0000012A2444A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2335276853.0000012A22078000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000000.00000003.2330216176.0000012A21E50000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2330422326.0000012A21E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://ns.adobe.c.0/tiAfile.exe, 00000000.00000003.2328122373.0000012A241B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://api.ipify.orgafile.exe, 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                109.172.94.66
                                                unknownRussian Federation
                                                41691SUMTEL-AS-RIPEMoscowRussiaRUtrue
                                                104.26.12.205
                                                api.ipify.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1545970
                                                Start date and time:2024-10-31 11:08:37 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 5m 27s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:5
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:file.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.winEXE@1/0@1/2
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HCA Information:
                                                • Successful, ratio: 97%
                                                • Number of executed functions: 104
                                                • Number of non-executed functions: 118
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Stop behavior analysis, all processes terminated
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • VT rate limit hit for: file.exe
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                104.26.12.205Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                                • api.ipify.org/
                                                6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                                • api.ipify.org/
                                                perfcc.elfGet hashmaliciousXmrigBrowse
                                                • api.ipify.org/
                                                SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                • api.ipify.org/
                                                SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                                • api.ipify.org/
                                                hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                                • api.ipify.org/
                                                file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                • api.ipify.org/
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • api.ipify.org/
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • api.ipify.org/
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • api.ipify.org/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                api.ipify.org#Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 172.67.74.152
                                                https://www.canva.com/design/DAGVD7_HMvQ/PFkDB3TDx6Ru4nNALhSqqQ/view?utm_content=DAGVD7_HMvQ&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                                                • 104.26.12.205
                                                https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                                                • 104.26.12.205
                                                SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                Biocon-In-Service Agreement.pdfGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                • 104.26.13.205
                                                skuld3.exeGet hashmaliciousSkuld StealerBrowse
                                                • 104.26.13.205
                                                Shipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 104.26.12.205
                                                z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                • 172.67.74.152
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUShttps://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!s599af221dbfd41b9a607812ebc66d2cf&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0VpSHltbG45MjdsQnBnZUJMcnhtMHM4QjRNbHFPTTJWd0ZlQTFNLWNhZ0lnRkE_ZT1aak8wczY&wd=target%28Sezione%20senza%20titolo.one%7C99ad2a4b-5ecc-495f-9ce8-040ac62eb8f2%2F%5BExternal%5D%20-%20Invoice%20%27s%208808-%7C9e6e973e-3cda-429a-a28f-c51dc242e5b1%2F%29&wdorigin=NavigationUrlGet hashmaliciousUnknownBrowse
                                                • 104.21.14.84
                                                Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 188.114.96.3
                                                PROFORMA FATURA pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                • 104.17.25.14
                                                clipper.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                Invoices.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                                                • 104.17.25.14
                                                FERRO FAB INV.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                https://invite.bublup.com/q6fU7gLtMrfSGet hashmaliciousHTMLPhisherBrowse
                                                • 104.17.24.14
                                                SUMTEL-AS-RIPEMoscowRussiaRUsh4.elfGet hashmaliciousUnknownBrowse
                                                • 87.117.138.145
                                                yakuza.i686.elfGet hashmaliciousUnknownBrowse
                                                • 178.130.55.72
                                                la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                • 109.172.60.44
                                                BwqqVoHR71.exeGet hashmaliciousGO BackdoorBrowse
                                                • 109.172.88.38
                                                antispam_connect1.exeGet hashmaliciousGO BackdoorBrowse
                                                • 109.172.88.38
                                                na.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 89.221.206.246
                                                wa_3rd_party_host_32.exeGet hashmaliciousGO BackdoorBrowse
                                                • 109.172.88.38
                                                uyTCVR3mBl.elfGet hashmaliciousUnknownBrowse
                                                • 89.221.225.163
                                                mtTw7o41OC.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • 109.172.114.38
                                                FpiUD4nYpj.exeGet hashmaliciousLummaC, AsyncRAT, Go Injector, LummaC Stealer, SmokeLoader, VenomRATBrowse
                                                • 109.172.114.212
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                37f463bf4616ecd445d4a1937da06e19Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 104.26.12.205
                                                SecuriteInfo.com.BackDoor.AgentTeslaNET.20.28177.5145.exeGet hashmaliciousDarkCloudBrowse
                                                • 104.26.12.205
                                                nOrden_de_Compra___0001245.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 104.26.12.205
                                                Ky4J8k89A7.exeGet hashmaliciousStealc, Vidar, XmrigBrowse
                                                • 104.26.12.205
                                                b4s45TboUL.exeGet hashmaliciousStealc, VidarBrowse
                                                • 104.26.12.205
                                                rCommercialoffer_Technicaloffer_pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 104.26.12.205
                                                Justificante de pago.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 104.26.12.205
                                                rPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 104.26.12.205
                                                rPO-000172483.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 104.26.12.205
                                                Ppto.24265.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 104.26.12.205
                                                No context
                                                No created / dropped files found
                                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                Entropy (8bit):6.9131202226603605
                                                TrID:
                                                • Win64 Executable GUI (202006/5) 92.65%
                                                • Win64 Executable (generic) (12005/4) 5.51%
                                                • Generic Win/DOS Executable (2004/3) 0.92%
                                                • DOS Executable Generic (2002/1) 0.92%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:file.exe
                                                File size:1'937'920 bytes
                                                MD5:fd89c359ab4ac38da6cf7fe6dabdb457
                                                SHA1:9c2a99beb692849ba3eb11d114334636df04f5ff
                                                SHA256:a19257d178d7f240c830b29e8bb55d9b6320dc1b56795e4fa90267419ed4070c
                                                SHA512:27e63d09f31a33bbaeae48bb64c3802623a20352657e218b04c0378e88a1b090629c85a09cce6f56a417abb12c1dc6f5cc8b7456c9c58bf05ffd33a0e2eb5904
                                                SSDEEP:24576:mH7eZ9qb3yhIK20e6yaftS/h0lhSMXlEnuxl6XjxIp/jZKUSd5gnU+ZpdF:S7eZu3y+wsuxgXjCtj5Sd5Grn
                                                TLSH:AC95CF67F94434FAE83091348DA7076BA33BB441876187DB5698362A5E53BD02F3BF48
                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......t...0...0...0...............<...x...........o....... .......8...............<.......'.......5...0.......$...$...$.`.1...$...1..
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x1400375d4
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x140000000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x671BD104 [Fri Oct 25 17:10:28 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:6
                                                OS Version Minor:0
                                                File Version Major:6
                                                File Version Minor:0
                                                Subsystem Version Major:6
                                                Subsystem Version Minor:0
                                                Import Hash:b747ef4e0e7f8f3178c8471e453f4b5f
                                                Instruction
                                                dec eax
                                                sub esp, 28h
                                                call 00007F0494D5AFD4h
                                                dec eax
                                                add esp, 28h
                                                jmp 00007F0494D5A79Fh
                                                int3
                                                int3
                                                inc eax
                                                push ebx
                                                dec eax
                                                sub esp, 20h
                                                dec eax
                                                mov ebx, ecx
                                                xor ecx, ecx
                                                call dword ptr [00050AF7h]
                                                dec eax
                                                mov ecx, ebx
                                                call dword ptr [00050AE6h]
                                                call dword ptr [00050A58h]
                                                dec eax
                                                mov ecx, eax
                                                mov edx, C0000409h
                                                dec eax
                                                add esp, 20h
                                                pop ebx
                                                dec eax
                                                jmp dword ptr [00050ADCh]
                                                dec eax
                                                mov dword ptr [esp+08h], ecx
                                                dec eax
                                                sub esp, 38h
                                                mov ecx, 00000017h
                                                call dword ptr [00050AD0h]
                                                test eax, eax
                                                je 00007F0494D5A929h
                                                mov ecx, 00000002h
                                                int 29h
                                                dec eax
                                                lea ecx, dword ptr [0019C0CEh]
                                                call 00007F0494D5AAEEh
                                                dec eax
                                                mov eax, dword ptr [esp+38h]
                                                dec eax
                                                mov dword ptr [0019C1B5h], eax
                                                dec eax
                                                lea eax, dword ptr [esp+38h]
                                                dec eax
                                                add eax, 08h
                                                dec eax
                                                mov dword ptr [0019C145h], eax
                                                dec eax
                                                mov eax, dword ptr [0019C19Eh]
                                                dec eax
                                                mov dword ptr [0019C00Fh], eax
                                                dec eax
                                                mov eax, dword ptr [esp+40h]
                                                dec eax
                                                mov dword ptr [0019C113h], eax
                                                mov dword ptr [0019BFE9h], C0000409h
                                                mov dword ptr [0019BFE3h], 00000001h
                                                mov dword ptr [0019BFEDh], 00000001h
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1d00340x3c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1dc0000x1e0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d50000x5964.pdata
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1dd0000x1eb4.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x1c4c900x38.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x1c4d000x28.rdata
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1c4b500x140.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x880000x3b8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x8629c0x86400533170075dada125e4df006d984c4596False0.515928698207635data6.523847644421667IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x880000x148cde0x148e000beb3fa0e7ade7713727b8def3bb4f9eFalse0.6084982836849107data6.832328378432915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x1d10000x390c0x1e005f28058a9e2c02cd2ebfa105aba2e6b5False0.18138020833333332data3.709621146255121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .pdata0x1d50000x59640x5a003597e95df5d4ec5a41fd8a11d049b4f6False0.49053819444444446data5.822333171427356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                _RDATA0x1db0000x15c0x20036a456dd95baf0d7ac9f08a622399347False0.400390625data3.296204586134003IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .rsrc0x1dc0000x1e00x20091f1bb59b414c9eaf8ca19c8e69d2965False0.533203125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x1dd0000x1eb40x20009d98248e7ab3e09e0dea40168f7cf982False0.6422119140625data6.409576570710691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_MANIFEST0x1dc0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                DLLImport
                                                KERNEL32.dllVirtualFree, VirtualAlloc, GetModuleHandleW, LoadLibraryA, ReadFile, WriteFile, CreateFileW, UnmapViewOfFile, CloseHandle, CreateFileMappingW, MapViewOfFile, GetProcAddress, GetCurrentProcess, VirtualQuery, RemoveVectoredExceptionHandler, MultiByteToWideChar, LoadLibraryW, AddVectoredExceptionHandler, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetLastError, SetLastError, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, HeapFree, GetCurrentThreadId, GetStdHandle, GetFileType, GetStartupInfoW, RaiseException, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, FreeLibrary, LoadLibraryExW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ReadConsoleW, HeapReAlloc, HeapSize, GetProcessHeap, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetStringTypeW, ExitProcess, GetModuleHandleExW, SetStdHandle, GetModuleFileNameW, WriteConsoleW, QueryPerformanceCounter, GetCurrentProcessId, InitializeSListHead, RtlUnwindEx, RtlUnwind, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, VirtualProtect, VirtualQueryEx, ReadProcessMemory, WriteProcessMemory, GetSystemInfo, InitializeCriticalSection, FindClose, FindFirstFileExW, FindNextFileW, InitializeSRWLock, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, TryAcquireSRWLockExclusive, InitializeCriticalSectionEx, DecodePointer, LCMapStringEx, CreateEventW
                                                ntdll.dllNtRaiseHardError, NtMapViewOfSection, RtlCreateUnicodeString, NtOpenSection, NtQueryObject, NtContinue, NtUnmapViewOfSection, RtlFreeHeap, NtClose, RtlAdjustPrivilege, RtlAllocateHeap, NtGetContextThread, RtlCompareUnicodeString, NtCreateSection
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-10-31T11:09:55.586930+01002049441ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt1192.168.2.649717109.172.94.6615666TCP
                                                2024-10-31T11:09:55.586930+01002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.649717109.172.94.6615666TCP
                                                2024-10-31T11:09:55.586930+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.649717109.172.94.6615666TCP
                                                2024-10-31T11:09:55.592027+01002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.649717109.172.94.6615666TCP
                                                2024-10-31T11:09:55.592027+01002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.649717109.172.94.6615666TCP
                                                2024-10-31T11:10:07.468567+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649719TCP
                                                2024-10-31T11:10:45.635342+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649724TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 31, 2024 11:09:50.367592096 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:50.373773098 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:50.373888969 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:50.980947971 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:50.981056929 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:50.981221914 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:50.990537882 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:50.990566969 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.624218941 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.624298096 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.706485033 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.706509113 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.706916094 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.706965923 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.708926916 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.755321980 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.889919043 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.889978886 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:51.890008926 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.890055895 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.911125898 CET49718443192.168.2.6104.26.12.205
                                                Oct 31, 2024 11:09:51.911145926 CET44349718104.26.12.205192.168.2.6
                                                Oct 31, 2024 11:09:55.586930037 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.591922045 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.591943979 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.591965914 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.591979027 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.591990948 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592026949 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.592041016 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592071056 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.592082977 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592089891 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.592097044 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592111111 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592123032 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.592158079 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.592166901 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.592197895 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.596910954 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.596971989 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.596980095 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.596986055 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.596997976 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.597013950 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.597013950 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.597027063 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.597032070 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.597057104 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.597074032 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.637362957 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.637581110 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.689229965 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.689354897 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.737231970 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.737349987 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.789151907 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.789339066 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.841262102 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.841438055 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.889173985 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.889339924 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.939790964 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.939951897 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:55.986650944 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:55.986804962 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.037189007 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.037264109 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.085182905 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.085251093 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.134612083 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.134788036 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.182636023 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.182787895 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.229147911 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.229398966 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.277483940 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.277751923 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.325288057 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.325366974 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.373330116 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.373460054 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.425209045 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.425333023 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.477134943 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.477202892 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.709542990 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.709635973 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.714526892 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.714602947 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.761104107 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.761209965 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.813162088 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.813288927 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.861154079 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.861267090 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.909171104 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.909274101 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:56.957227945 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:56.957427025 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.005597115 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.005665064 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.053107977 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.053206921 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.101352930 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.101488113 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.149168015 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.149245024 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.201143026 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.201216936 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.249150038 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.249207020 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.297209024 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.297291994 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.349123001 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.349237919 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.397177935 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.397289991 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.445178986 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.445281029 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.497133017 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.497231007 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.545165062 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.545324087 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.597203970 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.597268105 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.645184040 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.645271063 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.697123051 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.697194099 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.745156050 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.745260000 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.793230057 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.793298960 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.845124960 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.845315933 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.893167019 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.893285990 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.941190004 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.941416979 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:57.990497112 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:57.990581989 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.037149906 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.037246943 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.089195013 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.089366913 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.137173891 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.137259960 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.189166069 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.189364910 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.241101027 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.241168976 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.293140888 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.293210983 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.345088959 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.345153093 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.397156000 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.397232056 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.445139885 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.445321083 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.493129969 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.493395090 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.541125059 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.541218996 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.589072943 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.589268923 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.637166023 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.637279987 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.685162067 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.685257912 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.733144999 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.733303070 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.781207085 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.781383038 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.829283953 CET1566649717109.172.94.66192.168.2.6
                                                Oct 31, 2024 11:09:58.829457045 CET4971715666192.168.2.6109.172.94.66
                                                Oct 31, 2024 11:09:58.856662989 CET1566649717109.172.94.66192.168.2.6
                                                TimestampSource PortDest PortSource IPDest IP
                                                Oct 31, 2024 11:09:50.968107939 CET5500453192.168.2.61.1.1.1
                                                Oct 31, 2024 11:09:50.975121021 CET53550041.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Oct 31, 2024 11:09:50.968107939 CET192.168.2.61.1.1.10xa346Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Oct 31, 2024 11:09:50.975121021 CET1.1.1.1192.168.2.60xa346No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:09:50.975121021 CET1.1.1.1192.168.2.60xa346No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Oct 31, 2024 11:09:50.975121021 CET1.1.1.1192.168.2.60xa346No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649718104.26.12.2054435592C:\Users\user\Desktop\file.exe
                                                TimestampBytes transferredDirectionData
                                                2024-10-31 10:09:51 UTC100OUTGET / HTTP/1.1
                                                Accept: text/html; text/plain; */*
                                                Host: api.ipify.org
                                                Cache-Control: no-cache
                                                2024-10-31 10:09:51 UTC211INHTTP/1.1 200 OK
                                                Date: Thu, 31 Oct 2024 10:09:51 GMT
                                                Content-Type: text/plain
                                                Content-Length: 14
                                                Connection: close
                                                Vary: Origin
                                                cf-cache-status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8db2da1a9ac76b48-DFW
                                                2024-10-31 10:09:51 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37
                                                Data Ascii: 173.254.250.77


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Target ID:0
                                                Start time:06:09:48
                                                Start date:31/10/2024
                                                Path:C:\Users\user\Desktop\file.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                Imagebase:0x7ff7a44d0000
                                                File size:1'937'920 bytes
                                                MD5 hash:FD89C359AB4AC38DA6CF7FE6DABDB457
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000000.00000002.2400768323.0000012A21F60000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000000.00000003.2308893653.0000012A22260000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:6%
                                                  Dynamic/Decrypted Code Coverage:0.1%
                                                  Signature Coverage:21.5%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:99
                                                  execution_graph 106420 12a222e8578 106421 12a222e8589 106420->106421 106422 12a222e859e 106420->106422 106426 12a2230df40 _Strcoll 4 API calls 106421->106426 106423 12a222e85a7 106422->106423 106437 12a222e874b 106422->106437 106425 12a222a1d90 41 API calls 106423->106425 106438 12a222e8601 106423->106438 106424 12a222e87f7 106428 12a222e8f60 43 API calls 106424->106428 106425->106438 106427 12a222e8e0b 106426->106427 106429 12a222e8810 106428->106429 106433 12a222e8520 4 API calls 106429->106433 106430 12a222e8f60 43 API calls 106430->106437 106431 12a222e86c0 106432 12a222e8f60 43 API calls 106431->106432 106436 12a222e86f2 106432->106436 106433->106421 106434 12a222e8520 4 API calls 106434->106437 106435 12a222e8f60 43 API calls 106435->106438 106439 12a222e8520 4 API calls 106436->106439 106437->106424 106437->106430 106437->106434 106438->106431 106438->106435 106440 12a222e8520 4 API calls 106438->106440 106439->106421 106440->106438 103156 12a222f9758 103167 12a222f95bc 103156->103167 103158 12a222f97b5 103160 12a222f97f5 103158->103160 103161 12a222f977e 103158->103161 103185 12a222fe2ac 38 API calls 2 library calls 103158->103185 103173 12a222f95e4 103160->103173 103165 12a222f97e9 103165->103160 103186 12a222fe988 8 API calls 2 library calls 103165->103186 103168 12a222f95c5 103167->103168 103172 12a222f95d5 103167->103172 103187 12a222f5e1c 8 API calls _set_errno_from_matherr 103168->103187 103170 12a222f95ca 103188 12a222f1958 38 API calls _invalid_parameter_noinfo 103170->103188 103172->103158 103172->103161 103184 12a222f96dc 38 API calls _fread_nolock 103172->103184 103174 12a222f95bc _fread_nolock 38 API calls 103173->103174 103175 12a222f9609 103174->103175 103176 12a222f96a9 103175->103176 103177 12a222f9618 103175->103177 103198 12a222fcad4 38 API calls 2 library calls 103176->103198 103179 12a222f9636 103177->103179 103181 12a222f9654 103177->103181 103197 12a222fcad4 38 API calls 2 library calls 103179->103197 103182 12a222f9644 103181->103182 103189 12a222ff5dc 103181->103189 103182->103161 103184->103158 103185->103165 103186->103160 103187->103170 103188->103172 103190 12a222ff60c 103189->103190 103199 12a222ff408 103190->103199 103192 12a222ff625 103193 12a222ff64b 103192->103193 103208 12a222ef918 38 API calls 3 library calls 103192->103208 103196 12a222ff660 103193->103196 103209 12a222ef918 38 API calls 3 library calls 103193->103209 103196->103182 103197->103182 103198->103182 103201 12a222ff451 103199->103201 103207 12a222ff435 103199->103207 103200 12a222ff4df 103217 12a222f1888 38 API calls _invalid_parameter_noinfo 103200->103217 103201->103200 103203 12a222ff489 103201->103203 103210 12a223049b8 EnterCriticalSection 103203->103210 103207->103192 103208->103193 103209->103196 103211 12a222ff490 103210->103211 103211->103207 103212 12a222ff530 103211->103212 103218 12a22304cc4 103212->103218 103215 12a222ff56e SetFilePointerEx 103216 12a222ff55d __std_fs_directory_iterator_open _fread_nolock 103215->103216 103216->103207 103217->103207 103219 12a22304ccd 103218->103219 103221 12a22304ce2 103218->103221 103230 12a222f5dfc 8 API calls _set_errno_from_matherr 103219->103230 103227 12a222ff557 103221->103227 103232 12a222f5dfc 8 API calls _set_errno_from_matherr 103221->103232 103223 12a22304cd2 103231 12a222f5e1c 8 API calls _set_errno_from_matherr 103223->103231 103224 12a22304d1d 103233 12a222f5e1c 8 API calls _set_errno_from_matherr 103224->103233 103227->103215 103227->103216 103228 12a22304d25 103234 12a222f1958 38 API calls _invalid_parameter_noinfo 103228->103234 103230->103223 103231->103227 103232->103224 103233->103228 103234->103227 103235 12a223042dd 103247 12a2230b1c0 103235->103247 103252 12a222f9b94 103247->103252 103249 12a2230b1c9 103274 12a222f9564 38 API calls __std_fs_directory_iterator_open 103249->103274 103253 12a222f9ba9 __std_fs_directory_iterator_open 103252->103253 103254 12a222f9bb8 FlsGetValue 103253->103254 103255 12a222f9bd5 FlsSetValue 103253->103255 103257 12a222f9bc5 _set_errno_from_matherr 103254->103257 103258 12a222f9bcf 103254->103258 103256 12a222f9be7 103255->103256 103255->103257 103275 12a222fd574 8 API calls 3 library calls 103256->103275 103263 12a222f9c4e 103257->103263 103282 12a222f9564 38 API calls __std_fs_directory_iterator_open 103257->103282 103258->103255 103260 12a222f9bf6 103261 12a222f9c14 FlsSetValue 103260->103261 103262 12a222f9c04 FlsSetValue 103260->103262 103265 12a222f9c32 103261->103265 103266 12a222f9c20 FlsSetValue 103261->103266 103264 12a222f9c0d 103262->103264 103263->103249 103276 12a222fcf0c 103264->103276 103281 12a222f9944 8 API calls _set_errno_from_matherr 103265->103281 103266->103264 103272 12a222f9c3a 103273 12a222fcf0c Concurrency::details::SchedulerProxy::DeleteThis 8 API calls 103272->103273 103273->103257 103275->103260 103277 12a222f9c12 103276->103277 103278 12a222fcf11 HeapFree 103276->103278 103277->103257 103278->103277 103279 12a222fcf2c __std_fs_directory_iterator_open Concurrency::details::SchedulerProxy::DeleteThis 103278->103279 103283 12a222f5e1c 8 API calls _set_errno_from_matherr 103279->103283 103281->103272 103283->103277 103284 7ff7a44dd070 103295 7ff7a44ea9a0 GetModuleHandleW GetProcAddress 103284->103295 103288 7ff7a44dd0c7 103289 7ff7a44dd0dc 103288->103289 103357 7ff7a44d9b30 103288->103357 103290 7ff7a44dd165 103289->103290 103291 7ff7a44dd14b VirtualFree 103289->103291 103349 7ff7a44dd190 RtlCreateUnicodeString RtlCreateUnicodeString 103290->103349 103291->103290 103293 7ff7a44dd161 103291->103293 103369 7ff7a44d7910 103295->103369 103306 7ff7a44eaa52 103308 7ff7a44d7910 49 API calls 103306->103308 103307 7ff7a44eaa8e memcpy_s 103512 7ff7a451dd20 103307->103512 103309 7ff7a44eaa65 103308->103309 103311 7ff7a44d76c0 92 API calls 103309->103311 103313 7ff7a44eaa79 103311->103313 103314 7ff7a44ea410 92 API calls 103313->103314 103316 7ff7a44eaa84 103314->103316 103317 7ff7a44d71e0 49 API calls 103316->103317 103318 7ff7a44eaa8c 103317->103318 103737 7ff7a4506ee0 103318->103737 103325 7ff7a44d9f30 104208 7ff7a44d9870 103325->104208 103328 7ff7a44d9f53 103328->103288 103330 7ff7a44d9f79 103331 7ff7a44da078 103330->103331 103334 7ff7a44d9f8d 103330->103334 103332 7ff7a44da08c VirtualAlloc 103331->103332 103333 7ff7a44da06f 103331->103333 103332->103333 103335 7ff7a44da0ab BuildCatchObjectHelperInternal 103332->103335 103333->103288 103334->103333 104225 7ff7a44da750 103334->104225 103335->103333 103338 7ff7a44da750 9 API calls 103339 7ff7a44d9fd9 103338->103339 103339->103333 103340 7ff7a44da750 9 API calls 103339->103340 103341 7ff7a44d9ffa 103340->103341 103342 7ff7a44da038 103341->103342 103346 7ff7a44da750 9 API calls 103341->103346 103342->103333 103343 7ff7a44da040 VirtualAlloc 103342->103343 103343->103333 103344 7ff7a44da05e 103343->103344 104231 7ff7a44da0e0 103344->104231 103347 7ff7a44da01f 103346->103347 103347->103342 103348 7ff7a44da750 9 API calls 103347->103348 103348->103342 104243 7ff7a44dce20 103349->104243 103352 7ff7a44dd1dc AddVectoredExceptionHandler 103353 7ff7a44dd204 HeapAlloc 103352->103353 103356 7ff7a44dd29a 103352->103356 103354 7ff7a44dd27c LoadLibraryExW RemoveVectoredExceptionHandler 103353->103354 103355 7ff7a44dd22b NtGetContextThread NtContinue RtlFreeHeap 103353->103355 103354->103356 103355->103354 103356->103293 103358 7ff7a44d9bf8 103357->103358 103359 7ff7a44d9b53 103357->103359 103358->103289 103359->103358 103360 7ff7a44da750 9 API calls 103359->103360 103361 7ff7a44d9b66 103360->103361 103361->103358 103362 7ff7a44da750 9 API calls 103361->103362 103363 7ff7a44d9b9c 103362->103363 103363->103358 103364 7ff7a44da750 9 API calls 103363->103364 103365 7ff7a44d9bba 103364->103365 103365->103358 103366 7ff7a44da750 9 API calls 103365->103366 103367 7ff7a44d9bdf 103366->103367 103367->103358 103368 7ff7a44da750 9 API calls 103367->103368 103368->103358 103370 7ff7a44d7947 103369->103370 103371 7ff7a44d71e0 49 API calls 103370->103371 103372 7ff7a44d7995 103370->103372 103371->103372 103373 7ff7a44d7b92 103372->103373 103374 7ff7a44d7b48 103372->103374 103761 7ff7a44d3820 49 API calls 103373->103761 103375 7ff7a44d7b59 103374->103375 103760 7ff7a44d7340 49 API calls std::_Throw_Cpp_error 103374->103760 103381 7ff7a44d9200 103375->103381 103378 7ff7a44d7bd4 103762 7ff7a4509cb8 RtlPcToFileHeader RaiseException 103378->103762 103380 7ff7a44d7be5 103382 7ff7a44d9243 103381->103382 103383 7ff7a44d9258 103382->103383 103385 7ff7a44d71e0 49 API calls 103382->103385 103384 7ff7a44d92bc 103383->103384 103763 7ff7a44d7bf0 85 API calls 4 library calls 103383->103763 103386 7ff7a44d937e 103384->103386 103389 7ff7a44d93c3 103384->103389 103385->103383 103388 7ff7a44d938f 103386->103388 103764 7ff7a44d7340 49 API calls std::_Throw_Cpp_error 103386->103764 103395 7ff7a44d76c0 103388->103395 103765 7ff7a44d3820 49 API calls 103389->103765 103392 7ff7a44d9405 103766 7ff7a4509cb8 RtlPcToFileHeader RaiseException 103392->103766 103394 7ff7a44d9416 103396 7ff7a44d76e4 103395->103396 103767 7ff7a44d7750 103396->103767 103399 7ff7a44ea410 103400 7ff7a44ea446 103399->103400 103401 7ff7a44d71e0 49 API calls 103400->103401 103402 7ff7a44ea45b 103400->103402 103401->103402 103403 7ff7a44ea560 103402->103403 103405 7ff7a44ea522 103402->103405 103791 7ff7a44d3820 49 API calls 103403->103791 103404 7ff7a44ea533 103498 7ff7a44d71e0 103404->103498 103405->103404 103790 7ff7a44d7340 49 API calls std::_Throw_Cpp_error 103405->103790 103408 7ff7a44ea5a2 103792 7ff7a4509cb8 RtlPcToFileHeader RaiseException 103408->103792 103410 7ff7a44ea5b3 103411 7ff7a44d7910 49 API calls 103410->103411 103412 7ff7a44ea5fa 103411->103412 103413 7ff7a44d9200 85 API calls 103412->103413 103414 7ff7a44ea605 103413->103414 103415 7ff7a44d7910 49 API calls 103414->103415 103416 7ff7a44ea614 103415->103416 103417 7ff7a44d76c0 92 API calls 103416->103417 103418 7ff7a44ea628 103417->103418 103419 7ff7a44ea410 92 API calls 103418->103419 103420 7ff7a44ea633 103419->103420 103421 7ff7a44d71e0 49 API calls 103420->103421 103422 7ff7a44ea63b 103421->103422 103793 7ff7a44f5cb0 47 API calls _Getctype 103422->103793 103424 7ff7a44ea640 103425 7ff7a44d7910 49 API calls 103424->103425 103426 7ff7a44ea66b 103425->103426 103794 7ff7a44eab20 85 API calls std::_Throw_Cpp_error 103426->103794 103428 7ff7a44ea675 103429 7ff7a44d76c0 92 API calls 103428->103429 103430 7ff7a44ea689 103429->103430 103431 7ff7a44ea410 92 API calls 103430->103431 103432 7ff7a44ea694 103431->103432 103433 7ff7a44d71e0 49 API calls 103432->103433 103434 7ff7a44ea69c 103433->103434 103435 7ff7a44ea6ae 103434->103435 103436 7ff7a44ea758 103434->103436 103437 7ff7a44d7910 49 API calls 103435->103437 103438 7ff7a44d7910 49 API calls 103436->103438 103439 7ff7a44ea6ba 103437->103439 103440 7ff7a44ea767 103438->103440 103441 7ff7a44d76c0 92 API calls 103439->103441 103795 7ff7a44eab20 85 API calls std::_Throw_Cpp_error 103440->103795 103443 7ff7a44ea6ce 103441->103443 103445 7ff7a44ea410 92 API calls 103443->103445 103444 7ff7a44ea771 103446 7ff7a44d76c0 92 API calls 103444->103446 103447 7ff7a44ea6d9 103445->103447 103448 7ff7a44ea785 103446->103448 103450 7ff7a44d71e0 49 API calls 103447->103450 103449 7ff7a44ea410 92 API calls 103448->103449 103451 7ff7a44ea790 103449->103451 103459 7ff7a44ea6e1 103450->103459 103452 7ff7a44d71e0 49 API calls 103451->103452 103460 7ff7a44ea756 103452->103460 103453 7ff7a44d7910 49 API calls 103453->103459 103454 7ff7a44d7910 49 API calls 103454->103460 103455 7ff7a44eab20 85 API calls 103455->103459 103457 7ff7a44d76c0 92 API calls 103457->103459 103458 7ff7a44d76c0 92 API calls 103458->103460 103459->103453 103459->103455 103459->103457 103459->103460 103461 7ff7a44ea410 92 API calls 103459->103461 103464 7ff7a44d71e0 49 API calls 103459->103464 103460->103454 103460->103458 103462 7ff7a44ea410 92 API calls 103460->103462 103463 7ff7a44d71e0 49 API calls 103460->103463 103465 7ff7a44ea816 103460->103465 103796 7ff7a44eab20 85 API calls std::_Throw_Cpp_error 103460->103796 103461->103459 103462->103460 103463->103460 103464->103459 103466 7ff7a44d7910 49 API calls 103465->103466 103467 7ff7a44ea87c 103466->103467 103797 7ff7a44eab20 85 API calls std::_Throw_Cpp_error 103467->103797 103469 7ff7a44ea886 103470 7ff7a44d76c0 92 API calls 103469->103470 103471 7ff7a44ea89a 103470->103471 103472 7ff7a44ea410 92 API calls 103471->103472 103473 7ff7a44ea8a5 103472->103473 103474 7ff7a44d71e0 49 API calls 103473->103474 103475 7ff7a44ea8ad 103474->103475 103476 7ff7a44ea8bd 103475->103476 103477 7ff7a44d7910 49 API calls 103475->103477 103478 7ff7a44d7910 49 API calls 103476->103478 103479 7ff7a44ea8e0 103477->103479 103480 7ff7a44ea8fa 103478->103480 103481 7ff7a44d9200 85 API calls 103479->103481 103482 7ff7a44d76c0 92 API calls 103480->103482 103481->103476 103483 7ff7a44ea90e 103482->103483 103484 7ff7a44ea410 92 API calls 103483->103484 103485 7ff7a44ea919 103484->103485 103486 7ff7a44d71e0 49 API calls 103485->103486 103487 7ff7a44ea921 103486->103487 103499 7ff7a44d729e 103498->103499 103500 7ff7a44d721e 103498->103500 103501 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 103499->103501 103799 7ff7a44d5c30 49 API calls 103500->103799 103503 7ff7a44d72cb 103501->103503 103503->103306 103503->103307 103504 7ff7a44d722b 103505 7ff7a44d728b 103504->103505 103507 7ff7a44d72e0 103504->103507 103505->103499 103800 7ff7a44d7340 49 API calls std::_Throw_Cpp_error 103505->103800 103801 7ff7a44d3820 49 API calls 103507->103801 103509 7ff7a44d7322 103802 7ff7a4509cb8 RtlPcToFileHeader RaiseException 103509->103802 103511 7ff7a44d7333 103803 7ff7a4527980 103512->103803 103514 7ff7a451dd5b 103819 7ff7a452bf20 103514->103819 103519 7ff7a45216c0 103905 7ff7a451d330 103519->103905 103523 7ff7a452182a 103526 7ff7a4529570 47 API calls 103523->103526 103525 7ff7a4521729 BuildCatchObjectHelperInternal 103525->103523 104010 7ff7a44d7f90 103525->104010 103527 7ff7a45218b6 null_memory_resource 103526->103527 103530 7ff7a45229f4 103527->103530 103637 7ff7a45229ee 103527->103637 103916 7ff7a4528160 103527->103916 103529 7ff7a44eec40 _invalid_parameter_noinfo_noreturn 47 API calls 103529->103530 103532 7ff7a44eec40 _invalid_parameter_noinfo_noreturn 47 API calls 103530->103532 103637->103529 103738 7ff7a4506ee9 103737->103738 103739 7ff7a44dd089 RtlCreateUnicodeString 103738->103739 103740 7ff7a450761c IsProcessorFeaturePresent 103738->103740 103739->103325 103741 7ff7a4507634 103740->103741 104173 7ff7a4507810 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 103741->104173 103743 7ff7a4507647 104174 7ff7a45075e8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 103743->104174 103760->103375 103761->103378 103762->103380 103763->103384 103764->103388 103765->103392 103766->103394 103782 7ff7a454307c 103767->103782 103769 7ff7a44d7780 103770 7ff7a454307c std::_Lockit::_Lockit 6 API calls 103769->103770 103771 7ff7a44d77a5 103769->103771 103770->103771 103781 7ff7a44d781d 103771->103781 103786 7ff7a44d34c0 92 API calls 5 library calls 103771->103786 103772 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 103773 7ff7a44d76f6 103772->103773 103773->103399 103775 7ff7a44d782f 103776 7ff7a44d7835 103775->103776 103777 7ff7a44d7896 103775->103777 103787 7ff7a45434b8 49 API calls std::_Facet_Register 103776->103787 103788 7ff7a44d2a80 49 API calls 3 library calls 103777->103788 103780 7ff7a44d789b 103781->103772 103783 7ff7a454308b 103782->103783 103784 7ff7a4543090 103782->103784 103789 7ff7a44faf6c 6 API calls std::_Lockit::_Lockit 103783->103789 103784->103769 103786->103775 103787->103781 103788->103780 103790->103404 103791->103408 103792->103410 103793->103424 103794->103428 103795->103444 103796->103460 103797->103469 103799->103504 103800->103499 103801->103509 103802->103511 103832 7ff7a4507184 103803->103832 103806 7ff7a4507184 std::_Facet_Register 49 API calls 103807 7ff7a45279c8 memcpy_s 103806->103807 103841 7ff7a4527640 103807->103841 103809 7ff7a45279f1 103810 7ff7a4527a17 103809->103810 103813 7ff7a4527a8f 103809->103813 103846 7ff7a44d6000 49 API calls 4 library calls 103810->103846 103812 7ff7a4527a40 103847 7ff7a4529570 103812->103847 103818 7ff7a4527a8a 103813->103818 103855 7ff7a44d6000 49 API calls 4 library calls 103813->103855 103816 7ff7a4527aca 103817 7ff7a4529570 47 API calls 103816->103817 103817->103818 103818->103514 103889 7ff7a4544074 InitializeSRWLock 103819->103889 103821 7ff7a452bf4f 103822 7ff7a4507184 std::_Facet_Register 49 API calls 103821->103822 103823 7ff7a452bf79 103822->103823 103824 7ff7a4527de0 49 API calls 103823->103824 103825 7ff7a451ddd3 103824->103825 103826 7ff7a45319e0 103825->103826 103827 7ff7a45319f5 103826->103827 103890 7ff7a453b4a0 103827->103890 103833 7ff7a450718f __std_exception_copy 103832->103833 103834 7ff7a45071a8 103833->103834 103836 7ff7a45071ae 103833->103836 103856 7ff7a44fdee8 103833->103856 103834->103806 103837 7ff7a45071b9 103836->103837 103859 7ff7a4507c6c RtlPcToFileHeader RaiseException std::_Throw_Cpp_error std::bad_alloc::bad_alloc 103836->103859 103860 7ff7a44d2970 49 API calls 3 library calls 103837->103860 103840 7ff7a45071bf 103842 7ff7a4507184 std::_Facet_Register 49 API calls 103841->103842 103843 7ff7a4527666 103842->103843 103867 7ff7a4527de0 103843->103867 103845 7ff7a45276a2 103845->103809 103846->103812 103848 7ff7a4529599 103847->103848 103850 7ff7a45295d3 null_memory_resource 103848->103850 103852 7ff7a4529601 103848->103852 103849 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 103851 7ff7a45295fb 103849->103851 103850->103849 103851->103818 103853 7ff7a44eec40 _invalid_parameter_noinfo_noreturn 47 API calls 103852->103853 103854 7ff7a4529606 103853->103854 103855->103816 103861 7ff7a44fdf24 103856->103861 103860->103840 103866 7ff7a44faefc EnterCriticalSection 103861->103866 103868 7ff7a4527e10 103867->103868 103869 7ff7a4527ef2 103867->103869 103870 7ff7a4527f0e 103868->103870 103871 7ff7a4527e67 103868->103871 103872 7ff7a4527e3e 103868->103872 103869->103845 103881 7ff7a44d2970 49 API calls 3 library calls 103870->103881 103876 7ff7a4507184 std::_Facet_Register 49 API calls 103871->103876 103878 7ff7a4527e50 103871->103878 103872->103870 103874 7ff7a4527e4b 103872->103874 103875 7ff7a4507184 std::_Facet_Register 49 API calls 103874->103875 103875->103878 103876->103878 103880 7ff7a4527eb4 null_memory_resource 103878->103880 103882 7ff7a44eec40 103878->103882 103880->103845 103881->103878 103887 7ff7a44eeab4 47 API calls _invalid_parameter_noinfo 103882->103887 103884 7ff7a44eec59 103888 7ff7a44eec70 17 API calls BuildCatchObjectHelperInternal 103884->103888 103887->103884 103889->103821 103897 7ff7a453b6a0 103890->103897 103893 7ff7a453a9a0 103894 7ff7a453a9bb 103893->103894 103895 7ff7a44eaabb 103893->103895 103896 7ff7a453a9fa GetSystemInfo 103894->103896 103895->103519 103896->103895 103902 7ff7a453ace0 103897->103902 103899 7ff7a4531a0b 103899->103893 103900 7ff7a453b6c4 __std_exception_copy 103900->103899 103901 7ff7a453b762 InitializeCriticalSection 103900->103901 103901->103899 103903 7ff7a453ad47 103902->103903 103904 7ff7a453acef GetSystemInfo 103902->103904 103903->103900 103904->103903 103906 7ff7a44d3ab0 93 API calls 103905->103906 103907 7ff7a451d357 103906->103907 103908 7ff7a44d7910 49 API calls 103907->103908 103909 7ff7a451d369 103908->103909 103910 7ff7a44d9200 85 API calls 103909->103910 103911 7ff7a451d3be 103910->103911 103912 7ff7a44d5cb0 49 API calls 103911->103912 103913 7ff7a451d3cb 103912->103913 103914 7ff7a44d39c0 std::_Throw_Cpp_error 47 API calls 103913->103914 103915 7ff7a451d3d6 103914->103915 103915->103525 104009 7ff7a44e1760 49 API calls 6 library calls 103915->104009 103917 7ff7a4528a80 null_memory_resource 103916->103917 103918 7ff7a45281d2 103916->103918 104009->103525 104011 7ff7a44d8104 104010->104011 104012 7ff7a44d7fc8 104010->104012 104155 7ff7a44d2a30 49 API calls std::_Throw_Cpp_error 104011->104155 104015 7ff7a44d8025 104012->104015 104016 7ff7a44d8051 104012->104016 104014 7ff7a44d8109 104156 7ff7a44d2970 49 API calls 3 library calls 104014->104156 104015->104014 104017 7ff7a44d8032 104015->104017 104020 7ff7a4507184 std::_Facet_Register 49 API calls 104016->104020 104021 7ff7a44d803a BuildCatchObjectHelperInternal 104016->104021 104019 7ff7a4507184 std::_Facet_Register 49 API calls 104017->104019 104019->104021 104020->104021 104022 7ff7a44eec40 _invalid_parameter_noinfo_noreturn 47 API calls 104021->104022 104024 7ff7a44d80ba null_memory_resource BuildCatchObjectHelperInternal 104021->104024 104024->103523 104156->104021 104173->103743 104209 7ff7a44d9895 104208->104209 104210 7ff7a44d988a 104208->104210 104209->103328 104214 7ff7a44d9e50 104209->104214 104211 7ff7a44da750 9 API calls 104210->104211 104212 7ff7a44d988f 104210->104212 104211->104212 104212->104209 104213 7ff7a44da750 9 API calls 104212->104213 104213->104209 104215 7ff7a44d9f1c 104214->104215 104216 7ff7a44d9e6e 104214->104216 104215->103330 104217 7ff7a44d9870 9 API calls 104216->104217 104218 7ff7a44d9e73 104217->104218 104218->104215 104219 7ff7a44da750 9 API calls 104218->104219 104220 7ff7a44d9e91 104219->104220 104221 7ff7a44da750 9 API calls 104220->104221 104224 7ff7a44d9ed4 104220->104224 104222 7ff7a44d9ebb 104221->104222 104223 7ff7a44da750 9 API calls 104222->104223 104222->104224 104223->104224 104224->103330 104226 7ff7a44da7df 104225->104226 104229 7ff7a44da774 104225->104229 104228 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 104226->104228 104227 7ff7a44da780 VirtualQuery 104227->104226 104227->104229 104230 7ff7a44d9fa3 104228->104230 104229->104226 104229->104227 104230->103333 104230->103338 104232 7ff7a44da10d 104231->104232 104242 7ff7a44da11d BuildCatchObjectHelperInternal 104231->104242 104233 7ff7a44da750 9 API calls 104232->104233 104234 7ff7a44da117 104232->104234 104232->104242 104233->104234 104235 7ff7a44da750 9 API calls 104234->104235 104236 7ff7a44da16b 104234->104236 104234->104242 104235->104236 104237 7ff7a44da750 9 API calls 104236->104237 104236->104242 104238 7ff7a44da1bd 104237->104238 104239 7ff7a44da750 9 API calls 104238->104239 104238->104242 104240 7ff7a44da1e2 104239->104240 104241 7ff7a44da750 9 API calls 104240->104241 104240->104242 104241->104242 104242->103333 104264 7ff7a44d9a40 104243->104264 104245 7ff7a44dd03c 104247 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 104245->104247 104249 7ff7a44dd04a 104247->104249 104249->103352 104249->103356 104250 7ff7a44dcea8 104251 7ff7a44d9b30 9 API calls 104250->104251 104252 7ff7a44dceca 104251->104252 104254 7ff7a44dced5 104252->104254 104295 7ff7a44d9c40 9 API calls 104252->104295 104255 7ff7a44dcef0 NtCreateSection 104254->104255 104255->104245 104256 7ff7a44dcf60 NtMapViewOfSection 104255->104256 104257 7ff7a44dcfa1 104256->104257 104258 7ff7a44dcfeb 104256->104258 104257->104258 104259 7ff7a44dcfa6 NtMapViewOfSection 104257->104259 104260 7ff7a44da0e0 9 API calls 104258->104260 104259->104245 104259->104258 104261 7ff7a44dcffe 104260->104261 104262 7ff7a44dd013 NtUnmapViewOfSection 104261->104262 104296 7ff7a44da640 9 API calls std::_Xinvalid_argument 104261->104296 104262->104245 104265 7ff7a44d9a5b 104264->104265 104275 7ff7a44d9af2 104264->104275 104266 7ff7a44da750 9 API calls 104265->104266 104267 7ff7a44d9a65 104266->104267 104268 7ff7a44da750 9 API calls 104267->104268 104267->104275 104269 7ff7a44d9a9b 104268->104269 104270 7ff7a44da750 9 API calls 104269->104270 104269->104275 104271 7ff7a44d9ab4 104270->104271 104272 7ff7a44da750 9 API calls 104271->104272 104271->104275 104273 7ff7a44d9ad9 104272->104273 104274 7ff7a44da750 9 API calls 104273->104274 104273->104275 104274->104275 104275->104245 104276 7ff7a44d9d30 104275->104276 104277 7ff7a44d9e2f 104276->104277 104278 7ff7a44d9d4b 104276->104278 104277->104250 104279 7ff7a44da750 9 API calls 104278->104279 104280 7ff7a44d9d55 104279->104280 104280->104277 104281 7ff7a44da750 9 API calls 104280->104281 104282 7ff7a44d9d8b 104281->104282 104282->104277 104283 7ff7a44da750 9 API calls 104282->104283 104287 7ff7a44d9dac 104283->104287 104284 7ff7a44d9e14 104297 7ff7a44d9930 9 API calls 104284->104297 104286 7ff7a44d9e1c 104286->104250 104287->104284 104288 7ff7a44da750 9 API calls 104287->104288 104289 7ff7a44d9dd1 104288->104289 104289->104284 104290 7ff7a44da750 9 API calls 104289->104290 104291 7ff7a44d9dea 104290->104291 104291->104284 104292 7ff7a44d9df9 104291->104292 104293 7ff7a44d9a40 9 API calls 104292->104293 104294 7ff7a44d9e01 104293->104294 104294->104250 104295->104255 104296->104262 104297->104286 104298 12a222a7159 104299 12a222a7177 104298->104299 104300 12a222a71e2 104299->104300 104301 12a222a71b6 104299->104301 104306 12a2230e200 std::_Facet_Register 41 API calls 104300->104306 104307 12a222a71cb _Strxfrm _Receive_impl 104300->104307 104302 12a222a71c3 104301->104302 104303 12a222a726e 104301->104303 104308 12a2230e200 104302->104308 104317 12a2228d8b0 41 API calls 2 library calls 104303->104317 104306->104307 104309 12a2230e20b 104308->104309 104310 12a2230e224 104309->104310 104312 12a2230e22a 104309->104312 104318 12a223090b4 104309->104318 104310->104307 104313 12a2230e235 104312->104313 104321 12a2230f020 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 104312->104321 104322 12a2228d8b0 41 API calls 2 library calls 104313->104322 104316 12a2230e23b 104317->104307 104323 12a223090f0 104318->104323 104321->104313 104322->104316 104328 12a222fc064 EnterCriticalSection 104323->104328 106441 12a222a3576 106442 12a222a357b _Receive_impl 106441->106442 106443 12a2230df40 _Strcoll 4 API calls 106442->106443 106444 12a222a358f 106443->106444 106445 7ff7a4526fa0 GetSystemInfo 104329 12a222e8851 104330 12a222e887c 104329->104330 104339 12a222e8867 104329->104339 104332 12a222e8a4c 104330->104332 104336 12a222e8885 104330->104336 104331 12a222e8ab9 104335 12a222e8520 4 API calls 104331->104335 104332->104331 104337 12a222e8520 4 API calls 104332->104337 104334 12a222e89de 104341 12a222e8520 4 API calls 104334->104341 104335->104339 104342 12a222e88e6 memcpy_s 104336->104342 104348 12a222a7ab0 104336->104348 104337->104332 104338 12a222e8e0b 104360 12a2230df40 104339->104360 104341->104339 104342->104334 104344 12a222e8520 104342->104344 104345 12a222e854d 104344->104345 104346 12a2230df40 _Strcoll 4 API calls 104345->104346 104347 12a222e8e0b 104346->104347 104347->104342 104349 12a222a7c42 104348->104349 104350 12a222a7ade 104348->104350 104367 12a2228d970 41 API calls 104349->104367 104353 12a222a7b74 104350->104353 104354 12a222a7b48 104350->104354 104352 12a222a7c47 104368 12a2228d8b0 41 API calls 2 library calls 104352->104368 104356 12a2230e200 std::_Facet_Register 41 API calls 104353->104356 104359 12a222a7b5d memcpy_s _Strxfrm _Receive_impl 104353->104359 104354->104352 104355 12a222a7b55 104354->104355 104358 12a2230e200 std::_Facet_Register 41 API calls 104355->104358 104356->104359 104358->104359 104359->104342 104361 12a2230df49 104360->104361 104362 12a2230e5c4 IsProcessorFeaturePresent 104361->104362 104363 12a2230df54 104361->104363 104364 12a2230e5dc 104362->104364 104363->104338 104369 12a2230e7b8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 104364->104369 104366 12a2230e5ef 104366->104338 104368->104359 104369->104366 104370 12a222c3210 104431 12a222908d0 104370->104431 104373 12a222908d0 44 API calls 104374 12a222c3b00 104373->104374 104385 12a222c3f1c _Receive_impl 104374->104385 104437 12a2228f540 104374->104437 104376 12a2230df40 _Strcoll 4 API calls 104378 12a222c3f47 104376->104378 104384 12a222c3c13 104384->104385 104386 12a222c3f63 104384->104386 104385->104376 104463 12a222a67e0 104386->104463 104390 12a222c3fb4 104477 12a22290090 104390->104477 104432 12a22290901 104431->104432 104483 12a2231b76c 104432->104483 104435 12a2230df40 _Strcoll 4 API calls 104436 12a222909a2 104435->104436 104436->104373 104438 12a2228f560 104437->104438 104515 12a22296ef0 104438->104515 104440 12a2228f5ea 104441 12a2228f3d0 104440->104441 104442 12a2228f400 104441->104442 104530 12a2231b41c 104442->104530 104444 12a2228f497 104452 12a222c6030 104444->104452 104445 12a2228f40c __std_fs_convert_wide_to_narrow 104445->104444 104446 12a2228f4e4 104445->104446 104533 12a222a1d90 104445->104533 104540 12a2228f010 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 104446->104540 104450 12a2228f470 __std_fs_convert_wide_to_narrow 104450->104444 104539 12a2228f010 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 104450->104539 104453 12a222c6056 104452->104453 104551 12a222c7620 104453->104551 104455 12a222c3b59 104456 12a222db1f0 104455->104456 104557 12a222da8f0 104456->104557 104460 12a222db24a 104461 12a2230df40 _Strcoll 4 API calls 104460->104461 104462 12a222db2cd 104461->104462 104462->104384 104464 12a222a6837 104463->104464 105177 12a222909d0 104464->105177 104466 12a222a6873 _Receive_impl 104470 12a222a6a42 104466->104470 105189 12a2230fe88 104466->105189 104468 12a222a69c2 _Receive_impl 104469 12a2230df40 _Strcoll 4 API calls 104468->104469 104468->104470 104471 12a222a6a34 104469->104471 104472 12a22311108 104471->104472 104473 12a22311144 RtlPcToFileHeader 104472->104473 104474 12a22311127 104472->104474 104475 12a2231116b RaiseException 104473->104475 104476 12a2231115c 104473->104476 104474->104473 104475->104390 104476->104475 104478 12a222900a9 104477->104478 105202 12a2228fa40 41 API calls _Receive_impl 104478->105202 104480 12a222900e0 104481 12a22311108 Concurrency::cancel_current_task 2 API calls 104480->104481 104482 12a222900f1 104481->104482 104484 12a2231b7ae 104483->104484 104485 12a2231b8c9 104484->104485 104487 12a2231b80f GetFileAttributesExW 104484->104487 104498 12a2231b7b7 __std_fs_directory_iterator_open 104484->104498 104514 12a2231bb40 CreateFileW __std_fs_directory_iterator_open 104485->104514 104486 12a2230df40 _Strcoll 4 API calls 104488 12a2229091d 104486->104488 104490 12a2231b823 __std_fs_directory_iterator_open 104487->104490 104497 12a2231b851 __std_fs_directory_iterator_open 104487->104497 104488->104435 104495 12a2231b832 FindFirstFileW 104490->104495 104490->104498 104491 12a2231b8ec 104492 12a2231b9bf 104491->104492 104493 12a2231b921 GetFileInformationByHandleEx 104491->104493 104505 12a2231b8f2 _invalid_parameter_noinfo 104491->104505 104494 12a2231b9da GetFileInformationByHandleEx 104492->104494 104492->104505 104496 12a2231b961 104493->104496 104502 12a2231b93b _invalid_parameter_noinfo __std_fs_directory_iterator_open 104493->104502 104503 12a2231b9f0 _invalid_parameter_noinfo __std_fs_directory_iterator_open 104494->104503 104494->104505 104495->104497 104495->104498 104496->104492 104499 12a2231b982 GetFileInformationByHandleEx 104496->104499 104497->104485 104497->104498 104498->104486 104499->104492 104507 12a2231b99e _invalid_parameter_noinfo __std_fs_directory_iterator_open 104499->104507 104500 12a2231ba81 104501 12a2230b1c0 __std_fs_directory_iterator_open 38 API calls 104500->104501 104504 12a2231ba86 104501->104504 104506 12a2231ba92 104502->104506 104511 12a2231b90b 104502->104511 104510 12a2231ba8c 104503->104510 104503->104511 104508 12a2230b1c0 __std_fs_directory_iterator_open 38 API calls 104504->104508 104505->104498 104505->104500 104505->104511 104509 12a2230b1c0 __std_fs_directory_iterator_open 38 API calls 104506->104509 104507->104504 104507->104511 104508->104510 104512 12a2231ba98 104509->104512 104513 12a2230b1c0 __std_fs_directory_iterator_open 38 API calls 104510->104513 104511->104498 104513->104506 104514->104491 104518 12a22296f16 104515->104518 104524 12a22297011 104515->104524 104517 12a22296f29 _Strxfrm 104517->104440 104518->104517 104519 12a22296f63 104518->104519 104520 12a2229700c 104518->104520 104522 12a22296fc5 104518->104522 104519->104520 104523 12a22296faa 104519->104523 104528 12a2228d8b0 41 API calls 2 library calls 104520->104528 104526 12a2230e200 std::_Facet_Register 41 API calls 104522->104526 104527 12a22296fb2 _Strxfrm 104522->104527 104525 12a2230e200 std::_Facet_Register 41 API calls 104523->104525 104529 12a2228d970 41 API calls 104524->104529 104525->104527 104526->104527 104527->104440 104528->104524 104541 12a22305e00 104530->104541 104532 12a2231b425 __std_fs_code_page 104532->104445 104534 12a222a1da5 104533->104534 104535 12a222a1dbb 104533->104535 104534->104450 104536 12a222a7ab0 41 API calls 104535->104536 104538 12a222a1dd5 memcpy_s 104535->104538 104537 12a222a1e21 104536->104537 104537->104450 104538->104450 104542 12a222f9b94 __std_fs_directory_iterator_open 38 API calls 104541->104542 104543 12a22305e09 104542->104543 104546 12a222fbe1c 104543->104546 104547 12a222fbe44 104546->104547 104548 12a222fbe31 104546->104548 104547->104532 104548->104547 104550 12a22305070 38 API calls 3 library calls 104548->104550 104550->104547 104552 12a222c76e5 104551->104552 104555 12a222c7650 _Strxfrm 104551->104555 104556 12a222cb7f0 41 API calls 4 library calls 104552->104556 104554 12a222c76fa 104554->104455 104555->104455 104556->104554 104558 12a222908d0 44 API calls 104557->104558 104559 12a222da941 104558->104559 104560 12a222db02e 104559->104560 104565 12a222da97d memcpy_s 104559->104565 104561 12a222dafde 104560->104561 104562 12a222db06c 104560->104562 104564 12a2230df40 _Strcoll 4 API calls 104561->104564 104674 12a22290100 41 API calls Concurrency::cancel_current_task 104562->104674 104566 12a222db050 104564->104566 104565->104561 104619 12a222e9550 104565->104619 104566->104460 104614 12a222a43f0 104566->104614 104569 12a222dae29 104632 12a222b6b90 104569->104632 104570 12a222da9e4 104668 12a222e5720 24 API calls 2 library calls 104570->104668 104575 12a222da9f6 104669 12a222e5920 50 API calls 7 library calls 104575->104669 104577 12a222db082 104675 12a2228ed90 41 API calls 104577->104675 104580 12a222daa07 104583 12a222dab0a GetFileSize 104580->104583 104584 12a222daa1a 104580->104584 104581 12a222dae57 104586 12a222b6b90 64 API calls 104581->104586 104582 12a222db0ae 104585 12a22311108 Concurrency::cancel_current_task 2 API calls 104582->104585 104587 12a222dab4b 104583->104587 104591 12a222dab26 memcpy_s 104583->104591 104584->104577 104588 12a222daa61 _Receive_impl 104584->104588 104598 12a222db0bf 104585->104598 104589 12a222dae90 104586->104589 104587->104591 104595 12a222a7ab0 41 API calls 104587->104595 104670 12a222b39a0 40 API calls 104588->104670 104651 12a222e96f0 104589->104651 104590 12a222dabb0 SetFilePointer 104596 12a222dabf7 _fread_nolock 104590->104596 104591->104590 104595->104590 104608 12a222dabff 104596->104608 104611 12a222dad2b 104596->104611 104676 12a2228ed90 41 API calls 104598->104676 104603 12a222db104 104609 12a22311108 Concurrency::cancel_current_task 2 API calls 104603->104609 104605 12a222dad80 _Receive_impl 104672 12a222b39a0 40 API calls 104605->104672 104606 12a222dac82 _Receive_impl 104671 12a222b39a0 40 API calls 104606->104671 104608->104577 104608->104606 104612 12a222db115 104609->104612 104611->104577 104611->104605 104613 12a222daab9 104613->104561 104615 12a222a1d90 41 API calls 104614->104615 104616 12a222a445a 104615->104616 104617 12a222a1d90 41 API calls 104616->104617 104618 12a222a456d 104617->104618 104618->104460 104620 12a222e9576 104619->104620 104677 12a222a3a20 104620->104677 104626 12a222da9a8 104626->104569 104626->104570 104627 12a222e963a 104627->104626 104704 12a2228ed90 41 API calls 104627->104704 104629 12a222e96d8 104630 12a22311108 Concurrency::cancel_current_task 2 API calls 104629->104630 104631 12a222e96e9 104630->104631 104633 12a222b6bed 104632->104633 104635 12a222b6cd2 104632->104635 104913 12a222b7410 104633->104913 104961 12a2228ed90 41 API calls 104635->104961 104636 12a222b6c12 104640 12a222b6c49 104636->104640 104951 12a222b2f80 104636->104951 104637 12a222b6c9f 104647 12a222b6ab0 104637->104647 104639 12a222b6d14 104641 12a22311108 Concurrency::cancel_current_task 2 API calls 104639->104641 104640->104637 104962 12a2228ed90 41 API calls 104640->104962 104641->104640 104643 12a222b6d6d 104644 12a22311108 Concurrency::cancel_current_task 2 API calls 104643->104644 104645 12a222b6d81 104644->104645 104648 12a222b6ae0 104647->104648 104649 12a222b7410 64 API calls 104648->104649 104650 12a222b6aef 104649->104650 104650->104581 104668->104575 104669->104580 104670->104613 104671->104613 104672->104613 104675->104582 104676->104603 104678 12a2230e200 std::_Facet_Register 41 API calls 104677->104678 104679 12a222a3a80 104678->104679 104705 12a2231c4dc 104679->104705 104681 12a222a3a90 104714 12a222a3f00 104681->104714 104684 12a222a3b20 104685 12a222a3b2d 104684->104685 104729 12a2231c7a8 EnterCriticalSection std::_Lockit::_Lockit 104684->104729 104692 12a222b45c0 104685->104692 104687 12a222a3b48 104730 12a2228ed90 41 API calls 104687->104730 104689 12a222a3b88 104690 12a22311108 Concurrency::cancel_current_task 2 API calls 104689->104690 104691 12a222a3b99 104690->104691 104742 12a222a3630 104692->104742 104695 12a222d7b80 104696 12a222d7ba5 104695->104696 104697 12a222d7c34 104695->104697 104747 12a2231ca18 104696->104747 104697->104627 104701 12a222d7bcb 104756 12a222b5ae0 64 API calls 4 library calls 104701->104756 104703 12a222d7bf1 104703->104627 104704->104629 104731 12a2231be7c 104705->104731 104707 12a2231c4fe 104711 12a2231c542 _Strxfrm 104707->104711 104735 12a2231c6d4 41 API calls std::_Facet_Register 104707->104735 104709 12a2231c516 104736 12a2231c704 39 API calls std::locale::_Setgloballocale 104709->104736 104711->104681 104712 12a2231c521 104712->104711 104737 12a222f0d60 9 API calls 3 library calls 104712->104737 104715 12a2231be7c std::_Lockit::_Lockit EnterCriticalSection 104714->104715 104716 12a222a3f30 104715->104716 104717 12a2231be7c std::_Lockit::_Lockit EnterCriticalSection 104716->104717 104719 12a222a3f55 104716->104719 104717->104719 104718 12a222a3fcd 104720 12a2230df40 _Strcoll 4 API calls 104718->104720 104719->104718 104739 12a2228ea30 65 API calls 7 library calls 104719->104739 104722 12a222a3ac5 104720->104722 104722->104684 104722->104687 104723 12a222a3fdf 104724 12a222a3fe5 104723->104724 104725 12a222a4046 104723->104725 104740 12a2231c49c 41 API calls std::_Facet_Register 104724->104740 104741 12a2228e570 41 API calls 2 library calls 104725->104741 104728 12a222a404b 104729->104685 104730->104689 104732 12a2231be8b 104731->104732 104734 12a2231be90 104731->104734 104738 12a222fc0d4 EnterCriticalSection std::_Lockit::_Lockit 104732->104738 104734->104707 104735->104709 104736->104712 104737->104711 104739->104723 104740->104718 104741->104728 104743 12a2230e200 std::_Facet_Register 41 API calls 104742->104743 104744 12a222a3651 104743->104744 104745 12a2231c4dc 43 API calls 104744->104745 104746 12a222a3661 104745->104746 104746->104695 104748 12a2231ca5a 104747->104748 104754 12a222d7bb5 104748->104754 104757 12a2231e3f8 104748->104757 104750 12a2231ca8d 104750->104754 104774 12a222f1534 38 API calls _invalid_parameter_noinfo 104750->104774 104752 12a2231caa7 104752->104754 104775 12a222f02d0 104752->104775 104754->104697 104755 12a222b4100 38 API calls _Strcoll 104754->104755 104755->104701 104756->104703 104759 12a2231e324 104757->104759 104758 12a2231e34a 104795 12a222f5e1c 8 API calls _set_errno_from_matherr 104758->104795 104759->104758 104761 12a2231e37d 104759->104761 104763 12a2231e390 104761->104763 104764 12a2231e383 104761->104764 104762 12a2231e34f 104796 12a222f1958 38 API calls _invalid_parameter_noinfo 104762->104796 104783 12a222fd1ec 104763->104783 104797 12a222f5e1c 8 API calls _set_errno_from_matherr 104764->104797 104773 12a2231e35a 104773->104750 104774->104752 104776 12a222f0300 104775->104776 104873 12a222f01b0 104776->104873 104778 12a222f0319 104779 12a222f033e 104778->104779 104881 12a222ef918 38 API calls 3 library calls 104778->104881 104799 12a222fc064 EnterCriticalSection 104783->104799 104795->104762 104796->104773 104797->104773 104874 12a222f01f9 104873->104874 104875 12a222f01cb 104873->104875 104880 12a222f01eb 104874->104880 104883 12a222f069c EnterCriticalSection 104874->104883 104899 12a222f1888 38 API calls _invalid_parameter_noinfo 104875->104899 104880->104778 104881->104779 104884 12a222f020f 104883->104884 104885 12a222f022c 104884->104885 104899->104880 104914 12a222b7450 104913->104914 104918 12a222b742d 104913->104918 104916 12a222b745e 104914->104916 104963 12a222a8e80 104914->104963 104915 12a222b744a 104915->104636 104916->104636 104918->104915 104987 12a2228ed90 41 API calls 104918->104987 104920 12a222b74b3 104921 12a22311108 Concurrency::cancel_current_task 2 API calls 104920->104921 104923 12a222b74c4 _Receive_impl 104921->104923 104922 12a222b7625 104922->104636 104923->104922 104988 12a222b6580 64 API calls 7 library calls 104923->104988 104925 12a222b780d 104990 12a222b6580 64 API calls 7 library calls 104925->104990 104928 12a222b77da 104928->104925 104930 12a222b78b6 104928->104930 104989 12a222ad420 41 API calls _Strcoll 104928->104989 104929 12a222b782c 104991 12a222ad420 41 API calls _Strcoll 104929->104991 104932 12a222b78e1 104930->104932 104994 12a222b6400 41 API calls 2 library calls 104930->104994 104939 12a222b790a _Receive_impl 104932->104939 104995 12a222b5f90 64 API calls 2 library calls 104932->104995 104936 12a222b7845 104936->104939 104943 12a2230df40 _Strcoll 4 API calls 104939->104943 104944 12a222b7b43 104939->104944 104947 12a222b7b28 104943->104947 104947->104636 104952 12a222b2fb3 104951->104952 104960 12a222b300b 104952->104960 105004 12a222b4010 104952->105004 104954 12a2230df40 _Strcoll 4 API calls 104955 12a222b3079 104954->104955 104955->104640 104956 12a222b2fd6 104957 12a222b2ff6 104956->104957 104956->104960 105014 12a222f149c 104956->105014 104957->104960 105022 12a222f0ab4 104957->105022 104960->104954 104961->104639 104962->104643 104964 12a222a8f3e 104963->104964 104965 12a222a8ebe 104963->104965 104966 12a2230df40 _Strcoll 4 API calls 104964->104966 104999 12a222a8980 41 API calls 104965->104999 104968 12a222a8f6b 104966->104968 104968->104916 104969 12a222a8ecb 104970 12a222a8f2b 104969->104970 104972 12a222a8f80 104969->104972 104970->104964 105000 12a222a9960 41 API calls 2 library calls 104970->105000 105001 12a2228ed90 41 API calls 104972->105001 104974 12a222a8fc2 104975 12a22311108 Concurrency::cancel_current_task 2 API calls 104974->104975 104976 12a222a8fd3 104975->104976 104977 12a222a8e80 41 API calls 104976->104977 104978 12a222a902b 104976->104978 104977->104978 104980 12a222a90f2 104978->104980 104981 12a222a9130 104978->104981 104987->104920 104988->104928 104989->104928 104990->104929 104991->104936 104994->104932 104995->104939 104999->104969 105000->104964 105001->104974 105005 12a222b4033 105004->105005 105006 12a222b40e2 105004->105006 105005->105006 105010 12a222b403d 105005->105010 105007 12a2230df40 _Strcoll 4 API calls 105006->105007 105008 12a222b40f1 105007->105008 105008->104956 105009 12a2230df40 _Strcoll 4 API calls 105011 12a222b409e 105009->105011 105013 12a222b4081 105010->105013 105031 12a222f0a10 39 API calls _invalid_parameter_noinfo 105010->105031 105011->104956 105013->105009 105015 12a222f14cc 105014->105015 105031->105013 105178 12a22290a0b 105177->105178 105179 12a22290b40 105178->105179 105180 12a222a7940 41 API calls 105178->105180 105181 12a22290be3 _Receive_impl 105179->105181 105183 12a22290c1c 105179->105183 105180->105179 105182 12a2230df40 _Strcoll 4 API calls 105181->105182 105184 12a22290c08 105182->105184 105195 12a2230ff18 105183->105195 105184->104466 105187 12a2230ff18 __std_exception_destroy 9 API calls 105188 12a22290c72 _Receive_impl 105187->105188 105188->104466 105190 12a2230fea9 105189->105190 105194 12a2230fef3 105189->105194 105191 12a2230fede 105190->105191 105190->105194 105200 12a222f8c80 38 API calls 2 library calls 105190->105200 105201 12a222f0d60 9 API calls 3 library calls 105191->105201 105194->104468 105196 12a22290c65 105195->105196 105197 12a2230ff27 105195->105197 105196->105187 105199 12a222f0d60 9 API calls 3 library calls 105197->105199 105199->105196 105200->105191 105201->105194 105202->104480 105203 12a222eb64e 105208 12a222ebfc0 105203->105208 105206 12a2230df40 _Strcoll 4 API calls 105207 12a222eb68b 105206->105207 105209 12a222ebfde 105208->105209 105210 12a222ec011 105209->105210 105214 12a222ccce0 41 API calls 4 library calls 105209->105214 105215 12a222ec8e0 105210->105215 105213 12a222eb656 105213->105206 105214->105210 105216 12a222ec903 105215->105216 105219 12a222ec8fd 105215->105219 105218 12a222ec91a 105216->105218 105231 12a222b3360 41 API calls 105216->105231 105217 12a222ec987 105217->105213 105218->105219 105221 12a222ec9b4 105218->105221 105219->105217 105232 12a222ccce0 41 API calls 4 library calls 105219->105232 105233 12a2228ed90 41 API calls 105221->105233 105223 12a222ec9f6 105224 12a22311108 Concurrency::cancel_current_task 2 API calls 105223->105224 105225 12a222eca07 105224->105225 105226 12a222a7940 41 API calls 105225->105226 105229 12a222eca35 105225->105229 105226->105229 105227 12a222ecae0 105227->105213 105228 12a222ec8e0 41 API calls 105228->105229 105229->105227 105229->105228 105230 12a222a7940 41 API calls 105229->105230 105230->105229 105231->105218 105232->105217 105233->105223 106446 12a222dbab0 106447 12a222dbb2b 106446->106447 106502 12a2228f840 106447->106502 106449 12a222dbb50 _Receive_impl 106450 12a222908d0 44 API calls 106449->106450 106451 12a222dc053 106449->106451 106452 12a222dbbb9 memcpy_s 106450->106452 106537 12a2228ed90 41 API calls 106451->106537 106457 12a222e9550 78 API calls 106452->106457 106466 12a222dbf02 106452->106466 106454 12a222dbd03 _Receive_impl 106456 12a2230df40 _Strcoll 4 API calls 106454->106456 106459 12a222dbfe5 106456->106459 106460 12a222dbc37 106457->106460 106501 12a222dbe87 106460->106501 106505 12a222e9900 106460->106505 106461 12a222dc085 106462 12a22311108 Concurrency::cancel_current_task 2 API calls 106461->106462 106465 12a222dc096 106462->106465 106538 12a2228ed90 41 API calls 106465->106538 106466->106451 106466->106454 106492 12a222dc111 106466->106492 106467 12a222dbc79 106469 12a222dbc96 106467->106469 106470 12a222dbd19 106467->106470 106469->106451 106471 12a222dbcc8 106469->106471 106512 12a222e8060 106470->106512 106474 12a222e7ea0 43 API calls 106471->106474 106472 12a222dc0bf 106476 12a22311108 Concurrency::cancel_current_task 2 API calls 106472->106476 106477 12a222dbcd5 106474->106477 106475 12a222dbd2d 106478 12a222dbdc7 106475->106478 106479 12a222dbd44 106475->106479 106480 12a222dc0d3 106476->106480 106533 12a222b2b80 40 API calls 106477->106533 106482 12a222e8060 41 API calls 106478->106482 106479->106465 106483 12a222dbd76 106479->106483 106539 12a2228ed90 41 API calls 106480->106539 106486 12a222dbddb 106482->106486 106523 12a222e7ea0 106483->106523 106489 12a222e8060 41 API calls 106486->106489 106487 12a222dbd83 106534 12a222b2b80 40 API calls 106487->106534 106488 12a222dc0fd 106490 12a22311108 Concurrency::cancel_current_task 2 API calls 106488->106490 106491 12a222dbdea 106489->106491 106490->106492 106493 12a222c63c0 41 API calls 106491->106493 106540 12a22290100 41 API calls Concurrency::cancel_current_task 106492->106540 106495 12a222dbdfa 106493->106495 106495->106480 106496 12a222e7ea0 43 API calls 106495->106496 106497 12a222dbe3a 106496->106497 106498 12a222a1f40 41 API calls 106497->106498 106499 12a222dbe4a 106498->106499 106535 12a222b2b80 40 API calls 106499->106535 106501->106454 106536 12a222b39a0 40 API calls 106501->106536 106541 12a22297170 106502->106541 106504 12a2228f862 106504->106449 106506 12a222a29a0 41 API calls 106505->106506 106507 12a222e9936 106506->106507 106556 12a222ecca0 106507->106556 106511 12a222e99a5 106511->106467 106513 12a222e8067 106512->106513 106514 12a222e80ba 106513->106514 106522 12a222e80fe 106513->106522 106796 12a222ea180 41 API calls 3 library calls 106513->106796 106514->106475 106515 12a222a67e0 41 API calls 106516 12a222e812b 106515->106516 106517 12a22311108 Concurrency::cancel_current_task 2 API calls 106516->106517 106518 12a222e813c 106517->106518 106520 12a222e80ed 106521 12a22311108 Concurrency::cancel_current_task 2 API calls 106520->106521 106521->106522 106522->106515 106524 12a222b4200 40 API calls 106523->106524 106526 12a222e7eb2 106523->106526 106524->106526 106525 12a222e7ee0 106525->106487 106526->106525 106797 12a2228ed90 41 API calls 106526->106797 106528 12a222e7f26 106529 12a22311108 Concurrency::cancel_current_task 2 API calls 106528->106529 106530 12a222e7f37 106529->106530 106531 12a222e7f67 106530->106531 106798 12a222f0d60 9 API calls 3 library calls 106530->106798 106531->106487 106533->106454 106534->106454 106535->106501 106536->106466 106537->106461 106538->106472 106539->106488 106544 12a2229719e 106541->106544 106542 12a222971c2 106542->106504 106544->106542 106547 12a2229724f 106544->106547 106548 12a222971ea 106544->106548 106549 12a22297293 106544->106549 106553 12a22297239 106544->106553 106551 12a22297241 _Strxfrm 106547->106551 106552 12a2230e200 std::_Facet_Register 41 API calls 106547->106552 106550 12a2230e200 std::_Facet_Register 41 API calls 106548->106550 106548->106553 106555 12a2228d970 41 API calls 106549->106555 106550->106553 106551->106504 106552->106551 106553->106551 106554 12a2228d8b0 41 API calls 2 library calls 106553->106554 106554->106549 106557 12a222eccf4 106556->106557 106619 12a222f5d14 106557->106619 106560 12a222eb370 41 API calls 106561 12a222ecdff 106560->106561 106624 12a222d98c0 106561->106624 106564 12a2230df40 _Strcoll 4 API calls 106565 12a222e9999 106564->106565 106566 12a222eaae0 106565->106566 106567 12a222eadfd 106566->106567 106571 12a222eab27 memcpy_s 106566->106571 106632 12a222ee420 106567->106632 106570 12a222eb370 41 API calls 106577 12a222eae3c 106570->106577 106690 12a222c6e20 41 API calls 106571->106690 106573 12a222eab77 106691 12a222ed580 43 API calls 2 library calls 106573->106691 106575 12a222eab87 106578 12a222eb370 41 API calls 106575->106578 106576 12a222a29a0 41 API calls 106586 12a222eb004 106576->106586 106579 12a222c6f80 43 API calls 106577->106579 106615 12a222eaf40 _Receive_impl 106577->106615 106589 12a222eab93 106578->106589 106581 12a222eae85 106579->106581 106580 12a2230df40 _Strcoll 4 API calls 106582 12a222eb094 106580->106582 106583 12a222ca660 43 API calls 106581->106583 106582->106511 106587 12a222eaeab 106583->106587 106584 12a222ead49 106588 12a222a29a0 41 API calls 106584->106588 106585 12a222ead91 106592 12a222ead64 _Receive_impl 106585->106592 106593 12a222a29a0 41 API calls 106585->106593 106590 12a222eb0e3 106586->106590 106586->106592 106591 12a222c7500 43 API calls 106587->106591 106588->106592 106617 12a222ead28 _Receive_impl 106589->106617 106692 12a222c6f80 106589->106692 106767 12a222c5ff0 39 API calls 106590->106767 106604 12a222eaeba _Receive_impl 106591->106604 106592->106580 106593->106592 106596 12a222eabdf 106700 12a222ca660 106596->106700 106597 12a222eb0fb 106600 12a22311108 Concurrency::cancel_current_task 2 API calls 106597->106600 106613 12a222eb10b 106600->106613 106601 12a2230ff18 __std_exception_destroy 9 API calls 106605 12a222eaf32 106601->106605 106602 12a222eb12a 106606 12a22311108 Concurrency::cancel_current_task 2 API calls 106602->106606 106603 12a222eac05 106760 12a222c7500 106603->106760 106604->106601 106611 12a222eb13a 106604->106611 106604->106613 106608 12a2230ff18 __std_exception_destroy 9 API calls 106605->106608 106606->106611 106608->106615 106610 12a222eac2a _Receive_impl 106612 12a2230ff18 __std_exception_destroy 9 API calls 106610->106612 106610->106613 106614 12a222eac95 106612->106614 106768 12a222c5ff0 39 API calls 106613->106768 106616 12a2230ff18 __std_exception_destroy 9 API calls 106614->106616 106615->106576 106615->106586 106615->106590 106615->106611 106618 12a222eaca3 _Receive_impl 106616->106618 106617->106584 106617->106585 106618->106613 106618->106617 106620 12a222f9b94 __std_fs_directory_iterator_open 38 API calls 106619->106620 106621 12a222f5d1d 106620->106621 106622 12a222fbe1c _Strxfrm 38 API calls 106621->106622 106623 12a222ecdda 106622->106623 106623->106560 106625 12a222d98f7 106624->106625 106626 12a222d98ce 106624->106626 106625->106564 106626->106625 106631 12a2228ed90 41 API calls 106626->106631 106628 12a222d992e 106629 12a22311108 Concurrency::cancel_current_task 2 API calls 106628->106629 106630 12a222d993f 106629->106630 106631->106628 106633 12a222ee49e 106632->106633 106634 12a222c6f80 43 API calls 106633->106634 106635 12a222ef06f 106634->106635 106636 12a222ca660 43 API calls 106635->106636 106637 12a222ef095 106636->106637 106638 12a222c7500 43 API calls 106637->106638 106639 12a222ef0a5 106638->106639 106640 12a222ef118 106639->106640 106641 12a222ef0b0 106639->106641 106774 12a222c5ff0 39 API calls 106640->106774 106769 12a22290ca0 106641->106769 106643 12a222ef124 106644 12a22311108 Concurrency::cancel_current_task 2 API calls 106643->106644 106646 12a222ef134 106644->106646 106775 12a222c5ff0 39 API calls 106646->106775 106648 12a222ef141 106649 12a22311108 Concurrency::cancel_current_task 2 API calls 106648->106649 106651 12a222ef151 106649->106651 106650 12a222ef0c4 106657 12a2230df40 _Strcoll 4 API calls 106650->106657 106776 12a222c5ff0 39 API calls 106651->106776 106653 12a222ef15e 106654 12a22311108 Concurrency::cancel_current_task 2 API calls 106653->106654 106655 12a222ef16e 106654->106655 106777 12a222cc3d0 39 API calls 106655->106777 106659 12a222eae30 106657->106659 106658 12a222ef17b 106660 12a22311108 Concurrency::cancel_current_task 2 API calls 106658->106660 106659->106570 106661 12a222ef18b 106660->106661 106778 12a222c5ff0 39 API calls 106661->106778 106663 12a222ef198 106664 12a22311108 Concurrency::cancel_current_task 2 API calls 106663->106664 106665 12a222ef1a8 106664->106665 106779 12a222c5ff0 39 API calls 106665->106779 106667 12a222ef1b5 106668 12a22311108 Concurrency::cancel_current_task 2 API calls 106667->106668 106669 12a222ef1c5 106668->106669 106780 12a222c5ff0 39 API calls 106669->106780 106671 12a222ef1d2 106672 12a22311108 Concurrency::cancel_current_task 2 API calls 106671->106672 106673 12a222ef1e2 106672->106673 106781 12a222c5ff0 39 API calls 106673->106781 106675 12a222ef1ef 106676 12a22311108 Concurrency::cancel_current_task 2 API calls 106675->106676 106677 12a222ef1ff 106676->106677 106782 12a222c5ff0 39 API calls 106677->106782 106679 12a222ef20c 106680 12a22311108 Concurrency::cancel_current_task 2 API calls 106679->106680 106681 12a222ef21c 106680->106681 106783 12a222c5ff0 39 API calls 106681->106783 106683 12a222ef229 106684 12a22311108 Concurrency::cancel_current_task 2 API calls 106683->106684 106685 12a222ef239 106684->106685 106784 12a222c5ff0 39 API calls 106685->106784 106687 12a222ef246 106688 12a22311108 Concurrency::cancel_current_task 2 API calls 106687->106688 106689 12a222ef256 106688->106689 106690->106573 106691->106575 106694 12a222c6fcc 106692->106694 106693 12a222c7500 43 API calls 106697 12a222c7129 106693->106697 106695 12a222a7940 41 API calls 106694->106695 106696 12a222c705d _Receive_impl 106694->106696 106695->106696 106696->106693 106699 12a222c71e3 _Receive_impl 106696->106699 106698 12a222a7940 41 API calls 106697->106698 106697->106699 106698->106699 106699->106596 106701 12a222ca6bf 106700->106701 106785 12a222bb690 13 API calls 2 library calls 106701->106785 106703 12a222ca6d6 106704 12a222909d0 41 API calls 106703->106704 106705 12a222ca70e _Receive_impl 106704->106705 106706 12a2230fe88 __std_exception_copy 39 API calls 106705->106706 106711 12a222ca94f 106705->106711 106707 12a222ca8bf 106706->106707 106708 12a222ca913 _Receive_impl 106707->106708 106707->106711 106709 12a2230df40 _Strcoll 4 API calls 106708->106709 106710 12a222ca938 106709->106710 106710->106603 106712 12a222c6f80 43 API calls 106711->106712 106713 12a222cb5bf 106712->106713 106714 12a222ca660 43 API calls 106713->106714 106715 12a222cb5e5 106714->106715 106716 12a222c7500 43 API calls 106715->106716 106717 12a222cb5f5 106716->106717 106718 12a222cb668 106717->106718 106719 12a222cb600 106717->106719 106786 12a222c5ff0 39 API calls 106718->106786 106723 12a22290ca0 9 API calls 106719->106723 106721 12a222cb674 106722 12a22311108 Concurrency::cancel_current_task 2 API calls 106721->106722 106724 12a222cb684 106722->106724 106731 12a222cb614 106723->106731 106787 12a222c5ff0 39 API calls 106724->106787 106726 12a222cb691 106727 12a22311108 Concurrency::cancel_current_task 2 API calls 106726->106727 106728 12a222cb6a1 106727->106728 106788 12a222c5ff0 39 API calls 106728->106788 106730 12a222cb6ae 106732 12a22311108 Concurrency::cancel_current_task 2 API calls 106730->106732 106735 12a2230df40 _Strcoll 4 API calls 106731->106735 106733 12a222cb6be 106732->106733 106789 12a222cc3d0 39 API calls 106733->106789 106737 12a222cb649 106735->106737 106736 12a222cb6cb 106738 12a22311108 Concurrency::cancel_current_task 2 API calls 106736->106738 106737->106603 106739 12a222cb6db 106738->106739 106790 12a222c5ff0 39 API calls 106739->106790 106741 12a222cb6e8 106742 12a22311108 Concurrency::cancel_current_task 2 API calls 106741->106742 106743 12a222cb6f8 106742->106743 106791 12a222c5ff0 39 API calls 106743->106791 106745 12a222cb705 106746 12a22311108 Concurrency::cancel_current_task 2 API calls 106745->106746 106747 12a222cb715 106746->106747 106792 12a222c5ff0 39 API calls 106747->106792 106749 12a222cb722 106750 12a22311108 Concurrency::cancel_current_task 2 API calls 106749->106750 106751 12a222cb732 106750->106751 106793 12a222c5ff0 39 API calls 106751->106793 106753 12a222cb73f 106754 12a22311108 Concurrency::cancel_current_task 2 API calls 106753->106754 106761 12a222c75f7 106760->106761 106766 12a222c7556 106760->106766 106762 12a2230df40 _Strcoll 4 API calls 106761->106762 106763 12a222c7607 106762->106763 106763->106590 106763->106610 106765 12a222a7940 41 API calls 106765->106766 106766->106761 106766->106765 106795 12a222bb150 40 API calls 106766->106795 106767->106597 106768->106602 106770 12a2230ff18 __std_exception_destroy 9 API calls 106769->106770 106771 12a22290cce 106770->106771 106772 12a2230ff18 __std_exception_destroy 9 API calls 106771->106772 106773 12a22290cdb 106772->106773 106773->106650 106774->106643 106775->106648 106776->106653 106777->106658 106778->106663 106779->106667 106780->106671 106781->106675 106782->106679 106783->106683 106784->106687 106785->106703 106786->106721 106787->106726 106788->106730 106789->106736 106790->106741 106791->106745 106792->106749 106793->106753 106795->106766 106796->106520 106797->106528 106798->106530 106799 7ff7a452c220 106801 7ff7a452c243 106799->106801 106800 7ff7a452c391 106835 7ff7a4544224 51 API calls std::_Throw_Cpp_error 106800->106835 106801->106800 106802 7ff7a452c382 106801->106802 106803 7ff7a452c270 106801->106803 106834 7ff7a4544224 51 API calls std::_Throw_Cpp_error 106802->106834 106813 7ff7a452c720 106803->106813 106809 7ff7a452c283 106812 7ff7a452c293 _Mtx_unlock 106809->106812 106833 7ff7a452bbb0 49 API calls 2 library calls 106809->106833 106814 7ff7a452c74d 106813->106814 106815 7ff7a4507184 std::_Facet_Register 49 API calls 106814->106815 106819 7ff7a452c77b 106814->106819 106816 7ff7a452c7ac 106815->106816 106817 7ff7a452c7b9 106816->106817 106818 7ff7a452c808 106816->106818 106840 7ff7a4526be0 LoadLibraryA GetProcAddress 106817->106840 106836 7ff7a4526f70 GetSystemInfo 106818->106836 106819->106809 106821 7ff7a452c803 106821->106818 106823 7ff7a452c81e 106824 7ff7a452c85a 106823->106824 106825 7ff7a452c877 106823->106825 106837 7ff7a45269e0 GetSystemInfo LoadLibraryA 106824->106837 106841 7ff7a4526af0 GetSystemInfo VirtualQuery VirtualAlloc GetLastError 106825->106841 106829 7ff7a452c875 106829->106819 106830 7ff7a4507184 std::_Facet_Register 49 API calls 106829->106830 106831 7ff7a452c8aa 106830->106831 106831->106819 106842 7ff7a452b7c0 49 API calls 4 library calls 106831->106842 106833->106812 106836->106823 106838 7ff7a4526a7a GetProcAddress GetCurrentProcess VirtualAlloc2 106837->106838 106839 7ff7a4526abd 106837->106839 106838->106839 106839->106829 106840->106821 106841->106829 106842->106819 105234 12a222a3251 105235 12a222a3264 105234->105235 105247 12a222a35ad 105234->105247 105248 12a222a3ca0 105235->105248 105238 12a222a35b8 105254 12a222a0ad0 41 API calls _Receive_impl 105247->105254 105249 12a222a3d31 105248->105249 105251 12a222a3cd4 105248->105251 105256 12a2228d8b0 41 API calls 2 library calls 105249->105256 105255 12a222a7f50 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind _Strcoll 105251->105255 105253 12a222a3d57 105254->105238 105255->105249 105256->105253 105257 12a222e8ae7 105258 12a222e8af1 105257->105258 105263 12a222e8f60 105258->105263 105260 12a222e8b00 105261 12a2230df40 _Strcoll 4 API calls 105260->105261 105262 12a222e8e0b 105261->105262 105267 12a222e8f9f 105263->105267 105269 12a222e91a3 105263->105269 105264 12a222e921f 105279 12a222bb1b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind _Strcoll 105264->105279 105267->105264 105271 12a222e919e 105267->105271 105278 12a222bb150 40 API calls 105267->105278 105268 12a222e9240 105270 12a222a67e0 41 API calls 105268->105270 105269->105260 105272 12a222e9269 105270->105272 105271->105269 105274 12a222a67e0 41 API calls 105271->105274 105273 12a22311108 Concurrency::cancel_current_task 2 API calls 105272->105273 105273->105271 105275 12a222e92b4 105274->105275 105276 12a22311108 Concurrency::cancel_current_task 2 API calls 105275->105276 105277 12a222e92c5 105276->105277 105277->105260 105278->105267 105279->105268 105280 12a222ee9a6 105283 12a222eb370 105280->105283 105282 12a222ee9ae 105284 12a222eb393 105283->105284 105288 12a222eb3e0 105283->105288 105286 12a222ec8e0 41 API calls 105284->105286 105285 12a222ec8e0 41 API calls 105285->105288 105287 12a222eb398 105286->105287 105287->105288 105289 12a222ec8e0 41 API calls 105287->105289 105288->105285 105299 12a222eb433 105288->105299 105290 12a222eb3a7 105289->105290 105291 12a222eb3bd 105290->105291 105292 12a222ec8e0 41 API calls 105290->105292 105293 12a2230df40 _Strcoll 4 API calls 105291->105293 105294 12a222eb3b6 105292->105294 105295 12a222eb3da 105293->105295 105294->105288 105294->105291 105295->105282 105296 12a222eb538 105297 12a2230df40 _Strcoll 4 API calls 105296->105297 105298 12a222eb68b 105297->105298 105298->105282 105299->105296 105300 12a222ec8e0 41 API calls 105299->105300 105300->105299 105301 7ff7a4507460 105324 7ff7a4506f3c 105301->105324 105304 7ff7a45075ac 105379 7ff7a4507908 7 API calls 2 library calls 105304->105379 105305 7ff7a450747c __scrt_acquire_startup_lock 105307 7ff7a45075b6 105305->105307 105308 7ff7a450749a 105305->105308 105380 7ff7a4507908 7 API calls 2 library calls 105307->105380 105314 7ff7a45074bb __scrt_release_startup_lock 105308->105314 105332 7ff7a4505014 105308->105332 105311 7ff7a45074bf 105312 7ff7a45075c1 BuildCatchObjectHelperInternal 105313 7ff7a4507545 105336 7ff7a4507a54 105313->105336 105314->105311 105314->105313 105376 7ff7a45023a0 47 API calls 105314->105376 105316 7ff7a450754a 105339 7ff7a44ea200 105316->105339 105321 7ff7a450756d 105321->105312 105378 7ff7a45070d0 7 API calls __scrt_initialize_crt 105321->105378 105323 7ff7a4507584 105323->105311 105325 7ff7a4506f5e __scrt_initialize_crt 105324->105325 105381 7ff7a4509c74 105325->105381 105328 7ff7a4506f67 105328->105304 105328->105305 105333 7ff7a4505027 105332->105333 105334 7ff7a450504e 105333->105334 105640 7ff7a450737c 105333->105640 105334->105314 105711 7ff7a4509480 105336->105711 105338 7ff7a4507a6b GetStartupInfoW 105338->105316 105340 7ff7a44ea9a0 115 API calls 105339->105340 105341 7ff7a44ea230 memcpy_s 105340->105341 105342 7ff7a451dd20 53 API calls 105341->105342 105343 7ff7a44ea26c 105342->105343 105344 7ff7a45216c0 107 API calls 105343->105344 105345 7ff7a44ea279 RtlAdjustPrivilege 105344->105345 105346 7ff7a45267d0 51 API calls 105345->105346 105347 7ff7a44ea299 memcpy_s 105346->105347 105348 7ff7a451dd20 53 API calls 105347->105348 105349 7ff7a44ea2c8 105348->105349 105350 7ff7a45216c0 107 API calls 105349->105350 105351 7ff7a44ea2d3 NtRaiseHardError 105350->105351 105352 7ff7a45267d0 51 API calls 105351->105352 105353 7ff7a44ea302 105352->105353 105354 7ff7a451e5d0 53 API calls 105353->105354 105355 7ff7a44ea30d 105354->105355 105356 7ff7a451e5d0 53 API calls 105355->105356 105357 7ff7a44ea31a memcpy_s 105356->105357 105358 7ff7a451dd20 53 API calls 105357->105358 105359 7ff7a44ea34d 105358->105359 105360 7ff7a45216c0 107 API calls 105359->105360 105361 7ff7a44ea35a 105360->105361 105362 7ff7a45267d0 51 API calls 105361->105362 105363 7ff7a44ea373 memcpy_s 105362->105363 105364 7ff7a451dd20 53 API calls 105363->105364 105365 7ff7a44ea3a6 105364->105365 105366 7ff7a45216c0 107 API calls 105365->105366 105367 7ff7a44ea3b3 105366->105367 105368 7ff7a45267d0 51 API calls 105367->105368 105369 7ff7a44ea3d2 105368->105369 105370 7ff7a451e5d0 53 API calls 105369->105370 105371 7ff7a44ea3df 105370->105371 105372 7ff7a451e5d0 53 API calls 105371->105372 105373 7ff7a44ea3ec 105372->105373 105374 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 105373->105374 105375 7ff7a44ea3fd 105374->105375 105377 7ff7a4507a98 GetModuleHandleW 105375->105377 105376->105313 105377->105321 105378->105323 105379->105307 105380->105312 105393 7ff7a450d0dc 105381->105393 105385 7ff7a4509c8a 105386 7ff7a4506f63 105385->105386 105400 7ff7a450d124 DeleteCriticalSection 105385->105400 105386->105328 105388 7ff7a4544ea4 105386->105388 105390 7ff7a4548024 105388->105390 105389 7ff7a4506f70 105389->105328 105392 7ff7a4509c9c 7 API calls 2 library calls 105389->105392 105390->105389 105417 7ff7a44febb8 105390->105417 105392->105328 105394 7ff7a450d0e4 105393->105394 105396 7ff7a450d115 105394->105396 105398 7ff7a4509c7d 105394->105398 105401 7ff7a450d494 105394->105401 105406 7ff7a450d124 DeleteCriticalSection 105396->105406 105398->105386 105399 7ff7a4509f48 8 API calls 3 library calls 105398->105399 105399->105385 105400->105386 105407 7ff7a450d218 105401->105407 105404 7ff7a450d4df InitializeCriticalSectionAndSpinCount 105405 7ff7a450d4d4 105404->105405 105405->105394 105406->105398 105408 7ff7a450d33f 105407->105408 105409 7ff7a450d25c __vcrt_InitializeCriticalSectionEx 105407->105409 105408->105404 105408->105405 105409->105408 105410 7ff7a450d28a LoadLibraryExW 105409->105410 105411 7ff7a450d321 GetProcAddress 105409->105411 105416 7ff7a450d2cd LoadLibraryExW 105409->105416 105412 7ff7a450d2ab GetLastError 105410->105412 105413 7ff7a450d301 105410->105413 105411->105408 105415 7ff7a450d332 105411->105415 105412->105409 105413->105411 105414 7ff7a450d318 FreeLibrary 105413->105414 105414->105411 105415->105408 105416->105409 105416->105413 105418 7ff7a44febc5 105417->105418 105422 7ff7a44fec0a 105417->105422 105423 7ff7a44f62d8 105418->105423 105422->105390 105424 7ff7a44f6304 FlsSetValue 105423->105424 105425 7ff7a44f62e9 FlsGetValue 105423->105425 105426 7ff7a44f62f6 105424->105426 105428 7ff7a44f6311 105424->105428 105425->105426 105427 7ff7a44f62fe 105425->105427 105429 7ff7a44f62fc 105426->105429 105480 7ff7a44f865c 47 API calls BuildCatchObjectHelperInternal 105426->105480 105427->105424 105466 7ff7a44f5ce4 105428->105466 105443 7ff7a44fe890 105429->105443 105434 7ff7a44f633e FlsSetValue 105436 7ff7a44f635c 105434->105436 105437 7ff7a44f634a FlsSetValue 105434->105437 105435 7ff7a44f632e FlsSetValue 105438 7ff7a44f6337 105435->105438 105479 7ff7a44f5fb4 11 API calls _Getctype 105436->105479 105437->105438 105473 7ff7a44f5d5c 105438->105473 105441 7ff7a44f6364 105442 7ff7a44f5d5c __free_lconv_num 11 API calls 105441->105442 105442->105429 105483 7ff7a44feb00 105443->105483 105450 7ff7a44fe8fb 105451 7ff7a44f5d5c __free_lconv_num 11 API calls 105450->105451 105463 7ff7a44fe8e2 105451->105463 105452 7ff7a44fe90a 105452->105452 105508 7ff7a44fec34 105452->105508 105455 7ff7a44fea06 105519 7ff7a44f5e6c 11 API calls memcpy_s 105455->105519 105456 7ff7a44fea20 105461 7ff7a44fea61 105456->105461 105464 7ff7a44f5d5c __free_lconv_num 11 API calls 105456->105464 105458 7ff7a44fea0b 105459 7ff7a44f5d5c __free_lconv_num 11 API calls 105458->105459 105459->105463 105460 7ff7a44feac8 105462 7ff7a44f5d5c __free_lconv_num 11 API calls 105460->105462 105461->105460 105520 7ff7a44fe3c0 47 API calls 4 library calls 105461->105520 105462->105463 105463->105422 105464->105461 105472 7ff7a44f5cf5 _Getctype 105466->105472 105467 7ff7a44f5d2a HeapAlloc 105470 7ff7a44f5d44 105467->105470 105467->105472 105468 7ff7a44f5d46 105481 7ff7a44f5e6c 11 API calls memcpy_s 105468->105481 105470->105434 105470->105435 105471 7ff7a44fdee8 std::_Facet_Register 2 API calls 105471->105472 105472->105467 105472->105468 105472->105471 105474 7ff7a44f5d61 RtlFreeHeap 105473->105474 105478 7ff7a44f5d90 105473->105478 105475 7ff7a44f5d7c GetLastError 105474->105475 105474->105478 105476 7ff7a44f5d89 __free_lconv_num 105475->105476 105482 7ff7a44f5e6c 11 API calls memcpy_s 105476->105482 105478->105426 105479->105441 105481->105470 105482->105478 105484 7ff7a44feb23 105483->105484 105485 7ff7a44feb2d 105484->105485 105521 7ff7a44faefc EnterCriticalSection 105484->105521 105487 7ff7a44fe8c5 105485->105487 105522 7ff7a44f865c 47 API calls BuildCatchObjectHelperInternal 105485->105522 105494 7ff7a44fe590 105487->105494 105523 7ff7a44ead54 105494->105523 105497 7ff7a44fe5c2 105499 7ff7a44fe5d7 105497->105499 105500 7ff7a44fe5c7 GetACP 105497->105500 105498 7ff7a44fe5b0 GetOEMCP 105498->105499 105499->105463 105501 7ff7a44f86b4 105499->105501 105500->105499 105502 7ff7a44f86ff 105501->105502 105506 7ff7a44f86c3 _Getctype 105501->105506 105557 7ff7a44f5e6c 11 API calls memcpy_s 105502->105557 105503 7ff7a44f86e6 HeapAlloc 105505 7ff7a44f86fd 105503->105505 105503->105506 105505->105450 105505->105452 105506->105502 105506->105503 105507 7ff7a44fdee8 std::_Facet_Register 2 API calls 105506->105507 105507->105506 105509 7ff7a44fe590 49 API calls 105508->105509 105510 7ff7a44fec61 105509->105510 105512 7ff7a44fec9e IsValidCodePage 105510->105512 105516 7ff7a44fece1 memcpy_s 105510->105516 105511 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 105513 7ff7a44fe9fd 105511->105513 105514 7ff7a44fecaf 105512->105514 105512->105516 105513->105455 105513->105456 105515 7ff7a44fece6 GetCPInfo 105514->105515 105518 7ff7a44fecb8 memcpy_s 105514->105518 105515->105516 105515->105518 105516->105511 105558 7ff7a44fe6a8 105518->105558 105519->105458 105520->105460 105524 7ff7a44ead73 105523->105524 105525 7ff7a44ead78 105523->105525 105524->105497 105524->105498 105525->105524 105531 7ff7a44f6204 GetLastError 105525->105531 105529 7ff7a44eadb6 105554 7ff7a44f65d0 47 API calls TranslateName 105529->105554 105532 7ff7a44f6245 FlsSetValue 105531->105532 105533 7ff7a44f6228 FlsGetValue 105531->105533 105535 7ff7a44f6257 105532->105535 105550 7ff7a44f6235 105532->105550 105534 7ff7a44f623f 105533->105534 105533->105550 105534->105532 105537 7ff7a44f5ce4 _Getctype 11 API calls 105535->105537 105536 7ff7a44f62b1 SetLastError 105538 7ff7a44f62d1 105536->105538 105539 7ff7a44ead93 105536->105539 105540 7ff7a44f6266 105537->105540 105556 7ff7a44f865c 47 API calls BuildCatchObjectHelperInternal 105538->105556 105553 7ff7a44f6564 47 API calls _Getctype 105539->105553 105542 7ff7a44f6284 FlsSetValue 105540->105542 105543 7ff7a44f6274 FlsSetValue 105540->105543 105545 7ff7a44f62a2 105542->105545 105546 7ff7a44f6290 FlsSetValue 105542->105546 105544 7ff7a44f627d 105543->105544 105548 7ff7a44f5d5c __free_lconv_num 11 API calls 105544->105548 105555 7ff7a44f5fb4 11 API calls _Getctype 105545->105555 105546->105544 105548->105550 105550->105536 105551 7ff7a44f62aa 105552 7ff7a44f5d5c __free_lconv_num 11 API calls 105551->105552 105552->105536 105553->105529 105554->105524 105555->105551 105557->105505 105559 7ff7a44fe6e5 GetCPInfo 105558->105559 105568 7ff7a44fe7db 105558->105568 105564 7ff7a44fe6f8 105559->105564 105559->105568 105560 7ff7a4506ee0 std::_Xinvalid_argument 8 API calls 105562 7ff7a44fe87a 105560->105562 105562->105516 105569 7ff7a45009a4 105564->105569 105568->105560 105570 7ff7a44ead54 TranslateName 47 API calls 105569->105570 105571 7ff7a45009e6 105570->105571 105589 7ff7a4500b40 105571->105589 105590 7ff7a4500b48 MultiByteToWideChar 105589->105590 105641 7ff7a450738c 105640->105641 105657 7ff7a4544f44 105641->105657 105643 7ff7a4507398 105663 7ff7a4506f88 105643->105663 105645 7ff7a45073b0 _RTC_Initialize 105646 7ff7a4507405 105645->105646 105668 7ff7a4507138 105645->105668 105656 7ff7a4507421 105646->105656 105698 7ff7a4507908 7 API calls 2 library calls 105646->105698 105648 7ff7a4507431 105648->105333 105650 7ff7a45073c5 105671 7ff7a45449a0 105650->105671 105656->105333 105658 7ff7a4544f55 105657->105658 105659 7ff7a4544f5d 105658->105659 105699 7ff7a44f5e6c 11 API calls memcpy_s 105658->105699 105659->105643 105661 7ff7a4544f6c 105700 7ff7a44eec20 47 API calls _invalid_parameter_noinfo 105661->105700 105664 7ff7a4506f99 105663->105664 105667 7ff7a4506f9e __scrt_acquire_startup_lock 105663->105667 105664->105667 105701 7ff7a4507908 7 API calls 2 library calls 105664->105701 105666 7ff7a4507012 105667->105645 105702 7ff7a45070fc 105668->105702 105670 7ff7a4507141 105670->105650 105672 7ff7a45449c0 105671->105672 105673 7ff7a45073d1 105671->105673 105674 7ff7a45449c8 105672->105674 105675 7ff7a45449de GetModuleFileNameW 105672->105675 105673->105646 105697 7ff7a4507d40 InitializeSListHead 105673->105697 105707 7ff7a44f5e6c 11 API calls memcpy_s 105674->105707 105679 7ff7a4544a09 105675->105679 105677 7ff7a45449cd 105708 7ff7a44eec20 47 API calls _invalid_parameter_noinfo 105677->105708 105709 7ff7a4544940 11 API calls 2 library calls 105679->105709 105681 7ff7a4544a49 105682 7ff7a4544a51 105681->105682 105687 7ff7a4544a69 105681->105687 105710 7ff7a44f5e6c 11 API calls memcpy_s 105682->105710 105684 7ff7a4544a56 105685 7ff7a44f5d5c __free_lconv_num 11 API calls 105684->105685 105688 7ff7a4544a64 105685->105688 105686 7ff7a4544a8b 105689 7ff7a44f5d5c __free_lconv_num 11 API calls 105686->105689 105687->105686 105690 7ff7a4544ab7 105687->105690 105691 7ff7a4544ad0 105687->105691 105688->105673 105689->105673 105692 7ff7a44f5d5c __free_lconv_num 11 API calls 105690->105692 105693 7ff7a44f5d5c __free_lconv_num 11 API calls 105691->105693 105694 7ff7a4544ac0 105692->105694 105693->105686 105695 7ff7a44f5d5c __free_lconv_num 11 API calls 105694->105695 105696 7ff7a4544acc 105695->105696 105696->105673 105698->105648 105699->105661 105700->105659 105701->105666 105703 7ff7a4507116 105702->105703 105705 7ff7a450710f 105702->105705 105706 7ff7a4505420 50 API calls 105703->105706 105705->105670 105706->105705 105707->105677 105708->105673 105709->105681 105710->105684 105712 7ff7a4509460 105711->105712 105712->105338 105712->105712 106843 12a222ec383 106844 12a222ec0d5 106843->106844 106846 12a222ec0e8 106843->106846 106845 12a222a7940 41 API calls 106844->106845 106845->106846 106847 12a222ec8e0 41 API calls 106846->106847 106848 12a222ec060 106847->106848 106849 12a222e33c0 106850 12a222e33d2 _Receive_impl 106849->106850 106851 12a222e34eb _Strxfrm 106850->106851 106856 12a222e3a1d 106850->106856 106858 12a222d6600 41 API calls 5 library calls 106850->106858 106853 12a222a7940 41 API calls 106851->106853 106854 12a222e357d _Receive_impl 106851->106854 106853->106854 106855 12a2230df40 _Strcoll 4 API calls 106854->106855 106854->106856 106857 12a222e3a01 106855->106857 106858->106851 106859 12a222f8e40 106860 12a222f8e56 106859->106860 106861 12a222f8e71 106859->106861 106890 12a222f5e1c 8 API calls _set_errno_from_matherr 106860->106890 106861->106860 106863 12a222f8e8a 106861->106863 106865 12a222f8e90 106863->106865 106866 12a222f8ead 106863->106866 106864 12a222f8e5b 106891 12a222f1958 38 API calls _invalid_parameter_noinfo 106864->106891 106892 12a222f5e1c 8 API calls _set_errno_from_matherr 106865->106892 106883 12a22302890 106866->106883 106873 12a222f9125 106878 12a222f8f0a 106882 12a222f8e67 106878->106882 106911 12a223028d0 38 API calls _isindst 106878->106911 106879 12a222f8f6a 106879->106882 106912 12a223028d0 38 API calls _isindst 106879->106912 106884 12a222f8eb2 106883->106884 106885 12a2230289e 106883->106885 106893 12a223019ac 106884->106893 106913 12a222fc064 EnterCriticalSection 106885->106913 106890->106864 106891->106882 106892->106882 106894 12a222f8ec7 106893->106894 106895 12a223019b5 106893->106895 106894->106873 106899 12a223019dc 106894->106899 106914 12a222f5e1c 8 API calls _set_errno_from_matherr 106895->106914 106897 12a223019ba 106915 12a222f1958 38 API calls _invalid_parameter_noinfo 106897->106915 106900 12a222f8ed8 106899->106900 106901 12a223019e5 106899->106901 106900->106873 106905 12a22301a0c 106900->106905 106916 12a222f5e1c 8 API calls _set_errno_from_matherr 106901->106916 106903 12a223019ea 106917 12a222f1958 38 API calls _invalid_parameter_noinfo 106903->106917 106906 12a222f8ee9 106905->106906 106907 12a22301a15 106905->106907 106906->106873 106906->106878 106906->106879 106918 12a222f5e1c 8 API calls _set_errno_from_matherr 106907->106918 106909 12a22301a1a 106919 12a222f1958 38 API calls _invalid_parameter_noinfo 106909->106919 106911->106882 106912->106882 106914->106897 106915->106894 106916->106903 106917->106900 106918->106909 106919->106906 106920 12a222a373d 106921 12a222a3749 106920->106921 106922 12a222a37b4 106921->106922 106923 12a222a3788 106921->106923 106925 12a2230e200 std::_Facet_Register 41 API calls 106922->106925 106930 12a222a379d _Strxfrm 106922->106930 106924 12a222a3835 106923->106924 106927 12a2230e200 std::_Facet_Register 41 API calls 106923->106927 106933 12a2228d8b0 41 API calls 2 library calls 106924->106933 106925->106930 106927->106930 106928 12a222a383b 106929 12a222a380b _Receive_impl 106930->106929 106932 12a2228d970 41 API calls 106930->106932 106933->106928 105713 12a222d8020 105785 12a222db120 GetCurrentProcess OpenProcessToken 105713->105785 105716 12a222d8085 105790 12a222e78b0 GetCurrentProcess OpenProcessToken 105716->105790 105717 12a222d805b 105963 12a222db510 42 API calls 2 library calls 105717->105963 105721 12a222d8065 105964 12a222e6460 93 API calls _Strcoll 105721->105964 105722 12a222e78b0 9 API calls 105724 12a222d809d 105722->105724 105798 12a222e3a60 105724->105798 105725 12a222d806e 105728 12a222d8079 ExitProcess 105725->105728 105728->105716 105730 12a222d8131 _Receive_impl 105731 12a222d816f OpenMutexA 105730->105731 105742 12a222d8469 105730->105742 105732 12a222d81ae ExitProcess 105731->105732 105733 12a222d81ba CreateMutexA 105731->105733 105732->105733 105947 12a222d26b0 105733->105947 105786 12a222db1ae 105785->105786 105787 12a222db176 GetTokenInformation 105785->105787 105788 12a2230df40 _Strcoll 4 API calls 105786->105788 105787->105786 105789 12a222d8057 105788->105789 105789->105716 105789->105717 105791 12a222e7933 105790->105791 105792 12a222e7915 LookupPrivilegeValueW 105790->105792 105794 12a222e7983 CloseHandle 105791->105794 105795 12a222e798f 105791->105795 105792->105791 105793 12a222e793b AdjustTokenPrivileges 105792->105793 105793->105791 105794->105795 105796 12a2230df40 _Strcoll 4 API calls 105795->105796 105797 12a222d8091 105796->105797 105797->105722 105965 12a222e2610 GetCurrentHwProfileW 105798->105965 105802 12a222e3b69 105803 12a222e3bb3 105802->105803 106113 12a222efbe8 40 API calls 105802->106113 105987 12a222e9400 105803->105987 105806 12a222e3bc3 105810 12a222e3c3e _Strxfrm _Receive_impl 105806->105810 105811 12a222e3c14 105806->105811 106114 12a222f8980 39 API calls 2 library calls 105806->106114 105809 12a222e3d15 _Receive_impl 105812 12a2230df40 _Strcoll 4 API calls 105809->105812 105810->105809 105813 12a222e3d5b 105810->105813 105811->105810 106115 12a222f8980 39 API calls 2 library calls 105811->106115 105814 12a222d80a7 105812->105814 105999 12a222e1f50 105813->105999 105943 12a222d8c00 105814->105943 105825 12a222e3a60 142 API calls 105826 12a222e3e00 105825->105826 106041 12a222e19d0 105826->106041 105828 12a222e3e0d 106045 12a222b4650 105828->106045 105944 12a222d8c22 105943->105944 105944->105944 105945 12a222c7620 41 API calls 105944->105945 105946 12a222d8c36 105945->105946 105946->105730 105948 12a222d26e1 105947->105948 106405 12a222d3580 41 API calls _Receive_impl 105948->106405 105950 12a222d2dcc 105951 12a222a36e0 41 API calls 105950->105951 105952 12a222d2e0d 105951->105952 106406 12a222c6290 43 API calls 105952->106406 105954 12a222d2e45 105955 12a222a0f20 41 API calls 105954->105955 105956 12a222d2ed3 105955->105956 106407 12a222c63c0 105956->106407 105958 12a222d2ee3 106418 12a222a48d0 41 API calls 2 library calls 105958->106418 105960 12a222d2efc _Receive_impl 105961 12a222a0f20 41 API calls 105960->105961 105962 12a222d3037 105961->105962 105963->105721 105964->105725 105966 12a222e2658 105965->105966 105969 12a222e26b8 105965->105969 106116 12a222d3890 105966->106116 105968 12a222e2667 105968->105969 106125 12a222efbe8 40 API calls 105968->106125 105970 12a2230df40 _Strcoll 4 API calls 105969->105970 105971 12a222e2730 105970->105971 105973 12a222e1ca0 105971->105973 106127 12a222db2e0 105973->106127 105975 12a222e1ce8 GetVolumeInformationW 105977 12a222e1d47 memcpy_s _Receive_impl 105975->105977 105978 12a222e1d96 105977->105978 105979 12a222e1e6c 105977->105979 106138 12a222d4110 66 API calls 105977->106138 105980 12a2230df40 _Strcoll 4 API calls 105978->105980 105982 12a222e1e53 105980->105982 105982->105802 105983 12a222e1dd2 106139 12a222d4250 65 API calls 2 library calls 105983->106139 105985 12a222e1df9 106140 12a222a02f0 105985->106140 105990 12a222e9449 105987->105990 105998 12a222e94c9 105987->105998 105989 12a222e9548 106156 12a2228d8b0 41 API calls 2 library calls 105989->106156 105993 12a222e94ce _Strxfrm 105990->105993 105994 12a222e94b4 105990->105994 105995 12a222e94dc 105990->105995 105992 12a222e954e 105993->105806 105994->105989 105996 12a2230e200 std::_Facet_Register 41 API calls 105994->105996 105995->105993 105997 12a2230e200 std::_Facet_Register 41 API calls 105995->105997 105996->105998 105997->105993 105998->105993 106155 12a2228d970 41 API calls 105998->106155 106000 12a222e1fa9 memcpy_s 105999->106000 106001 12a2230e200 std::_Facet_Register 41 API calls 106000->106001 106002 12a222e200e 106001->106002 106157 12a222a9a30 106002->106157 106004 12a222e2051 EnumDisplayDevicesW 106007 12a222e20ec 106004->106007 106008 12a222e204e _Receive_impl 106004->106008 106005 12a222d3890 41 API calls 106005->106008 106009 12a2230df40 _Strcoll 4 API calls 106007->106009 106008->106004 106008->106005 106011 12a222e222e 106008->106011 106167 12a222e9c90 41 API calls 2 library calls 106008->106167 106010 12a222e220d 106009->106010 106012 12a222e1e80 RegGetValueA 106010->106012 106013 12a222e1efb 106012->106013 106014 12a2230df40 _Strcoll 4 API calls 106013->106014 106015 12a222e1f3d 106014->106015 106016 12a222e2240 106015->106016 106017 12a222e22c4 _Receive_impl 106016->106017 106021 12a222e25f8 106017->106021 106169 12a2231cfa0 GetNativeSystemInfo 106017->106169 106019 12a222e23a8 106020 12a222c7620 41 API calls 106019->106020 106023 12a222e243d _Receive_impl 106020->106023 106022 12a2230df40 _Strcoll 4 API calls 106024 12a222e25e0 106022->106024 106023->106021 106023->106022 106025 12a222e1b60 106024->106025 106170 12a2230ef30 106025->106170 106028 12a222e1bbc 106031 12a2230df40 _Strcoll 4 API calls 106028->106031 106029 12a222e1baf 106030 12a222d3890 41 API calls 106029->106030 106030->106028 106032 12a222e1bee 106031->106032 106033 12a222e1c00 106032->106033 106034 12a2230ef30 _Strcoll 106033->106034 106035 12a222e1c10 GetComputerNameW 106034->106035 106036 12a222e1c5c 106035->106036 106037 12a222e1c4f 106035->106037 106039 12a2230df40 _Strcoll 4 API calls 106036->106039 106038 12a222d3890 41 API calls 106037->106038 106038->106036 106040 12a222e1c8e 106039->106040 106040->105825 106042 12a222e1ad0 106041->106042 106172 12a222e0cc0 106042->106172 106044 12a222e1af4 _Receive_impl 106044->105828 106113->105802 106114->105806 106115->105811 106117 12a222d38de 106116->106117 106123 12a222d38bf _Receive_impl 106116->106123 106120 12a22296ef0 41 API calls 106117->106120 106118 12a2230df40 _Strcoll 4 API calls 106119 12a222d397e 106118->106119 106119->105968 106121 12a222d3907 106120->106121 106126 12a222d39a0 41 API calls 2 library calls 106121->106126 106123->106118 106124 12a222d398c 106123->106124 106125->105968 106126->106123 106144 12a222a1af0 106127->106144 106130 12a222db33f 106136 12a222db3eb 106130->106136 106150 12a2231b730 GetCurrentDirectoryW 106130->106150 106152 12a222a7780 41 API calls 4 library calls 106130->106152 106132 12a222db45f 106137 12a222db4c8 _Receive_impl 106132->106137 106153 12a2228ff80 41 API calls 2 library calls 106132->106153 106134 12a222db50c 106135 12a22296ef0 41 API calls 106135->106132 106136->106132 106136->106135 106137->105975 106138->105983 106139->105985 106141 12a222a0338 106140->106141 106142 12a222a03a9 106141->106142 106143 12a222a36e0 41 API calls 106141->106143 106142->105978 106143->106142 106145 12a222a1b05 106144->106145 106146 12a222a1b20 106144->106146 106145->106130 106148 12a222a1b32 106146->106148 106154 12a222a7780 41 API calls 4 library calls 106146->106154 106148->106130 106149 12a222a1b73 106149->106130 106151 12a2231b742 __std_fs_directory_iterator_open 106150->106151 106151->106130 106152->106130 106153->106134 106154->106149 106156->105992 106158 12a222a9a5c 106157->106158 106166 12a222a9a97 _Receive_impl 106157->106166 106159 12a222a9b62 106158->106159 106160 12a222a9a85 106158->106160 106161 12a222a9aae 106158->106161 106168 12a2228d8b0 41 API calls 2 library calls 106159->106168 106160->106159 106163 12a222a9a92 106160->106163 106165 12a2230e200 std::_Facet_Register 41 API calls 106161->106165 106161->106166 106164 12a2230e200 std::_Facet_Register 41 API calls 106163->106164 106164->106166 106165->106166 106166->106008 106167->106008 106168->106166 106169->106019 106171 12a222e1b70 GetUserNameW 106170->106171 106171->106028 106171->106029 106173 12a222e0d22 106172->106173 106174 12a222e0ee0 InternetOpenA 106172->106174 106202 12a2230e0f0 EnterCriticalSection LeaveCriticalSection 106173->106202 106176 12a222e0f27 InternetOpenUrlA 106174->106176 106181 12a222e0f04 106174->106181 106178 12a222e0f9a HttpQueryInfoW 106176->106178 106176->106181 106180 12a222e0ff7 HttpQueryInfoW 106178->106180 106178->106181 106179 12a2230df40 _Strcoll 4 API calls 106182 12a222e12c0 106179->106182 106184 12a222e1074 InternetQueryDataAvailable 106180->106184 106185 12a222e104d 106180->106185 106181->106179 106182->106044 106187 12a222e125e InternetCloseHandle 106184->106187 106198 12a222e108f 106184->106198 106203 12a222f5c60 38 API calls 2 library calls 106185->106203 106187->106181 106188 12a222e105c 106188->106184 106190 12a222e112c InternetReadFile 106201 12a222e10e1 memcpy_s _Strxfrm _Receive_impl 106190->106201 106195 12a2230e200 std::_Facet_Register 41 API calls 106195->106198 106197 12a222e12db 106198->106187 106198->106190 106198->106195 106198->106197 106198->106201 106201->106190 106201->106197 106201->106198 106203->106188 106405->105950 106406->105954 106408 12a222c63fd 106407->106408 106411 12a222c643e 106407->106411 106409 12a222c641c 106408->106409 106410 12a222a36e0 41 API calls 106408->106410 106409->105958 106410->106409 106412 12a222a67e0 41 API calls 106411->106412 106413 12a222c6471 106412->106413 106414 12a22311108 Concurrency::cancel_current_task 2 API calls 106413->106414 106417 12a222c6482 106414->106417 106415 12a222c64b6 106415->105958 106417->106415 106419 12a2231b69c 38 API calls __std_fs_directory_iterator_open 106417->106419 106418->105960 106419->106417 106934 12a222b31c0 106935 12a222b31e2 _Strxfrm 106934->106935 106936 12a222b31d7 106934->106936 106937 12a222b331d 106935->106937 106938 12a222b31f3 _Strxfrm 106935->106938 106941 12a222f1184 106935->106941 106937->106938 106940 12a222f1184 _fread_nolock 41 API calls 106937->106940 106940->106938 106944 12a222f11a4 106941->106944 106943 12a222f119c 106943->106935 106945 12a222f11ce 106944->106945 106946 12a222f11fd 106944->106946 106945->106946 106947 12a222f121a 106945->106947 106949 12a222f11dd memcpy_s 106945->106949 106946->106943 106948 12a222f069c _fread_nolock EnterCriticalSection 106947->106948 106951 12a222f1222 106948->106951 106970 12a222f5e1c 8 API calls _set_errno_from_matherr 106949->106970 106955 12a222f0f24 106951->106955 106952 12a222f11f2 106971 12a222f1958 38 API calls _invalid_parameter_noinfo 106952->106971 106959 12a222f0f4b memcpy_s 106955->106959 106962 12a222f0f65 106955->106962 106956 12a222f0f55 106992 12a222f5e1c 8 API calls _set_errno_from_matherr 106956->106992 106958 12a222f0f5a 106993 12a222f1958 38 API calls _invalid_parameter_noinfo 106958->106993 106959->106956 106959->106962 106968 12a222f0fc2 memcpy_s _Strxfrm 106959->106968 106962->106946 106963 12a222f1143 memcpy_s 107056 12a222f5e1c 8 API calls _set_errno_from_matherr 106963->107056 106964 12a222f95bc _fread_nolock 38 API calls 106964->106968 106968->106962 106968->106963 106968->106964 106972 12a222fd408 106968->106972 106994 12a222f5e1c 8 API calls _set_errno_from_matherr 106968->106994 106995 12a222f1958 38 API calls _invalid_parameter_noinfo 106968->106995 106996 12a222fefbc 106968->106996 106970->106952 106971->106946 106973 12a222fd425 106972->106973 106974 12a222fd43a 106972->106974 107084 12a222f5e1c 8 API calls _set_errno_from_matherr 106973->107084 106978 12a222fd47d 106974->106978 106984 12a222fd435 106974->106984 107086 12a222fe988 8 API calls 2 library calls 106974->107086 106976 12a222fd42a 107085 12a222f1958 38 API calls _invalid_parameter_noinfo 106976->107085 106980 12a222f95bc _fread_nolock 38 API calls 106978->106980 106981 12a222fd48f 106980->106981 107057 12a222feea0 106981->107057 106983 12a222fd49c 106983->106984 106985 12a222f95bc _fread_nolock 38 API calls 106983->106985 106984->106968 106986 12a222fd4bd 106985->106986 106986->106984 106987 12a222f95bc _fread_nolock 38 API calls 106986->106987 106988 12a222fd4c9 106987->106988 106988->106984 106989 12a222f95bc _fread_nolock 38 API calls 106988->106989 106990 12a222fd4d6 106989->106990 106991 12a222f95bc _fread_nolock 38 API calls 106990->106991 106991->106984 106992->106958 106993->106962 106994->106968 106995->106968 106997 12a222fefdf 106996->106997 106998 12a222feff7 106996->106998 107104 12a222f5dfc 8 API calls _set_errno_from_matherr 106997->107104 107000 12a222ff3db 106998->107000 107005 12a222ff046 106998->107005 107119 12a222f5dfc 8 API calls _set_errno_from_matherr 107000->107119 107002 12a222fefe4 107105 12a222f5e1c 8 API calls _set_errno_from_matherr 107002->107105 107003 12a222ff3e0 107120 12a222f5e1c 8 API calls _set_errno_from_matherr 107003->107120 107006 12a222ff04f 107005->107006 107009 12a222fefec 107005->107009 107013 12a222ff07d 107005->107013 107106 12a222f5dfc 8 API calls _set_errno_from_matherr 107006->107106 107009->106968 107010 12a222ff05c 107121 12a222f1958 38 API calls _invalid_parameter_noinfo 107010->107121 107011 12a222ff054 107107 12a222f5e1c 8 API calls _set_errno_from_matherr 107011->107107 107015 12a222ff0a3 107013->107015 107016 12a222ff0e0 107013->107016 107017 12a222ff0b2 107013->107017 107015->107017 107022 12a222ff0ce 107015->107022 107018 12a222ff8ac wcsftime 9 API calls 107016->107018 107108 12a222f5dfc 8 API calls _set_errno_from_matherr 107017->107108 107020 12a222ff0f3 107018->107020 107023 12a222fcf0c Concurrency::details::SchedulerProxy::DeleteThis 8 API calls 107020->107023 107021 12a222ff0b7 107109 12a222f5e1c 8 API calls _set_errno_from_matherr 107021->107109 107096 12a22308e00 107022->107096 107026 12a222ff0fd 107023->107026 107030 12a222fcf0c Concurrency::details::SchedulerProxy::DeleteThis 8 API calls 107026->107030 107028 12a222ff0be 107110 12a222f1958 38 API calls _invalid_parameter_noinfo 107028->107110 107032 12a222ff104 107030->107032 107031 12a222ff215 GetConsoleMode 107033 12a222ff229 107031->107033 107036 12a222ff283 _fread_nolock 107031->107036 107034 12a222ff10c 107032->107034 107035 12a222ff127 107032->107035 107033->107036 107038 12a222ff233 ReadConsoleW 107033->107038 107111 12a222f5e1c 8 API calls _set_errno_from_matherr 107034->107111 107113 12a222ff680 38 API calls 2 library calls 107035->107113 107040 12a222ff3a1 __std_fs_directory_iterator_open 107036->107040 107041 12a222ff277 107036->107041 107038->107041 107042 12a222ff258 __std_fs_directory_iterator_open 107038->107042 107040->107042 107049 12a222ff3ac 107040->107049 107046 12a222ff2ea 107041->107046 107047 12a222ff30f 107041->107047 107055 12a222ff0c9 107041->107055 107042->107055 107114 12a222f5d90 8 API calls 2 library calls 107042->107114 107043 12a222fcf0c Concurrency::details::SchedulerProxy::DeleteThis 8 API calls 107043->107009 107044 12a222ff111 107112 12a222f5dfc 8 API calls _set_errno_from_matherr 107044->107112 107115 12a222febcc 38 API calls 4 library calls 107046->107115 107047->107055 107116 12a222fe9f4 38 API calls _fread_nolock 107047->107116 107117 12a222f5e1c 8 API calls _set_errno_from_matherr 107049->107117 107053 12a222ff3b1 107118 12a222f5dfc 8 API calls _set_errno_from_matherr 107053->107118 107055->107043 107056->106958 107058 12a222feeca 107057->107058 107059 12a222feee2 107057->107059 107087 12a222f5dfc 8 API calls _set_errno_from_matherr 107058->107087 107061 12a222fef84 107059->107061 107066 12a222fef1a 107059->107066 107093 12a222f5dfc 8 API calls _set_errno_from_matherr 107061->107093 107063 12a222feecf 107088 12a222f5e1c 8 API calls _set_errno_from_matherr 107063->107088 107064 12a222fef89 107094 12a222f5e1c 8 API calls _set_errno_from_matherr 107064->107094 107068 12a222fef23 107066->107068 107069 12a222fef38 107066->107069 107089 12a222f5dfc 8 API calls _set_errno_from_matherr 107068->107089 107071 12a223049b8 _fread_nolock EnterCriticalSection 107069->107071 107074 12a222fef3f 107071->107074 107072 12a222fef30 107095 12a222f1958 38 API calls _invalid_parameter_noinfo 107072->107095 107073 12a222fef28 107090 12a222f5e1c 8 API calls _set_errno_from_matherr 107073->107090 107076 12a222fef6a 107074->107076 107077 12a222fef55 107074->107077 107080 12a222fefbc _fread_nolock 41 API calls 107076->107080 107091 12a222f5e1c 8 API calls _set_errno_from_matherr 107077->107091 107083 12a222feed7 107080->107083 107081 12a222fef5a 107092 12a222f5dfc 8 API calls _set_errno_from_matherr 107081->107092 107083->106983 107084->106976 107085->106984 107086->106978 107087->107063 107088->107083 107089->107073 107090->107072 107091->107081 107092->107083 107093->107064 107094->107072 107095->107083 107097 12a22308e09 107096->107097 107099 12a22308e16 107096->107099 107122 12a222f5e1c 8 API calls _set_errno_from_matherr 107097->107122 107100 12a222ff1f5 107099->107100 107123 12a222f5e1c 8 API calls _set_errno_from_matherr 107099->107123 107100->107031 107100->107036 107102 12a22308e4d 107124 12a222f1958 38 API calls _invalid_parameter_noinfo 107102->107124 107104->107002 107105->107009 107106->107011 107107->107010 107108->107021 107109->107028 107110->107055 107111->107044 107112->107055 107113->107022 107114->107055 107115->107055 107116->107055 107117->107053 107118->107055 107119->107003 107120->107010 107121->107009 107122->107100 107123->107102 107124->107100 107125 12a222e27bb RegOpenKeyExA 107126 12a222e27e5 RegQueryValueExA 107125->107126 107132 12a222e2824 _Receive_impl 107125->107132 107126->107132 107127 12a222e28b4 RegCloseKey 107128 12a222e28ba 107127->107128 107130 12a2230df40 _Strcoll 4 API calls 107128->107130 107131 12a222e28cd 107130->107131 107132->107127 107132->107128

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object$DeleteMetricsSystem$CreateSelectStream_$CapsCompatibleCriticalDeviceReleaseSection$BitmapEnterLeaveReadResetSizeStream
                                                  • String ID:
                                                  • API String ID: 3214587331-3916222277
                                                  • Opcode ID: 4dab6f610966923f5f08f4c6809860ec5b656492cac62730b413cd5653605d09
                                                  • Instruction ID: 50420d88fb9df754d54271a2fab9b255aef313b680d472d8284d07ccbbec770e
                                                  • Opcode Fuzzy Hash: 4dab6f610966923f5f08f4c6809860ec5b656492cac62730b413cd5653605d09
                                                  • Instruction Fuzzy Hash: 6AB14B72218BC0C6E764DB21E9543EAB3A5FB89B80F809515DA8E43B69DF3CC594CB41

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 40 7ff7a45216c0-7ff7a4521723 call 7ff7a451d330 43 7ff7a45217a9-7ff7a45217d4 call 7ff7a44e1760 40->43 44 7ff7a4521729-7ff7a4521738 40->44 52 7ff7a45217d7-7ff7a4521828 43->52 46 7ff7a452173a 44->46 47 7ff7a452173d-7ff7a4521754 44->47 46->47 49 7ff7a4521771 47->49 50 7ff7a4521756-7ff7a452175d 47->50 51 7ff7a4521774-7ff7a45217a7 call 7ff7a4508dd0 * 3 49->51 50->49 53 7ff7a452175f-7ff7a4521762 50->53 51->52 55 7ff7a4521857-7ff7a4521879 call 7ff7a44d7f90 52->55 56 7ff7a452182a-7ff7a4521855 52->56 57 7ff7a4521769-7ff7a452176f 53->57 58 7ff7a4521764-7ff7a4521767 53->58 60 7ff7a452187e-7ff7a45218c2 call 7ff7a4529570 55->60 56->60 57->51 58->51 66 7ff7a45218f8-7ff7a452191a 60->66 67 7ff7a45218c4-7ff7a45218d8 60->67 71 7ff7a452191c-7ff7a4521930 66->71 72 7ff7a4521950-7ff7a4521990 call 7ff7a4528160 call 7ff7a44d3ab0 66->72 69 7ff7a45218da-7ff7a45218ed 67->69 70 7ff7a45218f3 call 7ff7a4507150 67->70 69->70 74 7ff7a45229ef-7ff7a45229f4 call 7ff7a44eec40 69->74 70->66 76 7ff7a452194b call 7ff7a4507150 71->76 77 7ff7a4521932-7ff7a4521945 71->77 89 7ff7a4521992-7ff7a4521996 72->89 90 7ff7a45219e4-7ff7a4521a29 call 7ff7a44d5cb0 call 7ff7a44d39c0 72->90 80 7ff7a45229f5-7ff7a45229fa call 7ff7a44eec40 74->80 76->72 77->76 77->80 88 7ff7a45229fb-7ff7a4522a00 call 7ff7a44eec40 80->88 98 7ff7a4522a01-7ff7a4522a06 call 7ff7a44eec40 88->98 91 7ff7a45219a0-7ff7a45219aa call 7ff7a451ed00 89->91 105 7ff7a4521a2f-7ff7a4521a57 90->105 106 7ff7a4521ab3-7ff7a4521ad0 call 7ff7a44e1760 90->106 97 7ff7a45219af-7ff7a45219e2 call 7ff7a44d76c0 call 7ff7a44ea410 call 7ff7a44d71e0 91->97 97->90 97->91 109 7ff7a4522a07-7ff7a4522a0c call 7ff7a44eec40 98->109 110 7ff7a4521a59-7ff7a4521a60 105->110 111 7ff7a4521a74 105->111 115 7ff7a4521ad5-7ff7a4521b26 106->115 125 7ff7a4522a0d-7ff7a4522a12 call 7ff7a44eec40 109->125 110->111 112 7ff7a4521a62-7ff7a4521a65 110->112 113 7ff7a4521a77-7ff7a4521ab1 call 7ff7a4508dd0 * 3 111->113 118 7ff7a4521a67-7ff7a4521a6a 112->118 119 7ff7a4521a6c-7ff7a4521a72 112->119 113->115 122 7ff7a4521b28-7ff7a4521b53 115->122 123 7ff7a4521b55-7ff7a4521b77 call 7ff7a44d7f90 115->123 118->113 119->113 128 7ff7a4521b7c-7ff7a4521bd2 call 7ff7a4529570 122->128 123->128 135 7ff7a4522a13-7ff7a4522a18 call 7ff7a44eec40 125->135 136 7ff7a4521c08-7ff7a4521c2a 128->136 137 7ff7a4521bd4-7ff7a4521be8 128->137 152 7ff7a4522a19-7ff7a4522a1f call 7ff7a44eec40 135->152 142 7ff7a4521c2c-7ff7a4521c40 136->142 143 7ff7a4521c60-7ff7a4521c6a 136->143 140 7ff7a4521bea-7ff7a4521bfd 137->140 141 7ff7a4521c03 call 7ff7a4507150 137->141 140->88 140->141 141->136 147 7ff7a4521c5b call 7ff7a4507150 142->147 148 7ff7a4521c42-7ff7a4521c55 142->148 149 7ff7a4521c70-7ff7a4521cfe call 7ff7a44d6000 call 7ff7a4529570 143->149 150 7ff7a4521d03-7ff7a4521d15 call 7ff7a452ad70 143->150 147->143 148->98 148->147 165 7ff7a45229ab-7ff7a45229e8 call 7ff7a451f8c0 call 7ff7a4506ee0 149->165 159 7ff7a4521d1b-7ff7a4521dab call 7ff7a44d6000 call 7ff7a4529570 150->159 160 7ff7a4521db0-7ff7a4521dc7 call 7ff7a451fad0 150->160 159->165 170 7ff7a4521dc9-7ff7a4521dcc 160->170 171 7ff7a4521dd1-7ff7a4521def call 7ff7a44d3ab0 160->171 170->165 177 7ff7a4521e3c-7ff7a4521e92 call 7ff7a44d7910 call 7ff7a44d5cb0 call 7ff7a451a040 171->177 178 7ff7a4521df1-7ff7a4521e01 171->178 186 7ff7a4521eb0-7ff7a4521ed0 call 7ff7a44d7f90 177->186 187 7ff7a4521e94-7ff7a4521ea3 177->187 178->177 192 7ff7a4521ed3-7ff7a4521f29 call 7ff7a4529570 186->192 188 7ff7a4521ea8-7ff7a4521eae 187->188 189 7ff7a4521ea5 187->189 188->192 189->188 195 7ff7a4521f2b-7ff7a4521f3f 192->195 196 7ff7a4521f5f-7ff7a4521f81 192->196 197 7ff7a4521f5a call 7ff7a4507150 195->197 198 7ff7a4521f41-7ff7a4521f54 195->198 199 7ff7a4521fb8-7ff7a4521fcd call 7ff7a44d39c0 196->199 200 7ff7a4521f83-7ff7a4521f97 196->200 197->196 198->109 198->197 207 7ff7a4521ff9-7ff7a4522004 199->207 208 7ff7a4521fcf-7ff7a4521fd1 199->208 202 7ff7a4521f99-7ff7a4521fac 200->202 203 7ff7a4521fb2-7ff7a4521fb7 call 7ff7a4507150 200->203 202->125 202->203 203->199 211 7ff7a4522008-7ff7a4522030 call 7ff7a452a3f0 207->211 208->207 210 7ff7a4521fd3-7ff7a4521ff7 208->210 210->211 214 7ff7a45220bd-7ff7a45220f2 call 7ff7a451d830 call 7ff7a452a660 211->214 215 7ff7a4522036-7ff7a45220b8 call 7ff7a44d6000 call 7ff7a4529570 211->215 224 7ff7a45220f8-7ff7a4522191 call 7ff7a44d6000 call 7ff7a4529570 214->224 225 7ff7a4522196-7ff7a45221af 214->225 226 7ff7a4522995-7ff7a452299c 215->226 240 7ff7a452298a-7ff7a4522994 call 7ff7a451f8c0 224->240 228 7ff7a45221dc-7ff7a4522270 call 7ff7a451d0f0 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 225->228 229 7ff7a45221b1-7ff7a45221d7 call 7ff7a451a1e0 225->229 226->165 230 7ff7a452299e-7ff7a45229aa call 7ff7a451f8c0 226->230 248 7ff7a4522272-7ff7a4522286 228->248 249 7ff7a45222a6-7ff7a45222c8 228->249 229->228 230->165 240->226 250 7ff7a4522288-7ff7a452229b 248->250 251 7ff7a45222a1 call 7ff7a4507150 248->251 252 7ff7a45222ca-7ff7a45222de 249->252 253 7ff7a45222fe-7ff7a4522325 call 7ff7a4522dd0 249->253 250->135 250->251 251->249 255 7ff7a45222f9 call 7ff7a4507150 252->255 256 7ff7a45222e0-7ff7a45222f3 252->256 260 7ff7a4522327-7ff7a452232a 253->260 261 7ff7a452232f-7ff7a452253b call 7ff7a451d330 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 call 7ff7a451d270 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 call 7ff7a4528160 call 7ff7a451d0f0 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 253->261 255->253 256->152 256->255 263 7ff7a452290f-7ff7a4522912 260->263 314 7ff7a4522541-7ff7a4522556 call 7ff7a44d3ab0 261->314 315 7ff7a4522645-7ff7a45228de call 7ff7a451d0f0 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 call 7ff7a4526830 call 7ff7a451bf10 call 7ff7a4519ee0 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 call 7ff7a4525140 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 call 7ff7a452b0d0 call 7ff7a4526830 call 7ff7a451f8c0 261->315 263->240 265 7ff7a4522914-7ff7a452291a 263->265 267 7ff7a452291c 265->267 268 7ff7a4522934-7ff7a452296a 265->268 270 7ff7a4522920-7ff7a4522932 call 7ff7a451e190 267->270 271 7ff7a452296c-7ff7a452297f 268->271 272 7ff7a4522981-7ff7a4522989 call 7ff7a4507150 268->272 270->268 271->272 273 7ff7a45229e9-7ff7a45229ee call 7ff7a44eec40 271->273 272->240 273->74 321 7ff7a4522560-7ff7a45225a0 call 7ff7a451ed00 call 7ff7a44d76c0 call 7ff7a44ea410 call 7ff7a44d71e0 314->321 388 7ff7a45228e0-7ff7a45228e4 315->388 389 7ff7a4522902-7ff7a452290e call 7ff7a451f8c0 315->389 338 7ff7a45225a2-7ff7a4522640 call 7ff7a44d5cb0 call 7ff7a44d39c0 call 7ff7a451a040 call 7ff7a44d5f70 call 7ff7a4529570 call 7ff7a44d4670 * 2 321->338 338->315 388->389 390 7ff7a45228e6-7ff7a45228fa 388->390 389->263 393 7ff7a4522901 390->393 393->389
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: one$Chosen detour scheme: $Hook instructions: $Hook size: $Original function:$Prologue offset: $Prologue to overwrite:$Trampoline Jmp Tbl:$Trampoline:$UNKNOWN$failed$ions$m_fnAddress: $m_trampoline: $m_trampolineSz:
                                                  • API String ID: 3668304517-2571529286
                                                  • Opcode ID: e9dbe00d73e84b1aca2443e17e93a3ca6c7ad34fe5a1861fc059e8d427c4ce65
                                                  • Instruction ID: 1e2b4ad231fbd25e085c9c9a55777fd512b5b2b9b3a6a0641651668d609170c7
                                                  • Opcode Fuzzy Hash: e9dbe00d73e84b1aca2443e17e93a3ca6c7ad34fe5a1861fc059e8d427c4ce65
                                                  • Instruction Fuzzy Hash: 95B2B722A19BC285EB25EF35D8803EDA361FB95748F815232DA4D476BADF7DD284C310
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                  • String ID: Instructions needing entry:$Instructions needing relocation:$Instructions needing translation:$Jmp To Prol:$Original function:$Trampoline address: $jmp$m_fnAddress:
                                                  • API String ID: 3936042273-1617887432
                                                  • Opcode ID: 3d68b8c13095499e7d1417a9f59e822c48b32e0256936b09caf975b3caee107a
                                                  • Instruction ID: ded8bc898de153399b3bd01a8235c59b18f1e4d6dec4aa6debc51a5de7793159
                                                  • Opcode Fuzzy Hash: 3d68b8c13095499e7d1417a9f59e822c48b32e0256936b09caf975b3caee107a
                                                  • Instruction Fuzzy Hash: 19D2AE62B06BC189EB20EF76C8843ED6761EB45798F814632DA5D47BBADF39D184C310
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Instructions needing entry:$Instructions needing relocation:$Instructions needing translation:$Jmp To Prol:$Original function:$Trampoline address: $m_fnAddress:
                                                  • API String ID: 0-38338247
                                                  • Opcode ID: 5f9d8bd3000f98a24d57cace3f9ead234bd4430d37e80bb3e30a2259914e6365
                                                  • Instruction ID: 10563ea2c5473ecbdaf50d6937669c29d3b94ad9f3d822d1938347bb3fffb863
                                                  • Opcode Fuzzy Hash: 5f9d8bd3000f98a24d57cace3f9ead234bd4430d37e80bb3e30a2259914e6365
                                                  • Instruction Fuzzy Hash: 3892B762A06BC189EB20EF36C4843ED6761FB45798F954232DA5D47BBADF39D284C310

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1184 12a2231b76c-12a2231b7ac 1185 12a2231b7ae-12a2231b7b5 1184->1185 1186 12a2231b7c1-12a2231b7ca 1184->1186 1185->1186 1187 12a2231b7b7-12a2231b7bc 1185->1187 1188 12a2231b7cc-12a2231b7cf 1186->1188 1189 12a2231b7e6-12a2231b7e8 1186->1189 1190 12a2231ba40-12a2231ba66 call 12a2230df40 1187->1190 1188->1189 1191 12a2231b7d1-12a2231b7d9 1188->1191 1192 12a2231ba3e 1189->1192 1193 12a2231b7ee-12a2231b7f2 1189->1193 1197 12a2231b7db-12a2231b7dd 1191->1197 1198 12a2231b7df-12a2231b7e2 1191->1198 1192->1190 1194 12a2231b8c9-12a2231b8f0 call 12a2231bb40 1193->1194 1195 12a2231b7f8-12a2231b7fb 1193->1195 1208 12a2231b912-12a2231b91b 1194->1208 1209 12a2231b8f2-12a2231b8fb 1194->1209 1199 12a2231b7fd-12a2231b805 1195->1199 1200 12a2231b80f-12a2231b821 GetFileAttributesExW 1195->1200 1197->1189 1197->1198 1198->1189 1199->1200 1203 12a2231b807-12a2231b809 1199->1203 1204 12a2231b823-12a2231b82c call 12a22337168 1200->1204 1205 12a2231b874-12a2231b883 1200->1205 1203->1194 1203->1200 1204->1190 1220 12a2231b832-12a2231b844 FindFirstFileW 1204->1220 1210 12a2231b887-12a2231b889 1205->1210 1216 12a2231b9cf-12a2231b9d8 1208->1216 1217 12a2231b921-12a2231b939 GetFileInformationByHandleEx 1208->1217 1214 12a2231b90b-12a2231b90d 1209->1214 1215 12a2231b8fd-12a2231b905 call 12a22337140 1209->1215 1211 12a2231b88b-12a2231b893 1210->1211 1212 12a2231b895-12a2231b8c3 1210->1212 1211->1194 1211->1212 1212->1192 1212->1194 1214->1190 1215->1214 1239 12a2231ba81-12a2231ba86 call 12a2230b1c0 1215->1239 1218 12a2231b9da-12a2231b9ee GetFileInformationByHandleEx 1216->1218 1219 12a2231ba27-12a2231ba29 1216->1219 1222 12a2231b93b-12a2231b947 call 12a22337168 1217->1222 1223 12a2231b961-12a2231b97a 1217->1223 1224 12a2231b9f0-12a2231b9fc call 12a22337168 1218->1224 1225 12a2231ba14-12a2231ba24 1218->1225 1230 12a2231ba2b-12a2231ba2f 1219->1230 1231 12a2231ba67-12a2231ba6b 1219->1231 1227 12a2231b851-12a2231b872 call 12a22337110 1220->1227 1228 12a2231b846-12a2231b84c call 12a22337168 1220->1228 1252 12a2231b95a-12a2231b95c 1222->1252 1253 12a2231b949-12a2231b954 call 12a22337140 1222->1253 1223->1216 1226 12a2231b97c-12a2231b980 1223->1226 1224->1252 1255 12a2231ba02-12a2231ba0d call 12a22337140 1224->1255 1225->1219 1236 12a2231b982-12a2231b99c GetFileInformationByHandleEx 1226->1236 1237 12a2231b9c8 1226->1237 1227->1210 1228->1190 1230->1192 1241 12a2231ba31-12a2231ba3c call 12a22337140 1230->1241 1234 12a2231ba7a-12a2231ba7f 1231->1234 1235 12a2231ba6d-12a2231ba78 call 12a22337140 1231->1235 1234->1190 1235->1234 1235->1239 1245 12a2231b9bf-12a2231b9c6 1236->1245 1246 12a2231b99e-12a2231b9aa call 12a22337168 1236->1246 1251 12a2231b9cc 1237->1251 1263 12a2231ba87-12a2231ba8c call 12a2230b1c0 1239->1263 1241->1192 1241->1239 1245->1251 1246->1252 1266 12a2231b9ac-12a2231b9b7 call 12a22337140 1246->1266 1251->1216 1252->1190 1253->1252 1264 12a2231ba93-12a2231ba9b call 12a2230b1c0 1253->1264 1269 12a2231ba8d-12a2231ba92 call 12a2230b1c0 1255->1269 1270 12a2231ba0f 1255->1270 1263->1269 1266->1263 1277 12a2231b9bd 1266->1277 1269->1264 1270->1252 1277->1252
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handle
                                                  • String ID:
                                                  • API String ID: 2398595512-0
                                                  • Opcode ID: bfb389c9a219f6e3a5f4b256f69d65311ef631e076c0c695385b0534e1d94cbf
                                                  • Instruction ID: 490a13a9e63ce1f997bfc94e0fc31cad1834e3fb38b2c7f65aa7914a4528e75b
                                                  • Opcode Fuzzy Hash: bfb389c9a219f6e3a5f4b256f69d65311ef631e076c0c695385b0534e1d94cbf
                                                  • Instruction Fuzzy Hash: B391B832300A41C7E7744F29A9147D923A2EF49BB0F9453B4DDBA47BD8DB38C9618742

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Create$ExceptionHandlerHeapSectionStringUnicodeVectored$AllocContextContinueFreeLibraryLoadRemoveThreadView
                                                  • String ID: 0$\KnownDlls$\KnownDlls32$amsi.dll
                                                  • API String ID: 1981842930-977567376
                                                  • Opcode ID: 9c790d99df23076ebf768e20d2f9b2e0eb95e492711a48b1e21ed87df4eb97b9
                                                  • Instruction ID: da25c97fb1f094ea97a323a245dcb8ad06722a8e3936685407f9d2d4c14f2499
                                                  • Opcode Fuzzy Hash: 9c790d99df23076ebf768e20d2f9b2e0eb95e492711a48b1e21ed87df4eb97b9
                                                  • Instruction Fuzzy Hash: 4F315E61A1BA0282EE44AF57E894274A361BF88B84F8A6130D91D473B4DF3EE449C321
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$ComputerCurrentDevicesDisplayEnumFileGlobalMemoryModuleProfileStatusUserValuewcsftime
                                                  • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                                  • API String ID: 4154315062-1182675529
                                                  • Opcode ID: b0fc1e9b86479d0e0064e517d1c08c8a9ae56ce5783af5bf41c0a921e4151486
                                                  • Instruction ID: 776cb89c34f7a8dc565647d21592a92e539be3a2d8d42f0ebf75ce0d6f0dbff9
                                                  • Opcode Fuzzy Hash: b0fc1e9b86479d0e0064e517d1c08c8a9ae56ce5783af5bf41c0a921e4151486
                                                  • Instruction Fuzzy Hash: 62036C72615BC5CAEB208F34D8403DD77A5FB89758F909216EA8C17BA9EF74C2A4C701

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1783 12a2229d930-12a2229da20 LoadLibraryA 1784 12a2229da26-12a2229dddf call 12a22337150 * 6 1783->1784 1785 12a2229e8d7-12a2229e8e1 1783->1785 1784->1785 1806 12a2229dde5-12a2229dde8 1784->1806 1786 12a2229e8e3-12a2229e8e5 1785->1786 1787 12a2229e8f0-12a2229e8f3 1785->1787 1786->1787 1790 12a2229e8f5-12a2229e8f8 call 12a22337160 1787->1790 1791 12a2229e8fe-12a2229e92d call 12a2230df40 1787->1791 1790->1791 1806->1785 1807 12a2229ddee-12a2229ddf1 1806->1807 1807->1785 1808 12a2229ddf7-12a2229ddfa 1807->1808 1808->1785 1809 12a2229de00-12a2229de03 1808->1809 1809->1785 1810 12a2229de09-12a2229de0c 1809->1810 1810->1785 1811 12a2229de12-12a2229de20 1810->1811 1812 12a2229de24-12a2229de26 1811->1812 1812->1785 1813 12a2229de2c-12a2229de38 1812->1813 1813->1785 1814 12a2229de3e 1813->1814 1815 12a2229de43-12a2229de5e 1814->1815 1817 12a2229de64-12a2229de82 1815->1817 1818 12a2229e8be-12a2229e8ca 1815->1818 1817->1818 1821 12a2229de88-12a2229de9a 1817->1821 1818->1815 1819 12a2229e8d0 1818->1819 1819->1785 1822 12a2229e8a5-12a2229e8b7 1821->1822 1823 12a2229dea0 1821->1823 1822->1818 1824 12a2229dea4-12a2229def5 call 12a2230e200 1823->1824 1828 12a2229e174 1824->1828 1829 12a2229defb-12a2229df02 1824->1829 1831 12a2229e176-12a2229e17d 1828->1831 1829->1828 1832 12a2229df08-12a2229dffb call 12a222d3890 call 12a222a43f0 call 12a222a46c0 1829->1832 1834 12a2229e3f4-12a2229e430 1831->1834 1835 12a2229e183-12a2229e18a 1831->1835 1857 12a2229e002-12a2229e00a 1832->1857 1843 12a2229e436-12a2229e444 1834->1843 1844 12a2229e6c7-12a2229e6c9 1834->1844 1835->1834 1836 12a2229e190-12a2229e27e call 12a222d3890 call 12a222a43f0 call 12a222a46c0 1835->1836 1871 12a2229e285-12a2229e28d 1836->1871 1846 12a2229e44a-12a2229e451 1843->1846 1847 12a2229e6c0-12a2229e6c3 1843->1847 1849 12a2229e877-12a2229e88d call 12a222a0580 1844->1849 1850 12a2229e6cf-12a2229e7f4 call 12a22292280 call 12a222a0f20 call 12a22292280 call 12a222a0f20 call 12a222a3140 call 12a2230e200 call 12a222ba7f0 1844->1850 1846->1847 1855 12a2229e457-12a2229e54c call 12a222d3890 call 12a222a43f0 call 12a222a46c0 1846->1855 1847->1844 1851 12a2229e6c5 1847->1851 1863 12a2229dea2 1849->1863 1864 12a2229e893-12a2229e89e 1849->1864 1946 12a2229e7f6-12a2229e7f8 1850->1946 1947 12a2229e800-12a2229e819 call 12a222a29a0 1850->1947 1851->1844 1884 12a2229e550-12a2229e557 1855->1884 1857->1857 1865 12a2229e00c-12a2229e066 call 12a22292280 call 12a222a59e0 call 12a222a3140 1857->1865 1863->1824 1864->1822 1892 12a2229e068-12a2229e079 1865->1892 1893 12a2229e099-12a2229e0c3 1865->1893 1871->1871 1873 12a2229e28f-12a2229e2e8 call 12a22292280 call 12a222a59e0 call 12a222a3140 1871->1873 1906 12a2229e2ea-12a2229e2fb 1873->1906 1907 12a2229e31b-12a2229e345 1873->1907 1884->1884 1890 12a2229e559-12a2229e5b2 call 12a22292280 call 12a222a59e0 call 12a222a3140 1884->1890 1953 12a2229e5b4-12a2229e5c5 1890->1953 1954 12a2229e5e5-12a2229e60e 1890->1954 1898 12a2229e094 call 12a2230df60 1892->1898 1899 12a2229e07b-12a2229e08e 1892->1899 1902 12a2229e0c5-12a2229e0d9 1893->1902 1903 12a2229e0fb-12a2229e121 1893->1903 1898->1893 1899->1898 1904 12a2229e98c-12a2229e991 call 12a222f1978 1899->1904 1909 12a2229e0f4-12a2229e0f9 call 12a2230df60 1902->1909 1910 12a2229e0db-12a2229e0ee 1902->1910 1912 12a2229e123-12a2229e137 1903->1912 1913 12a2229e159-12a2229e172 1903->1913 1921 12a2229e992-12a2229e997 call 12a222f1978 1904->1921 1914 12a2229e316 call 12a2230df60 1906->1914 1915 12a2229e2fd-12a2229e310 1906->1915 1917 12a2229e347-12a2229e35b 1907->1917 1918 12a2229e37d-12a2229e3a3 1907->1918 1909->1903 1910->1909 1910->1921 1923 12a2229e152-12a2229e157 call 12a2230df60 1912->1923 1924 12a2229e139-12a2229e14c 1912->1924 1913->1831 1914->1907 1915->1914 1928 12a2229e99e-12a2229e9a3 call 12a222f1978 1915->1928 1929 12a2229e376-12a2229e37b call 12a2230df60 1917->1929 1930 12a2229e35d-12a2229e370 1917->1930 1933 12a2229e3a5-12a2229e3b9 1918->1933 1934 12a2229e3db-12a2229e3ed 1918->1934 1937 12a2229e998-12a2229e99d call 12a222f1978 1921->1937 1923->1913 1924->1923 1924->1937 1945 12a2229e9a4-12a2229e9a9 call 12a222f1978 1928->1945 1929->1918 1930->1929 1930->1945 1938 12a2229e3d4-12a2229e3d9 call 12a2230df60 1933->1938 1939 12a2229e3bb-12a2229e3ce 1933->1939 1934->1834 1937->1928 1938->1934 1939->1938 1949 12a2229e9aa-12a2229e9af call 12a222f1978 1939->1949 1945->1949 1957 12a2229e934-12a2229e985 call 12a222a2b60 call 12a222a6710 call 12a222a67e0 call 12a22311108 1946->1957 1958 12a2229e7fe 1946->1958 1965 12a2229e81d-12a2229e829 1947->1965 1975 12a2229e9b0-12a2229e9b5 call 12a222f1978 1949->1975 1962 12a2229e5c7-12a2229e5da 1953->1962 1963 12a2229e5e0 call 12a2230df60 1953->1963 1968 12a2229e644-12a2229e66a 1954->1968 1969 12a2229e610-12a2229e624 1954->1969 1989 12a2229e986-12a2229e98b call 12a222f1978 1957->1989 1958->1965 1962->1963 1962->1975 1963->1954 1970 12a2229e82b-12a2229e84e 1965->1970 1971 12a2229e850-12a2229e85a call 12a222abbd0 1965->1971 1972 12a2229e66c-12a2229e680 1968->1972 1973 12a2229e6a0-12a2229e6b9 1968->1973 1978 12a2229e626-12a2229e639 1969->1978 1979 12a2229e63f call 12a2230df60 1969->1979 1984 12a2229e85f-12a2229e870 call 12a222a3140 1970->1984 1971->1984 1985 12a2229e682-12a2229e695 1972->1985 1986 12a2229e69b call 12a2230df60 1972->1986 1973->1847 1978->1979 1981 12a2229e92e-12a2229e933 call 12a222f1978 1978->1981 1979->1968 1981->1957 1984->1849 1985->1986 1985->1989 1986->1973 1989->1904
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Library$FreeLoad
                                                  • String ID: cannot use push_back() with $system$vault
                                                  • API String ID: 2449869053-1741236777
                                                  • Opcode ID: 6e2e07a9f2fee44293878625a083391820c32ca6be03ba8098f77741882e2de2
                                                  • Instruction ID: d3e0b05432b03e2ebd9d0f90ee20dc3a7fc520f12e3e9716f908bc87e9bd71ba
                                                  • Opcode Fuzzy Hash: 6e2e07a9f2fee44293878625a083391820c32ca6be03ba8098f77741882e2de2
                                                  • Instruction Fuzzy Hash: 5D923A32205BC4CAEB618F29E9403DDB3A4FB89798F604216EB9C5BB99DF35C654C701

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2003 7ff7a44dd5e0-7ff7a44dd64b call 7ff7a4507184 2006 7ff7a44dd651-7ff7a44dd72b call 7ff7a4508dd0 2003->2006 2007 7ff7a44dd909-7ff7a44dd90e call 7ff7a44eec40 2003->2007 2012 7ff7a44dd72d-7ff7a44dd72f 2006->2012 2013 7ff7a44dd76a-7ff7a44dd7b2 call 7ff7a44e03c0 2006->2013 2014 7ff7a44dd90f-7ff7a44dd914 call 7ff7a44d8f10 2007->2014 2016 7ff7a44dd730-7ff7a44dd734 2012->2016 2024 7ff7a44dd7b8-7ff7a44dd7c5 2013->2024 2025 7ff7a44dd839-7ff7a44dd84a 2013->2025 2022 7ff7a44dd915-7ff7a44dd91a call 7ff7a44d2970 2014->2022 2019 7ff7a44dd736-7ff7a44dd747 call 7ff7a44dc7e0 2016->2019 2020 7ff7a44dd74b-7ff7a44dd768 2016->2020 2019->2020 2020->2013 2020->2016 2041 7ff7a44dd91b-7ff7a44dd920 call 7ff7a44eec40 2022->2041 2024->2014 2026 7ff7a44dd7cb-7ff7a44dd7d2 2024->2026 2029 7ff7a44dd84c-7ff7a44dd85e 2025->2029 2030 7ff7a44dd87e-7ff7a44dd899 2025->2030 2031 7ff7a44dd7d4-7ff7a44dd7db 2026->2031 2032 7ff7a44dd800-7ff7a44dd803 call 7ff7a4507184 2026->2032 2036 7ff7a44dd860-7ff7a44dd873 2029->2036 2037 7ff7a44dd879 call 7ff7a4507150 2029->2037 2033 7ff7a44dd89b-7ff7a44dd8ad 2030->2033 2034 7ff7a44dd8d7-7ff7a44dd902 call 7ff7a4506ee0 2030->2034 2031->2022 2038 7ff7a44dd7e1 call 7ff7a4507184 2031->2038 2050 7ff7a44dd808-7ff7a44dd834 call 7ff7a4508dd0 2032->2050 2039 7ff7a44dd8c4 call 7ff7a4507150 2033->2039 2040 7ff7a44dd8af-7ff7a44dd8c2 2033->2040 2036->2037 2044 7ff7a44dd921-7ff7a44dd93f call 7ff7a44eec40 call 7ff7a44dd5e0 2036->2044 2037->2030 2053 7ff7a44dd7e6-7ff7a44dd7ec 2038->2053 2054 7ff7a44dd8c9-7ff7a44dd8d2 2039->2054 2040->2039 2047 7ff7a44dd903-7ff7a44dd908 call 7ff7a44eec40 2040->2047 2041->2044 2063 7ff7a44dd944-7ff7a44dd953 2044->2063 2047->2007 2050->2025 2053->2041 2059 7ff7a44dd7f2-7ff7a44dd7fe 2053->2059 2054->2034 2059->2050 2064 7ff7a44dd955-7ff7a44dd95f 2063->2064 2065 7ff7a44dd9d2-7ff7a44dd9da 2063->2065 2068 7ff7a44dd961-7ff7a44dd972 2064->2068 2069 7ff7a44dd9a7-7ff7a44dd9ce 2064->2069 2066 7ff7a44dd9dc-7ff7a44dd9ee 2065->2066 2067 7ff7a44dda18-7ff7a44dda22 2065->2067 2070 7ff7a44dda05-7ff7a44dda12 call 7ff7a4507150 2066->2070 2071 7ff7a44dd9f0-7ff7a44dda03 2066->2071 2072 7ff7a44dd974-7ff7a44dd987 2068->2072 2073 7ff7a44dd990-7ff7a44dd99f call 7ff7a4507150 2068->2073 2069->2065 2070->2067 2071->2070 2077 7ff7a44dda29-7ff7a44de7de call 7ff7a44eec40 call 7ff7a44e0400 2071->2077 2074 7ff7a44dda23-7ff7a44dda28 call 7ff7a44eec40 2072->2074 2075 7ff7a44dd98d 2072->2075 2073->2069 2074->2077 2075->2073 2089 7ff7a44de7e0-7ff7a44de7ee 2077->2089 2090 7ff7a44de7ef-7ff7a44de83f 2077->2090
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                                  • String ID: 2-by$expa$nd 3$te k
                                                  • API String ID: 3936042273-3581043453
                                                  • Opcode ID: 21a0941023e9b7a214e712558d3cbfc8f9520702bdbaf05cfd265808015e4b1d
                                                  • Instruction ID: d62311f5a11f9c9812028568d2886e087c3ff02604b377857b3d5a0d85119872
                                                  • Opcode Fuzzy Hash: 21a0941023e9b7a214e712558d3cbfc8f9520702bdbaf05cfd265808015e4b1d
                                                  • Instruction Fuzzy Hash: BDD1E772A1AB8185EB40DF66E48026DB3A5FB88794F514635EAAC07BBDDF3DD480C710

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2176 12a222d8020-12a222d8059 call 12a222db120 2179 12a222d8085-12a222d813b call 12a222e78b0 * 2 call 12a222e3a60 call 12a222d8c00 2176->2179 2180 12a222d805b-12a222d8084 call 12a222db510 call 12a222e6460 call 12a222a1c10 ExitProcess 2176->2180 2195 12a222d816f-12a222d81ac OpenMutexA 2179->2195 2196 12a222d813d-12a222d814f 2179->2196 2180->2179 2199 12a222d81ae-12a222d81b9 ExitProcess 2195->2199 2200 12a222d81ba-12a222d81fa CreateMutexA call 12a222d26b0 call 12a222db650 2195->2200 2197 12a222d8151-12a222d8164 2196->2197 2198 12a222d816a call 12a2230df60 2196->2198 2197->2198 2202 12a222d8469-12a222d846e call 12a222f1978 2197->2202 2198->2195 2199->2200 2210 12a222d8208-12a222d828c call 12a222e3d70 call 12a2229d930 call 12a2229e9c0 call 12a2229f060 call 12a2229fe70 call 12a2229cde0 call 12a222c2c50 call 12a222c5930 call 12a22293180 call 12a2229b1e0 call 12a22299c00 call 12a222d8e30 call 12a2229c300 call 12a22297d70 call 12a22295030 call 12a222e2d90 2200->2210 2211 12a222d81fc-12a222d8207 ExitProcess 2200->2211 2209 12a222d846f-12a222d8474 call 12a222f1978 2202->2209 2216 12a222d8475-12a222d847a call 12a222f1978 2209->2216 2254 12a222d82a6-12a222d82b1 2210->2254 2255 12a222d828e 2210->2255 2211->2210 2222 12a222d847b-12a222d8480 call 12a222f1978 2216->2222 2257 12a222d8329-12a222d8360 call 12a222da7a0 call 12a22297350 2254->2257 2258 12a222d82b3-12a222d82be 2254->2258 2256 12a222d8290-12a222d8298 call 12a22297350 2255->2256 2266 12a222d829d-12a222d82a4 2256->2266 2274 12a222d8399-12a222d83ad call 12a222e0480 2257->2274 2275 12a222d8362-12a222d8379 2257->2275 2261 12a222d82d9-12a222d82f2 2258->2261 2262 12a222d82c0-12a222d82cf call 12a2228f910 2258->2262 2263 12a222d82f4-12a222d8307 2261->2263 2264 12a222d830d-12a222d8321 call 12a2230df60 2261->2264 2271 12a222d82d1 2262->2271 2263->2209 2263->2264 2264->2257 2266->2254 2266->2256 2271->2261 2279 12a222d83b2-12a222d83c2 call 12a222d7630 2274->2279 2277 12a222d8394 call 12a2230df60 2275->2277 2278 12a222d837b-12a222d838e 2275->2278 2277->2274 2278->2216 2278->2277 2284 12a222d83d6-12a222d83dd 2279->2284 2285 12a222d83c4-12a222d83d0 ReleaseMutex call 12a22337140 2279->2285 2287 12a222d83e5-12a222d83f1 2284->2287 2288 12a222d83df-12a222d83e4 call 12a222d8490 2284->2288 2285->2284 2290 12a222d83f3-12a222d8408 2287->2290 2291 12a222d8424-12a222d8468 call 12a2230df40 2287->2291 2288->2287 2294 12a222d841f call 12a2230df60 2290->2294 2295 12a222d840a-12a222d841d 2290->2295 2294->2291 2295->2222 2295->2294
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$Exit$MutexOpenToken$CreateCurrentFileInformationInitializeModuleName
                                                  • String ID: SeDebugPrivilege$SeImpersonatePrivilege
                                                  • API String ID: 470559343-3768118664
                                                  • Opcode ID: 5bfe8b4ff8cb12200b578da41a32964f312533269f6f1a5465e22c97128ba6be
                                                  • Instruction ID: cb1415fb26a3ab6dad6902cf8320c79ca63f49cc0341b363f64d76498da6a3da
                                                  • Opcode Fuzzy Hash: 5bfe8b4ff8cb12200b578da41a32964f312533269f6f1a5465e22c97128ba6be
                                                  • Instruction Fuzzy Hash: 35B18F72618BC4C3FB20AB25E5453DEA361FF85B90FD04615EA9D02ADADF39C4618703

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2298 12a223022fc-12a22302337 call 12a2230199c call 12a223019a4 call 12a22301a0c 2305 12a2230233d-12a22302348 call 12a223019ac 2298->2305 2306 12a22302561-12a223025ad call 12a222f19a8 call 12a2230199c call 12a223019a4 call 12a22301a0c 2298->2306 2305->2306 2311 12a2230234e-12a22302358 2305->2311 2332 12a223026eb-12a22302759 call 12a222f19a8 call 12a2230ad20 2306->2332 2333 12a223025b3-12a223025be call 12a223019ac 2306->2333 2313 12a2230237a-12a2230237e 2311->2313 2314 12a2230235a-12a2230235d 2311->2314 2317 12a22302381-12a22302389 2313->2317 2316 12a22302360-12a2230236b 2314->2316 2321 12a2230236d-12a22302374 2316->2321 2322 12a22302376-12a22302378 2316->2322 2317->2317 2319 12a2230238b-12a2230239e call 12a222ff8ac 2317->2319 2328 12a223023a0-12a223023a2 call 12a222fcf0c 2319->2328 2329 12a223023b6-12a223023c2 call 12a222fcf0c 2319->2329 2321->2316 2321->2322 2322->2313 2325 12a223023a7-12a223023b5 2322->2325 2328->2325 2339 12a223023c9-12a223023d1 2329->2339 2352 12a2230275b-12a22302762 2332->2352 2353 12a22302767-12a2230276a 2332->2353 2333->2332 2341 12a223025c4-12a223025cf call 12a223019dc 2333->2341 2339->2339 2342 12a223023d3-12a223023e4 call 12a22307454 2339->2342 2341->2332 2350 12a223025d5-12a223025f8 call 12a222fcf0c GetTimeZoneInformation 2341->2350 2342->2306 2351 12a223023ea-12a22302440 call 12a223108f0 * 4 call 12a22302218 2342->2351 2368 12a223025fe-12a2230261f 2350->2368 2369 12a223026c0-12a223026ea call 12a22301994 call 12a22301984 call 12a2230198c 2350->2369 2410 12a22302442-12a22302446 2351->2410 2358 12a223027f7-12a223027fa 2352->2358 2354 12a2230276c 2353->2354 2355 12a223027a1-12a223027b4 call 12a222ff8ac 2353->2355 2359 12a2230276f 2354->2359 2375 12a223027bf-12a223027da call 12a2230ad20 2355->2375 2376 12a223027b6 2355->2376 2358->2359 2360 12a22302800-12a22302808 call 12a223022fc 2358->2360 2364 12a22302774-12a223027a0 call 12a222fcf0c call 12a2230df40 2359->2364 2365 12a2230276f call 12a22302578 2359->2365 2360->2364 2365->2364 2377 12a2230262a-12a22302631 2368->2377 2378 12a22302621-12a22302627 2368->2378 2393 12a223027dc-12a223027df 2375->2393 2394 12a223027e1-12a223027f3 call 12a222fcf0c 2375->2394 2385 12a223027b8-12a223027bd call 12a222fcf0c 2376->2385 2380 12a22302633-12a2230263b 2377->2380 2381 12a22302645 2377->2381 2378->2377 2380->2381 2387 12a2230263d-12a22302643 2380->2387 2390 12a22302647-12a223026bb call 12a223108f0 * 4 call 12a22305e00 call 12a22302810 * 2 2381->2390 2385->2354 2387->2390 2390->2369 2393->2385 2394->2358 2412 12a2230244c-12a22302450 2410->2412 2413 12a22302448 2410->2413 2412->2410 2415 12a22302452-12a22302477 call 12a222f5c60 2412->2415 2413->2412 2421 12a2230247a-12a2230247e 2415->2421 2423 12a2230248d-12a22302491 2421->2423 2424 12a22302480-12a2230248b 2421->2424 2423->2421 2424->2423 2426 12a22302493-12a22302497 2424->2426 2429 12a22302518-12a2230251c 2426->2429 2430 12a22302499-12a223024c1 call 12a222f5c60 2426->2430 2432 12a2230251e-12a22302520 2429->2432 2433 12a22302523-12a22302530 2429->2433 2438 12a223024df-12a223024e3 2430->2438 2439 12a223024c3 2430->2439 2432->2433 2434 12a2230254b-12a2230255a call 12a22301994 call 12a22301984 2433->2434 2435 12a22302532-12a22302548 call 12a22302218 2433->2435 2434->2306 2435->2434 2438->2429 2444 12a223024e5-12a22302503 call 12a222f5c60 2438->2444 2442 12a223024c6-12a223024cd 2439->2442 2442->2438 2445 12a223024cf-12a223024dd 2442->2445 2450 12a2230250f-12a22302516 2444->2450 2445->2438 2445->2442 2450->2429 2451 12a22302505-12a22302509 2450->2451 2451->2429 2452 12a2230250b 2451->2452 2452->2450
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                                  • API String ID: 355007559-239921721
                                                  • Opcode ID: defc81dd178baeee3c1f504e259458a631c953d5ab932f891df2dba57eb76214
                                                  • Instruction ID: 3b93cc2f1e1b4a854a331ef67a29da8d1efc928ad3a12228a65b06f132327a24
                                                  • Opcode Fuzzy Hash: defc81dd178baeee3c1f504e259458a631c953d5ab932f891df2dba57eb76214
                                                  • Instruction Fuzzy Hash: 8AD1E236700240C7EB20EF26DA903F96761FF84B94FC48066EE4947E96DB78C561C752

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2453 12a222e0cc0-12a222e0d1c 2454 12a222e0d22-12a222e0d35 call 12a2230e0f0 2453->2454 2455 12a222e0ee0-12a222e0f02 InternetOpenA 2453->2455 2454->2455 2465 12a222e0d3b-12a222e0eab 2454->2465 2457 12a222e0f27-12a222e0f40 2455->2457 2458 12a222e0f04-12a222e0f22 2455->2458 2461 12a222e0f45-12a222e0f72 InternetOpenUrlA 2457->2461 2462 12a222e0f42 2457->2462 2460 12a222e12b1-12a222e12da call 12a2230df40 2458->2460 2463 12a222e0f74-12a222e0f95 2461->2463 2464 12a222e0f9a-12a222e0fc5 HttpQueryInfoW 2461->2464 2462->2461 2467 12a222e12a8 2463->2467 2468 12a222e0ff7-12a222e104b HttpQueryInfoW 2464->2468 2469 12a222e0fc7-12a222e0ff2 2464->2469 2470 12a222e0eb0-12a222e0eb8 2465->2470 2467->2460 2473 12a222e1074-12a222e1089 InternetQueryDataAvailable 2468->2473 2474 12a222e104d-12a222e1061 call 12a222f5c60 2468->2474 2469->2467 2470->2470 2472 12a222e0eba-12a222e0edb call 12a22292280 call 12a2230e544 call 12a2230e090 2470->2472 2472->2455 2478 12a222e125e-12a222e12a4 InternetCloseHandle 2473->2478 2479 12a222e108f 2473->2479 2474->2473 2485 12a222e1063-12a222e1070 call 12a222a7130 2474->2485 2478->2467 2482 12a222e1094-12a222e1099 2479->2482 2482->2478 2483 12a222e109f-12a222e10b9 2482->2483 2486 12a222e112c-12a222e1143 InternetReadFile 2483->2486 2487 12a222e10bb-12a222e10c1 2483->2487 2485->2473 2494 12a222e1218-12a222e121f 2486->2494 2495 12a222e1149-12a222e114e 2486->2495 2490 12a222e10c3-12a222e10ca 2487->2490 2491 12a222e10ef-12a222e10f2 call 12a2230e200 2487->2491 2496 12a222e10d0-12a222e10db call 12a2230e200 2490->2496 2497 12a222e12e1-12a222e12e6 call 12a2228d8b0 2490->2497 2504 12a222e10f7-12a222e1127 call 12a223108f0 2491->2504 2494->2478 2500 12a222e1221-12a222e1232 2494->2500 2495->2494 2499 12a222e1154-12a222e115f 2495->2499 2509 12a222e12db-12a222e12e0 call 12a222f1978 2496->2509 2518 12a222e10e1-12a222e10ed 2496->2518 2506 12a222e1161-12a222e118c call 12a22310240 2499->2506 2507 12a222e118e-12a222e11a7 call 12a222a7c60 2499->2507 2501 12a222e1234-12a222e1247 2500->2501 2502 12a222e124d-12a222e125a call 12a2230df60 2500->2502 2501->2502 2501->2509 2502->2478 2504->2486 2521 12a222e11a8-12a222e11af 2506->2521 2507->2521 2509->2497 2518->2504 2523 12a222e11f2 2521->2523 2524 12a222e11b1-12a222e11c2 2521->2524 2527 12a222e11f4-12a222e1209 InternetQueryDataAvailable 2523->2527 2525 12a222e11c4-12a222e11d7 2524->2525 2526 12a222e11dd-12a222e11f0 call 12a2230df60 2524->2526 2525->2509 2525->2526 2526->2527 2527->2478 2529 12a222e120b-12a222e1213 2527->2529 2529->2482
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$Query$AvailableDataHttpInfoOpen$CloseConcurrency::cancel_current_taskCriticalEnterFileHandleReadSection
                                                  • String ID:
                                                  • API String ID: 2604747929-0
                                                  • Opcode ID: e517db0fb651db5436af6df4f979562fea453bd9bc19156b50025d2dfa7992eb
                                                  • Instruction ID: fe1984d76ee631eb8040b0b0f930b556d2826c29aa96a49e92293d48a50eaf34
                                                  • Opcode Fuzzy Hash: e517db0fb651db5436af6df4f979562fea453bd9bc19156b50025d2dfa7992eb
                                                  • Instruction Fuzzy Hash: 64028B32A24B94CAFB00CB65E84039D77B4FB89B98F505215EE8967B98DF78D1A0C741

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2604 12a222da8f0-12a222da977 call 12a222908d0 2607 12a222db02e-12a222db030 2604->2607 2608 12a222da97d-12a222da985 2604->2608 2609 12a222db032-12a222db036 2607->2609 2610 12a222db06c-12a222db082 call 12a22290100 2607->2610 2608->2609 2611 12a222da98b-12a222da9de call 12a223108f0 call 12a222e9550 2608->2611 2613 12a222db03e-12a222db06b call 12a2230df40 2609->2613 2618 12a222db083-12a222db088 call 12a222f1978 2610->2618 2623 12a222dae29-12a222dae65 call 12a222b6b90 call 12a222b6ab0 2611->2623 2624 12a222da9e4-12a222da9ec 2611->2624 2629 12a222db089-12a222db0bf call 12a2228db80 call 12a2228ed90 call 12a22311108 2618->2629 2640 12a222dae67-12a222dae78 call 12a222a7130 2623->2640 2641 12a222dae84-12a222daf12 call 12a222b6b90 call 12a222e96f0 2623->2641 2626 12a222da9ee 2624->2626 2627 12a222da9f1-12a222daa14 call 12a222e5720 call 12a222e5920 2624->2627 2626->2627 2643 12a222dab0a-12a222dab24 GetFileSize 2627->2643 2644 12a222daa1a-12a222daa30 2627->2644 2660 12a222db0c0-12a222db0c3 2629->2660 2652 12a222dae7d 2640->2652 2641->2629 2671 12a222daf18-12a222daf1c call 12a222b4200 2641->2671 2648 12a222dab26-12a222dab49 2643->2648 2649 12a222dab4b-12a222dab61 2643->2649 2650 12a222daa66-12a222dab05 call 12a222b39a0 call 12a2231c820 2644->2650 2651 12a222daa32-12a222daa46 2644->2651 2655 12a222dabb0-12a222dabf9 SetFilePointer call 12a22337190 2648->2655 2656 12a222dab93-12a222dabab call 12a222a7ab0 2649->2656 2657 12a222dab63-12a222dab91 call 12a223108f0 2649->2657 2650->2613 2658 12a222daa48-12a222daa5b 2651->2658 2659 12a222daa61 call 12a2230df60 2651->2659 2652->2641 2679 12a222dabff-12a222dac51 2655->2679 2680 12a222dad2b-12a222dad4f 2655->2680 2656->2655 2657->2655 2658->2618 2658->2659 2659->2650 2668 12a222db0c5-12a222db0cc 2660->2668 2669 12a222db0ce-12a222db0df 2660->2669 2674 12a222db0e3-12a222db115 call 12a2228db80 call 12a2228ed90 call 12a22311108 2668->2674 2669->2674 2682 12a222daf21-12a222daf24 2671->2682 2692 12a222dac87-12a222dad26 call 12a222b39a0 call 12a2231c820 2679->2692 2693 12a222dac53-12a222dac67 2679->2693 2690 12a222dad85-12a222dae24 call 12a222b39a0 call 12a2231c820 2680->2690 2691 12a222dad51-12a222dad65 2680->2691 2684 12a222daf26-12a222daf4d 2682->2684 2685 12a222daf53-12a222db02c call 12a222b39a0 call 12a2231c820 2682->2685 2684->2660 2684->2685 2685->2613 2690->2613 2700 12a222dad67-12a222dad7a 2691->2700 2701 12a222dad80 call 12a2230df60 2691->2701 2692->2613 2695 12a222dac69-12a222dac7c 2693->2695 2696 12a222dac82 call 12a2230df60 2693->2696 2695->2618 2695->2696 2696->2692 2700->2618 2700->2701 2701->2690
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$PointerReadSize
                                                  • String ID: exists$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 404940565-15404121
                                                  • Opcode ID: 8652130efd06543b05f548970cc15bfa8e2b8338d0320ff005fd526271369eb0
                                                  • Instruction ID: 25953491ec723ae8bfaee2def9e36333f186f2eb8bcbe5e7ef79f576d03352cc
                                                  • Opcode Fuzzy Hash: 8652130efd06543b05f548970cc15bfa8e2b8338d0320ff005fd526271369eb0
                                                  • Instruction Fuzzy Hash: 06321532210BC4CAEB20CF28D9907D977A1FB85748F808226DA9D57BA9EF75C664C741

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2716 12a222fefbc-12a222fefdd 2717 12a222fefdf-12a222feff2 call 12a222f5dfc call 12a222f5e1c 2716->2717 2718 12a222feff7-12a222feff9 2716->2718 2736 12a222ff3f3 2717->2736 2720 12a222ff3db-12a222ff3e8 call 12a222f5dfc call 12a222f5e1c 2718->2720 2721 12a222fefff-12a222ff006 2718->2721 2740 12a222ff3ee call 12a222f1958 2720->2740 2721->2720 2724 12a222ff00c-12a222ff040 2721->2724 2724->2720 2727 12a222ff046-12a222ff04d 2724->2727 2728 12a222ff04f-12a222ff062 call 12a222f5dfc call 12a222f5e1c 2727->2728 2729 12a222ff067-12a222ff06a 2727->2729 2728->2740 2733 12a222ff070-12a222ff072 2729->2733 2734 12a222ff3d7-12a222ff3d9 2729->2734 2733->2734 2739 12a222ff078-12a222ff07b 2733->2739 2738 12a222ff3f6-12a222ff405 2734->2738 2736->2738 2739->2728 2742 12a222ff07d-12a222ff0a1 2739->2742 2740->2736 2745 12a222ff0a3-12a222ff0a6 2742->2745 2746 12a222ff0d6-12a222ff0de 2742->2746 2749 12a222ff0ce-12a222ff0d4 2745->2749 2750 12a222ff0a8-12a222ff0b0 2745->2750 2747 12a222ff0e0-12a222ff10a call 12a222ff8ac call 12a222fcf0c * 2 2746->2747 2748 12a222ff0b2-12a222ff0c9 call 12a222f5dfc call 12a222f5e1c call 12a222f1958 2746->2748 2779 12a222ff10c-12a222ff122 call 12a222f5e1c call 12a222f5dfc 2747->2779 2780 12a222ff127-12a222ff151 call 12a222ff680 2747->2780 2777 12a222ff265 2748->2777 2751 12a222ff155-12a222ff166 2749->2751 2750->2748 2750->2749 2754 12a222ff16c-12a222ff174 2751->2754 2755 12a222ff1ed-12a222ff1f7 call 12a22308e00 2751->2755 2754->2755 2758 12a222ff176-12a222ff178 2754->2758 2766 12a222ff1fd-12a222ff213 2755->2766 2767 12a222ff283 2755->2767 2758->2755 2762 12a222ff17a-12a222ff198 2758->2762 2762->2755 2769 12a222ff19a-12a222ff1a6 2762->2769 2766->2767 2771 12a222ff215-12a222ff227 GetConsoleMode 2766->2771 2775 12a222ff288-12a222ff2a1 call 12a22337190 2767->2775 2769->2755 2773 12a222ff1a8-12a222ff1aa 2769->2773 2771->2767 2776 12a222ff229-12a222ff231 2771->2776 2773->2755 2778 12a222ff1ac-12a222ff1c4 2773->2778 2782 12a222ff2a7-12a222ff2a9 2775->2782 2776->2775 2784 12a222ff233-12a222ff256 ReadConsoleW 2776->2784 2785 12a222ff268-12a222ff272 call 12a222fcf0c 2777->2785 2778->2755 2786 12a222ff1c6-12a222ff1d2 2778->2786 2779->2777 2780->2751 2788 12a222ff2af-12a222ff2b7 2782->2788 2789 12a222ff3a1-12a222ff3aa call 12a22337168 2782->2789 2791 12a222ff277-12a222ff281 2784->2791 2792 12a222ff258 call 12a22337168 2784->2792 2785->2738 2786->2755 2794 12a222ff1d4-12a222ff1d6 2786->2794 2788->2789 2796 12a222ff2bd 2788->2796 2810 12a222ff3ac-12a222ff3c2 call 12a222f5e1c call 12a222f5dfc 2789->2810 2811 12a222ff3c7-12a222ff3ca 2789->2811 2801 12a222ff2c4-12a222ff2db 2791->2801 2804 12a222ff25e-12a222ff260 call 12a222f5d90 2792->2804 2794->2755 2800 12a222ff1d8-12a222ff1e8 2794->2800 2796->2801 2800->2755 2801->2785 2803 12a222ff2dd-12a222ff2e8 2801->2803 2807 12a222ff2ea-12a222ff303 call 12a222febcc 2803->2807 2808 12a222ff30f-12a222ff317 2803->2808 2804->2777 2818 12a222ff308-12a222ff30a 2807->2818 2814 12a222ff38f-12a222ff39c call 12a222fe9f4 2808->2814 2815 12a222ff319-12a222ff32b 2808->2815 2810->2777 2811->2804 2812 12a222ff3d0-12a222ff3d2 2811->2812 2812->2785 2814->2818 2819 12a222ff32d 2815->2819 2820 12a222ff382-12a222ff38a 2815->2820 2818->2785 2823 12a222ff333-12a222ff33a 2819->2823 2820->2785 2825 12a222ff33c-12a222ff340 2823->2825 2826 12a222ff377-12a222ff37c 2823->2826 2828 12a222ff35d 2825->2828 2829 12a222ff342-12a222ff349 2825->2829 2826->2820 2830 12a222ff363-12a222ff373 2828->2830 2829->2828 2831 12a222ff34b-12a222ff34f 2829->2831 2830->2823 2832 12a222ff375 2830->2832 2831->2828 2833 12a222ff351-12a222ff35b 2831->2833 2832->2820 2833->2830
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 6d25242549210a63874b3e96cc79b7b8578da90fd26c010f8beb87c2b24ef639
                                                  • Instruction ID: 94c44b61eece0db235a3f2cab0317a8c14b60f7d1d8266a460c6b80d69b3323e
                                                  • Opcode Fuzzy Hash: 6d25242549210a63874b3e96cc79b7b8578da90fd26c010f8beb87c2b24ef639
                                                  • Instruction Fuzzy Hash: 7DC1BE32208689D7E7619B15D4443EEB7A0FF81B94FD90205EA4A077E5DFBAC874CB42
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID: Eastern Standard Time$Eastern Summer Time
                                                  • API String ID: 3458911817-239921721
                                                  • Opcode ID: 50dad400a73da4412d17c3e8f11a4ce80100cfd78b71fab77d5edecb707deabd
                                                  • Instruction ID: 5c05581b2d9a1391d36562716ced64bbf738d7fbf1f4fd612284e23b270a4970
                                                  • Opcode Fuzzy Hash: 50dad400a73da4412d17c3e8f11a4ce80100cfd78b71fab77d5edecb707deabd
                                                  • Instruction Fuzzy Hash: 51519132600640C7E720DF36EB807E9B761FF48784FC05166EA4943BA6DB78C561CB92
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstNext
                                                  • String ID: content$exists$filename
                                                  • API String ID: 1690352074-1949714836
                                                  • Opcode ID: 7f83578d0ba7e7100aa6dc0130177d254dbd3165f29da129d5a945093790c849
                                                  • Instruction ID: 15d60ea758b1c131a5c778b41ee5c47649d9467f88aedb4146b544b173c3e0c7
                                                  • Opcode Fuzzy Hash: 7f83578d0ba7e7100aa6dc0130177d254dbd3165f29da129d5a945093790c849
                                                  • Instruction Fuzzy Hash: 3762B272258BC0D2EB20DF24E5843DEB361FB89794FD05615EA9C43AA9DF39C5A0CB01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1405656091-0
                                                  • Opcode ID: c344a62bfee50d7b7fbbc143855967662656a4f3c5d66f4e064aeb2ebf8cc7c4
                                                  • Instruction ID: 51de6a6297417df77cca83b21a819074902326d784c12ab81fcf6c8c5ad1cb42
                                                  • Opcode Fuzzy Hash: c344a62bfee50d7b7fbbc143855967662656a4f3c5d66f4e064aeb2ebf8cc7c4
                                                  • Instruction Fuzzy Hash: 0F81FAB3700345CBEB688F25C9413EDB3A5EB54B88F849125EA098B799FB39D561CF01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 2453523683-494360628
                                                  • Opcode ID: ce9996d02ce806c0521b0410ab71ad6ae1a65e1f6731ee89ff774000a8b068c9
                                                  • Instruction ID: e2bed97a62c0b2294f4f92a0c9e494728550745c7590e937b98bcb36ef105676
                                                  • Opcode Fuzzy Hash: ce9996d02ce806c0521b0410ab71ad6ae1a65e1f6731ee89ff774000a8b068c9
                                                  • Instruction Fuzzy Hash: A402AD72624BC4C6FB00CB78D4803DDA7A5FB867A4F905301FA9D12AEADF69D1A5C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID: [PID:
                                                  • API String ID: 420147892-2210602247
                                                  • Opcode ID: 056f2a4151be0f4e82cac594c76125a87521ccb099f5dcd248b582c8fc8f1d20
                                                  • Instruction ID: 04f566d3c893766aeb9da326456a5b7ec4a133b64553a6c4ff6c0a5beefa8155
                                                  • Opcode Fuzzy Hash: 056f2a4151be0f4e82cac594c76125a87521ccb099f5dcd248b582c8fc8f1d20
                                                  • Instruction Fuzzy Hash: D0E1B272614BC0C6EB25CF25E9903DDB7A5FB897A8F904215EA9D07B99DF38C290C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Section$View$CreateUnmap
                                                  • String ID: @
                                                  • API String ID: 3892452295-2766056989
                                                  • Opcode ID: cff147bf67fabab3ad981c1573a0e41cdafc437f2ea82112878411de19518375
                                                  • Instruction ID: c7e9f25570a18bcee4d431b1e4b29dfb582a71f3c3f73ca5b85fc824a801cd66
                                                  • Opcode Fuzzy Hash: cff147bf67fabab3ad981c1573a0e41cdafc437f2ea82112878411de19518375
                                                  • Instruction Fuzzy Hash: 4461807260AB41CAEB50DF61E8902A977E4FB48788F810635DE4D53B68DF3AD154C760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                                  • String ID:
                                                  • API String ID: 3038321057-0
                                                  • Opcode ID: fbf7b0cc3bc22610d5552f091d41485e4fe28e08ce852d67ae269c7227012baa
                                                  • Instruction ID: 4b5b5a84952ffe7b23fd28d1a8ac2c2df77f0d7baf549bbc41e56ea9425b0c02
                                                  • Opcode Fuzzy Hash: fbf7b0cc3bc22610d5552f091d41485e4fe28e08ce852d67ae269c7227012baa
                                                  • Instruction Fuzzy Hash: A5215132218B84C3E720CF22F5402DAB3A4FB88B90F955125EBCA57B58DF7DD5518B40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: cannot use push_back() with $directory_iterator::directory_iterator$exists$prefs.js$status
                                                  • API String ID: 0-2713369562
                                                  • Opcode ID: 1d6bba3b50d441fb4bdf3a69060370037fcd60f4954262f8879855b9889ef394
                                                  • Instruction ID: 9b6fe6fc74e6fa951d28115d0fef6309be755b0c9801e16fb71c7bb05ed9f64e
                                                  • Opcode Fuzzy Hash: 1d6bba3b50d441fb4bdf3a69060370037fcd60f4954262f8879855b9889ef394
                                                  • Instruction Fuzzy Hash: 8B527B32619BC4C6EB719B14E8813DAB3A4FBC9780F904625DACC53B69EF79C164CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: recv$Cleanupclosesocket
                                                  • String ID:
                                                  • API String ID: 146070474-0
                                                  • Opcode ID: 63df05e03726391c15bd1c825f2cae3a5063d2c053fa10481967e31f21d6abc3
                                                  • Instruction ID: 68ea36c56bea2b90d5dbe9f15381f6d84ddad22ab7093c770c2e36c57e4cef42
                                                  • Opcode Fuzzy Hash: 63df05e03726391c15bd1c825f2cae3a5063d2c053fa10481967e31f21d6abc3
                                                  • Instruction Fuzzy Hash: A912D472618BC4C2FB208B29E5443DEA765FBC9790FD05601EA9C13AEADF79C195CB01
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cred$EnumerateFree
                                                  • String ID: cannot use push_back() with
                                                  • API String ID: 3403564193-4122110429
                                                  • Opcode ID: aaf3abb4d69eaebfd4e29ed56c1d1a173ba05c9775e8997a0052f56f092d3c84
                                                  • Instruction ID: 980225d4590520249392a41c28b32027f6ab40dc41bc5101ae4d2bde638c3a1c
                                                  • Opcode Fuzzy Hash: aaf3abb4d69eaebfd4e29ed56c1d1a173ba05c9775e8997a0052f56f092d3c84
                                                  • Instruction Fuzzy Hash: 41626C72604BC4CAEB209F65E8803DD77A1FB89798F905315EAAC07B99DF79C294C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: __std_exception_copy_invalid_parameter_noinfo_noreturn
                                                  • String ID: 1.3.1.zlib-ng
                                                  • API String ID: 1109970293-992988628
                                                  • Opcode ID: 1b3990169c6edc83ac0ae0c85f07acfaa4477e0da266bc5dde884a8e722b1ebf
                                                  • Instruction ID: a73638f0acb8b7ddf5dcd7b24679d18432d46430aef3f92947949d3820b8889a
                                                  • Opcode Fuzzy Hash: 1b3990169c6edc83ac0ae0c85f07acfaa4477e0da266bc5dde884a8e722b1ebf
                                                  • Instruction Fuzzy Hash: FF81B662F16B8199EB50EF72D4802ED73A1FB84748F815232EA4C57BB9EE38E554C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationTimeZone
                                                  • String ID: [UTC
                                                  • API String ID: 565725191-1715286942
                                                  • Opcode ID: cbcfeccc56f0404e1d7aa4c25a4bf5f24f5c1e198b83cc6711815d20937e9379
                                                  • Instruction ID: 7a5da71b61903a6b1bd6409a1b02b470bdbc1c080cdc08825d9dc0173ce84b20
                                                  • Opcode Fuzzy Hash: cbcfeccc56f0404e1d7aa4c25a4bf5f24f5c1e198b83cc6711815d20937e9379
                                                  • Instruction Fuzzy Hash: DE910832629FC48AD7A18F29E88169EB3B4F798784F506219FECD57B18EB74C154C740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AddressAdjustErrorHandleHardModulePrivilegeProcRaise
                                                  • String ID:
                                                  • API String ID: 2798384791-0
                                                  • Opcode ID: ceea57dc161494e54f7f068002607a0d3dec399256df02af62d747f42aa3fe15
                                                  • Instruction ID: acdb46881f77427d32e59d1ad9a20a42d5d2f3ee8341fb8fb8c147b273c4844a
                                                  • Opcode Fuzzy Hash: ceea57dc161494e54f7f068002607a0d3dec399256df02af62d747f42aa3fe15
                                                  • Instruction Fuzzy Hash: AC51362162A98695E750FF22D8D17EDA321FF94344FC21432E10D865B9EE7DD709C710
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalUnprotect
                                                  • String ID:
                                                  • API String ID: 1561624719-0
                                                  • Opcode ID: 1f152763ec19e619bfc368bf77117f477a0b79e9407e037414c49aea0ab6e5f4
                                                  • Instruction ID: aac5be5ee5ef5c1843de3bfaae8e7cf8c8f980a5b1ec564a04f72c7f931f5abe
                                                  • Opcode Fuzzy Hash: 1f152763ec19e619bfc368bf77117f477a0b79e9407e037414c49aea0ab6e5f4
                                                  • Instruction Fuzzy Hash: 54415733614B80CAE3208F74E5403ED77A4FB5878CF444629EB8916E8ADB79C6A4C754
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DriveLogicalStrings
                                                  • String ID:
                                                  • API String ID: 2022863570-0
                                                  • Opcode ID: 6505a69286372a5ab8e33a0820798ad6f93d0af771eb6d079aa7cc5a7919cd7b
                                                  • Instruction ID: 588f750af3a9c75ab42cb2f07dd1070a3dcf156b984b6fcbed0133f89dcd9e2a
                                                  • Opcode Fuzzy Hash: 6505a69286372a5ab8e33a0820798ad6f93d0af771eb6d079aa7cc5a7919cd7b
                                                  • Instruction Fuzzy Hash: 51719032A18B84C2E710CF24E88039EB7B5FB94798F505305EB9813AA9DF79E1E1D741
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: 974e4f322e43ef909849fbc456c3f4976db81938fc0d4d45dcd05a562f6cf0af
                                                  • Instruction ID: 5defabe655bdc206f3396883f7607ce368ced4639667c1c4d9dfadc64730075b
                                                  • Opcode Fuzzy Hash: 974e4f322e43ef909849fbc456c3f4976db81938fc0d4d45dcd05a562f6cf0af
                                                  • Instruction Fuzzy Hash: 2D018432218780C3E720CF25E9403DAB3A4FB98788F840125E68D42A59DFBDC1A4CB41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: cores
                                                  • API String ID: 0-2370456839
                                                  • Opcode ID: e88b2472b0c57332bfaaeb7ce4e37d2262cc194edfaa7cfbbdc60ecf2a80a8d1
                                                  • Instruction ID: 58580f109fcdb2b2853c741e5a48684b2e1bdab7cc13f820996441964c3d908d
                                                  • Opcode Fuzzy Hash: e88b2472b0c57332bfaaeb7ce4e37d2262cc194edfaa7cfbbdc60ecf2a80a8d1
                                                  • Instruction Fuzzy Hash: CBB1B072F10B848BFB00CBB8C4413DC7772EB95798FA05315EE5927A9ADBB491A5C380
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \u%04x
                                                  • API String ID: 0-2916071157
                                                  • Opcode ID: a77369d2fed5f591b56bbed92216145abb483a752ea1b525985359735ec1b52a
                                                  • Instruction ID: 82e0d91bf5b7c9f47d29fc088c06d1a9b2332402670073d706ed3d9df79dc668
                                                  • Opcode Fuzzy Hash: a77369d2fed5f591b56bbed92216145abb483a752ea1b525985359735ec1b52a
                                                  • Instruction Fuzzy Hash: 85810D32604A84C2FB24CB29D5947EDA765FB85B80FC48022DF4E17BA1DF3AD565D302
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ":
                                                  • API String ID: 0-3662656813
                                                  • Opcode ID: 8780d4b3705763dbab8654373f79912a9912a420cb17ae45beabce1fe27159eb
                                                  • Instruction ID: 143a9c695552ed5c59d7a14946f1291d0390afd6c0cf18975ce6e3bd6d44e50a
                                                  • Opcode Fuzzy Hash: 8780d4b3705763dbab8654373f79912a9912a420cb17ae45beabce1fe27159eb
                                                  • Instruction Fuzzy Hash: 04911476204A45C2EB20DF26D19469DA761FB89FC8F859002DF8E07B64CF3AC169D702
                                                  Strings
                                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 0000012A222A4479
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                                  • API String ID: 0-1713319389
                                                  • Opcode ID: 4091bbf8c5fdb6ace85941fe286125e043e6b1916b0a3ae4a93e98e2058045e7
                                                  • Instruction ID: 299d222f16579c73626bc6c636c53a764276abe7b65cf587d60f991630132dbd
                                                  • Opcode Fuzzy Hash: 4091bbf8c5fdb6ace85941fe286125e043e6b1916b0a3ae4a93e98e2058045e7
                                                  • Instruction Fuzzy Hash: 4641B5735196E08AD706CB3984113BDBFB1D366B88F5CC152DBD487B4AD62DC216C711
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf2d2a2498fac0e677833bd73f0523b636586b84c3ae837d9d29cc0f69bcd838
                                                  • Instruction ID: 0ce99a9b19b5de74641756c1f98ffc1695ac4a94fb2e3e5cc0fd86e77a4d7a6c
                                                  • Opcode Fuzzy Hash: bf2d2a2498fac0e677833bd73f0523b636586b84c3ae837d9d29cc0f69bcd838
                                                  • Instruction Fuzzy Hash: FB724C72614BC48AEB70CF29E8413DDB3A5F789798F904315EA9C56B99EF38C294C740
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 997d7e9e3a15c337bd95107d19d059e3dc99556fb15464e2b0a9eb7a83a3403b
                                                  • Instruction ID: 325e42e13ba11e464731fdc1b59fcf75670e76bb150c497ec8e96519085ba2b0
                                                  • Opcode Fuzzy Hash: 997d7e9e3a15c337bd95107d19d059e3dc99556fb15464e2b0a9eb7a83a3403b
                                                  • Instruction Fuzzy Hash: 33F15072A14F888AEB208B69E44139DB7B4F78D7A8F505315EEDC57B99EB78C190C700
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 01d53682921f948a3754c58c32b249c4381a35c6db4954a5339c3c6bdf7cacc5
                                                  • Instruction ID: fc43bbd337b1f1aad28e90709a1c61c08ffefb463ce632b6a8d1116fe9da63da
                                                  • Opcode Fuzzy Hash: 01d53682921f948a3754c58c32b249c4381a35c6db4954a5339c3c6bdf7cacc5
                                                  • Instruction Fuzzy Hash: E1F15032615F888AEB208B69E44139DB7B4F78C7A8F505315EEDC57B99EB78C190C700

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1278 12a222da4d0-12a222da50b call 12a222da250 1281 12a222da50d-12a222da51c EnterCriticalSection 1278->1281 1282 12a222da54c 1278->1282 1284 12a222da51e-12a222da540 GdiplusStartup 1281->1284 1285 12a222da570-12a222da58a LeaveCriticalSection GdipGetImageEncodersSize 1281->1285 1283 12a222da551-12a222da56f call 12a2230df40 1282->1283 1284->1285 1286 12a222da542-12a222da546 LeaveCriticalSection 1284->1286 1285->1282 1288 12a222da58c-12a222da59f 1285->1288 1286->1282 1290 12a222da5a1-12a222da5aa call 12a222d9fe0 1288->1290 1291 12a222da5db-12a222da5e9 call 12a222f83ac 1288->1291 1298 12a222da5d8 1290->1298 1299 12a222da5ac-12a222da5b6 1290->1299 1296 12a222da5f0-12a222da5fa 1291->1296 1297 12a222da5eb-12a222da5ee 1291->1297 1300 12a222da5fe-12a222da601 1296->1300 1297->1300 1298->1291 1301 12a222da5b8 1299->1301 1302 12a222da5c2-12a222da5d6 call 12a2230ef30 1299->1302 1303 12a222da603-12a222da608 1300->1303 1304 12a222da60d-12a222da61e GdipGetImageEncoders 1300->1304 1301->1302 1302->1300 1306 12a222da778-12a222da77b 1303->1306 1307 12a222da763-12a222da768 1304->1307 1308 12a222da624-12a222da62d 1304->1308 1312 12a222da794-12a222da796 1306->1312 1313 12a222da77d 1306->1313 1307->1306 1310 12a222da65f 1308->1310 1311 12a222da62f-12a222da63d 1308->1311 1316 12a222da666-12a222da676 1310->1316 1314 12a222da640-12a222da64b 1311->1314 1312->1283 1315 12a222da780-12a222da792 call 12a222f0d60 1313->1315 1317 12a222da658-12a222da65d 1314->1317 1318 12a222da64d-12a222da652 1314->1318 1315->1312 1320 12a222da689-12a222da6a5 1316->1320 1321 12a222da678-12a222da683 1316->1321 1317->1310 1317->1314 1318->1317 1324 12a222da707-12a222da70b 1318->1324 1322 12a222da6a7-12a222da700 GdipCreateBitmapFromScan0 GdipSaveImageToStream 1320->1322 1323 12a222da712-12a222da751 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 1320->1323 1321->1307 1321->1320 1326 12a222da702-12a222da705 1322->1326 1327 12a222da710 1322->1327 1328 12a222da753 1323->1328 1329 12a222da76a-12a222da777 GdipDisposeImage 1323->1329 1324->1316 1330 12a222da756-12a222da75d GdipDisposeImage 1326->1330 1327->1329 1328->1330 1329->1306 1330->1307
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                                                  • String ID: &
                                                  • API String ID: 1703174404-3042966939
                                                  • Opcode ID: 8835fc14b8c0fd5262807f6dd3a58a869a1510dc22799758eb5ac62de40f1462
                                                  • Instruction ID: b81d59bffc04082733730acdfbdaabfafd15833549c81566589fd2558f7fb7b1
                                                  • Opcode Fuzzy Hash: 8835fc14b8c0fd5262807f6dd3a58a869a1510dc22799758eb5ac62de40f1462
                                                  • Instruction Fuzzy Hash: 9C91A432200B84CBEB20CF35D950BDC77A4FB54B98F959215EA0947B98DF39C5A5C381

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2091 12a222db650-12a222db776 call 12a222e12f0 call 12a222b4650 call 12a22292280 call 12a222a0f20 call 12a22292280 call 12a222a0f20 call 12a222a3140 WSAStartup 2106 12a222db8ef 2091->2106 2107 12a222db77c-12a222db79c socket 2091->2107 2108 12a222db8f1-12a222db8f9 2106->2108 2109 12a222db8e9 WSACleanup 2107->2109 2110 12a222db7a2-12a222db7cf htons 2107->2110 2111 12a222db8fb-12a222db90c 2108->2111 2112 12a222db92c-12a222db96c call 12a2230df40 2108->2112 2109->2106 2113 12a222db7d5-12a222db7dd 2110->2113 2114 12a222db990-12a222db9c4 call 12a222da7a0 call 12a222a1c80 2110->2114 2118 12a222db927 call 12a2230df60 2111->2118 2119 12a222db90e-12a222db921 2111->2119 2115 12a222db7e8-12a222db7f6 2113->2115 2116 12a222db7df-12a222db7e6 2113->2116 2140 12a222db9c6-12a222db9dc 2114->2140 2141 12a222db9fc-12a222dba19 call 12a222da7a0 2114->2141 2122 12a222db7f8 2115->2122 2123 12a222db7fb-12a222db7fe 2115->2123 2116->2122 2118->2112 2119->2118 2125 12a222dba99-12a222dba9e call 12a222f1978 2119->2125 2122->2123 2127 12a222db814-12a222db81c 2123->2127 2128 12a222db800-12a222db80a call 12a222f8980 2123->2128 2136 12a222dba9f-12a222dbaa4 call 12a222f1978 2125->2136 2132 12a222db826-12a222db82c 2127->2132 2133 12a222db81e-12a222db824 2127->2133 2128->2127 2144 12a222db80c-12a222db812 2128->2144 2138 12a222db82e-12a222db845 2132->2138 2139 12a222db847-12a222db865 2132->2139 2133->2138 2145 12a222db867 2138->2145 2139->2145 2146 12a222db86a-12a222db897 call 12a22310240 call 12a222ecbd0 2139->2146 2147 12a222db9f7 call 12a2230df60 2140->2147 2148 12a222db9de-12a222db9f1 2140->2148 2150 12a222dba1e-12a222dba46 call 12a222a1c80 2141->2150 2144->2127 2144->2128 2145->2146 2160 12a222db899 2146->2160 2161 12a222db89c-12a222db8c9 inet_pton connect 2146->2161 2147->2141 2148->2136 2148->2147 2158 12a222dba48-12a222dba5e 2150->2158 2159 12a222dba7a-12a222dba8e 2150->2159 2162 12a222dba75 call 12a2230df60 2158->2162 2163 12a222dba60-12a222dba73 2158->2163 2159->2108 2160->2161 2164 12a222db8cf-12a222db8d6 2161->2164 2165 12a222db96d-12a222db977 2161->2165 2162->2159 2163->2162 2166 12a222dba93-12a222dba98 call 12a222f1978 2163->2166 2164->2113 2169 12a222db8dc-12a222db8e3 closesocket 2164->2169 2165->2114 2168 12a222db979-12a222db982 2165->2168 2166->2125 2171 12a222db987-12a222db98f call 12a222a36e0 2168->2171 2172 12a222db984 2168->2172 2169->2109 2171->2114 2172->2171
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info$CleanupStartupUserclosesocketconnecthtonsinet_ptonsocket
                                                  • String ID: geo$system
                                                  • API String ID: 213021568-2364779556
                                                  • Opcode ID: 9d9450ace9319d5de9fa58b6aa4a63dd30cedaeb8901d28fd54cab01527caeae
                                                  • Instruction ID: cb95994edf0d37dd489d79e9c6762509691e1f5cc2a98a37afeeced5b27c21be
                                                  • Opcode Fuzzy Hash: 9d9450ace9319d5de9fa58b6aa4a63dd30cedaeb8901d28fd54cab01527caeae
                                                  • Instruction Fuzzy Hash: F4C1CB72B10B84C6FB108F69D5543DCB372EB49BA4FC05212DA6927BE9DE39C5A6C301

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2531 12a223236a8-12a2232371b call 12a22323288 2534 12a2232371d-12a22323726 call 12a222f5dfc 2531->2534 2535 12a22323735-12a2232373f call 12a22304ac8 2531->2535 2540 12a22323729-12a22323730 call 12a222f5e1c 2534->2540 2541 12a2232375a-12a223237c3 CreateFileW 2535->2541 2542 12a22323741-12a22323758 call 12a222f5dfc call 12a222f5e1c 2535->2542 2557 12a22323a77-12a22323a97 2540->2557 2545 12a22323840-12a2232384b GetFileType 2541->2545 2546 12a223237c5-12a223237cb 2541->2546 2542->2540 2548 12a2232384d-12a22323888 call 12a22337168 call 12a222f5d90 call 12a22337140 2545->2548 2549 12a2232389e-12a223238a5 2545->2549 2551 12a2232380d-12a2232383b call 12a22337168 call 12a222f5d90 2546->2551 2552 12a223237cd-12a223237d1 2546->2552 2548->2540 2579 12a2232388e-12a22323899 call 12a222f5e1c 2548->2579 2554 12a223238ad-12a223238b0 2549->2554 2555 12a223238a7-12a223238ab 2549->2555 2551->2540 2552->2551 2553 12a223237d3-12a2232380b CreateFileW 2552->2553 2553->2545 2553->2551 2560 12a223238b6-12a2232390b call 12a223049e0 2554->2560 2562 12a223238b2 2554->2562 2555->2560 2571 12a2232390d-12a22323919 call 12a22323494 2560->2571 2572 12a2232392a-12a2232395b call 12a22323010 2560->2572 2562->2560 2571->2572 2582 12a2232391b 2571->2582 2580 12a2232395d-12a2232395f 2572->2580 2581 12a22323961-12a223239a4 2572->2581 2579->2540 2585 12a2232391d-12a22323925 call 12a222fd084 2580->2585 2586 12a223239c6-12a223239d1 2581->2586 2587 12a223239a6-12a223239aa 2581->2587 2582->2585 2585->2557 2589 12a22323a75 2586->2589 2590 12a223239d7-12a223239db 2586->2590 2587->2586 2588 12a223239ac-12a223239c1 2587->2588 2588->2586 2589->2557 2590->2589 2592 12a223239e1-12a22323a26 call 12a22337140 CreateFileW 2590->2592 2596 12a22323a5b-12a22323a70 2592->2596 2597 12a22323a28-12a22323a56 call 12a22337168 call 12a222f5d90 call 12a22304c08 2592->2597 2596->2589 2597->2596
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                                                  • String ID:
                                                  • API String ID: 1330151763-0
                                                  • Opcode ID: 490799599c57ad564ab0fcf16f8555b356a9328dbb73e8c96f5ba99975714cec
                                                  • Instruction ID: 12d9b4842f5907216585b5ce32763695cb59e1c04236112b2ad8725371c461f7
                                                  • Opcode Fuzzy Hash: 490799599c57ad564ab0fcf16f8555b356a9328dbb73e8c96f5ba99975714cec
                                                  • Instruction Fuzzy Hash: B1C1DC37724A40C6EB20CFA8D5902EC3771FB49BA8F815355DE2A9B794CB38C566C341

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AddressAlloc2CurrentInfoLibraryLoadProcProcessSystemVirtual
                                                  • String ID: VirtualAlloc2$kernelbase.dll
                                                  • API String ID: 3240720159-1188699709
                                                  • Opcode ID: 135b3590b98399b5718114b168c3f2947e099dc2b06234d8dc59709f703b486a
                                                  • Instruction ID: 1142fc076e6b36a6bc290e747a31d943c66be463bb9404a69f3a928a09894cb6
                                                  • Opcode Fuzzy Hash: 135b3590b98399b5718114b168c3f2947e099dc2b06234d8dc59709f703b486a
                                                  • Instruction Fuzzy Hash: 27212822A09B8182EB10CF16F484369B7A0FB99B80F954235EB8D43B64DF7DD595CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: Failed to get address of HeapAlloc.$HeapAlloc$HeapAlloc offset (relative to kernel32.dll): 0x$kernel32.dll
                                                  • API String ID: 1646373207-1114591187
                                                  • Opcode ID: 6d5182da63a6ef1320b777ed2abb5481cd8ef6387fd2fe5c03388905ac86d248
                                                  • Instruction ID: 2d0b67804035e602e4b0e45ba69e165ee4d19a0dd4f894f752fa599e06b16311
                                                  • Opcode Fuzzy Hash: 6d5182da63a6ef1320b777ed2abb5481cd8ef6387fd2fe5c03388905ac86d248
                                                  • Instruction Fuzzy Hash: 6E31A321A0AA4290EA10FF13E8D51F9A361BF947C4FC25432E90E477BADE3EE505C360
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: *$/$2$?$ange
                                                  • API String ID: 3668304517-891152793
                                                  • Opcode ID: 7833f418a5f044f9cf3d01c58cc070a8254b89cc81cd3f6a52e4e638c0e16de4
                                                  • Instruction ID: 44789ddace4fb38b8a9d8a817ddf75cc934607e16a99bb171a787726bc6b7436
                                                  • Opcode Fuzzy Hash: 7833f418a5f044f9cf3d01c58cc070a8254b89cc81cd3f6a52e4e638c0e16de4
                                                  • Instruction Fuzzy Hash: 11110673B1678692EE44BF56E49136CA2A0AB48BC4F588536DB8C0BB65DF2CD4908300
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                                  • String ID:
                                                  • API String ID: 4268643673-0
                                                  • Opcode ID: 9312ee92e43017e15c80159da1815fefed654e82bb603727025027d9faa898aa
                                                  • Instruction ID: 9c9913ac63fe819141e3e845952e31d2f23d20f47d6618a4e87efacba15de416
                                                  • Opcode Fuzzy Hash: 9312ee92e43017e15c80159da1815fefed654e82bb603727025027d9faa898aa
                                                  • Instruction Fuzzy Hash: AD118C32111B40C2EB608F25E8402887374FB48FA4FA88215EA6E476A4CF39C9A7C381
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Process$MemoryRead$CurrentErrorLastQueryVirtual
                                                  • String ID:
                                                  • API String ID: 2584129402-0
                                                  • Opcode ID: 709e32109f8befe5390051b0e604ec33ee2c8b657ed6020e9be8583112b791ac
                                                  • Instruction ID: 05951db75f89468e47ac999caa6dd0ac1d9c6774b2834cf4272d6dda9da23e16
                                                  • Opcode Fuzzy Hash: 709e32109f8befe5390051b0e604ec33ee2c8b657ed6020e9be8583112b791ac
                                                  • Instruction Fuzzy Hash: 3C212835A09B4182EB60AF12E88476AA3A5FB55FC0F894531EA5C43B74CF3ED552C621
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo_noreturn
                                                  • String ID: -> $]:
                                                  • API String ID: 3668304517-2558318465
                                                  • Opcode ID: c0c6e1fc448afd9c2289b3938244600ddd4260ac214fbdc89c71152151cfc35b
                                                  • Instruction ID: 8667cb9784b854678414f81bd0e025d99d890d998e4721e11026e71e8c5e6a61
                                                  • Opcode Fuzzy Hash: c0c6e1fc448afd9c2289b3938244600ddd4260ac214fbdc89c71152151cfc35b
                                                  • Instruction Fuzzy Hash: 4291BD7260AA8585EF40EF2AD0C03ADA761FB84B84F919532EA5E477B9DF39D481C350
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AddressCreateFreeHandleModuleProcStringUnicodeVirtual
                                                  • String ID: BSJB$amsi.dll
                                                  • API String ID: 1968330574-2235497149
                                                  • Opcode ID: 9b5676883d8a9942b5cd96bf72043d3b837f298f51a0c570be86945f3d351979
                                                  • Instruction ID: 6ed42b51044465ca550fd359d9989438024c82c2c2cd9a4e64534d3fea08c745
                                                  • Opcode Fuzzy Hash: 9b5676883d8a9942b5cd96bf72043d3b837f298f51a0c570be86945f3d351979
                                                  • Instruction Fuzzy Hash: A031A261B0BA4785FE90AF02E48023DE3A1EF85B81F8A4431CA0D0777CDE7EE5418320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID: *$/
                                                  • API String ID: 73155330-2426586843
                                                  • Opcode ID: 5757b1e5df8bb840e9e5f55dd987a1bb8213efa484ea007226ec6a1f8d228222
                                                  • Instruction ID: c9401f3066bca1818029e56735a13f6c439d1fb8b1c086cccf5f6031002db13b
                                                  • Opcode Fuzzy Hash: 5757b1e5df8bb840e9e5f55dd987a1bb8213efa484ea007226ec6a1f8d228222
                                                  • Instruction Fuzzy Hash: 42E06D42F0734745ED5CBA9A80DA77881A09F857A0ED10B32E23C077FAEE1D64814351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Cpp_errorThrow_std::_$Mtx_unlock_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 3824905759-0
                                                  • Opcode ID: 85c23642dd593b1c173b42692d77ae3c0872ba970f94a2eaa9afa85847818624
                                                  • Instruction ID: 0cc015134c87c56ed98dc1fbc0eef5b4df8924baee396ad9db8947abdd7749d9
                                                  • Opcode Fuzzy Hash: 85c23642dd593b1c173b42692d77ae3c0872ba970f94a2eaa9afa85847818624
                                                  • Instruction Fuzzy Hash: 9751F832609741C2EB25AF27D48016DA391EB8AFA4F594532DA4E877B5CE2DD841CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID: nop
                                                  • API String ID: 73155330-258488684
                                                  • Opcode ID: 57ea590dd3f509f37e8be66ab5de10c067b1786fa4ac7f8625bc5c7994107ae5
                                                  • Instruction ID: 80909b097bcdaece633da41e871e46d219a4dc7c4ddb2b1825b4be70e909443c
                                                  • Opcode Fuzzy Hash: 57ea590dd3f509f37e8be66ab5de10c067b1786fa4ac7f8625bc5c7994107ae5
                                                  • Instruction Fuzzy Hash: F231D462B1B78680E954EF16E08427DF255EB44BE0F950632DA6D43BF9DF3DE4918320
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: String
                                                  • String ID: LCMapStringEx
                                                  • API String ID: 2568140703-3893581201
                                                  • Opcode ID: 21bec28f4c4cf7e498effb9ef9ad3ab1c5fa99225fccc5c96c3468d83e1adf15
                                                  • Instruction ID: bc894477157bb40ad65f048406aa5c33905d20214b0f55ffeda1db7eebd16ca2
                                                  • Opcode Fuzzy Hash: 21bec28f4c4cf7e498effb9ef9ad3ab1c5fa99225fccc5c96c3468d83e1adf15
                                                  • Instruction Fuzzy Hash: 7B212C36609B8186D764DF16B4802AAB7A5FB89BC0F944136EE8D43B69DF3CD4548B40
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 3702945584-1787575317
                                                  • Opcode ID: adf216c2d1b5f5292331595630b64b33fa050b190fc1c5e17533aec2785cb7d3
                                                  • Instruction ID: 276d3dd783a69d35d070b003d4938b29940207b5424c77f7f0ad4cc322c054a0
                                                  • Opcode Fuzzy Hash: adf216c2d1b5f5292331595630b64b33fa050b190fc1c5e17533aec2785cb7d3
                                                  • Instruction Fuzzy Hash: 07116032608B84C3EB208F25F5413DAB3A4FB89788F905215EB9807B58DFBDD165CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Cleanupclosesocketrecv
                                                  • String ID:
                                                  • API String ID: 3447645871-0
                                                  • Opcode ID: bd7be30a7f1799e68acf7d0b86d7fb193574b9ebb99d8fe27394200c1a9bf58a
                                                  • Instruction ID: 05916d8054f2e5455474afacaea063e2b1676bfe1d354583f3ecaa5795b6f1b3
                                                  • Opcode Fuzzy Hash: bd7be30a7f1799e68acf7d0b86d7fb193574b9ebb99d8fe27394200c1a9bf58a
                                                  • Instruction Fuzzy Hash: 8491A273614BC4C2FB208B28E5443DEA321FB99BA0F905305EAAC13ADADF79D195C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID:
                                                  • API String ID: 1332880857-0
                                                  • Opcode ID: 8b0f990bc395fd6dc660a203d8fa75fcc4052e589b1305530a692d2154eadef8
                                                  • Instruction ID: b7b2a6947d2a5ad6582d654104c7e8cb603aaede7fc2faf362ca52186d13bb9f
                                                  • Opcode Fuzzy Hash: 8b0f990bc395fd6dc660a203d8fa75fcc4052e589b1305530a692d2154eadef8
                                                  • Instruction Fuzzy Hash: 3771B072604B84C6FB208B65E4443DDB761FB857A8FA05305EBA903AE9DF79D0E0D701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumOpen
                                                  • String ID:
                                                  • API String ID: 3231578192-0
                                                  • Opcode ID: c7e0896dc62b5111255344d6421dc052eacbf7dc8729ac6d9f67dcb814477fac
                                                  • Instruction ID: 688aafddb5dc81c328462b7afd209d8d8fd38caacf78c95f113333f7cd549258
                                                  • Opcode Fuzzy Hash: c7e0896dc62b5111255344d6421dc052eacbf7dc8729ac6d9f67dcb814477fac
                                                  • Instruction Fuzzy Hash: 28317E32600B84C6F720CFA5E8407DEB7A4FB84798FA01215EE9917A98DF79C1A2C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo$_local_unwind
                                                  • String ID:
                                                  • API String ID: 1677304287-0
                                                  • Opcode ID: 2d0cb57732f71c7861a18988631ea2dcdbba9467b0616a14b128760128b0135d
                                                  • Instruction ID: c24e1c044dd6a8cad6e8a025378fea63cb75f94c6dc6195911da246cea41f446
                                                  • Opcode Fuzzy Hash: 2d0cb57732f71c7861a18988631ea2dcdbba9467b0616a14b128760128b0135d
                                                  • Instruction Fuzzy Hash: C521B132624644C3EB54DF15E5913EDB360FFA5B94FD40211EA4A4B3EADA3AC674CB02
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 872066cfa414fe7bb540fbca7bb9d61572fbd2ad052d8c9c386e734c2b059875
                                                  • Instruction ID: 98706ecbf8e0ee0f970cc398032ef5e5f1fd964d01339e7615ed023266665afc
                                                  • Opcode Fuzzy Hash: 872066cfa414fe7bb540fbca7bb9d61572fbd2ad052d8c9c386e734c2b059875
                                                  • Instruction Fuzzy Hash: 6B21D172624B84C2FF60CB25E48039AA361FBC57D4F905211FA9E02AA9DF7CD194CB01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info$User
                                                  • String ID:
                                                  • API String ID: 2017065092-0
                                                  • Opcode ID: f0b6ba3127188870d9ca77e4cdfddb0e206f65f9be5dd170d7b6ddfbdcbbc9f0
                                                  • Instruction ID: 5a6b0a5b221fec89d97471983b75c6debcdd959e6de5216ab08891556fc6e132
                                                  • Opcode Fuzzy Hash: f0b6ba3127188870d9ca77e4cdfddb0e206f65f9be5dd170d7b6ddfbdcbbc9f0
                                                  • Instruction Fuzzy Hash: 1311A932624B80C7E7248F61E51079EB3A1FB80B88F445224EB8503B59DB78D5A08B81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$CurrentInformationOpen
                                                  • String ID:
                                                  • API String ID: 2743777493-0
                                                  • Opcode ID: d270990935d05291609a27100eb666b5b0fbef0ab6ff9c34a914c4aa256aee9f
                                                  • Instruction ID: 670f8cb4b6437c60684ce16ceea9f1eb69de2fa277d700276d425b599404248c
                                                  • Opcode Fuzzy Hash: d270990935d05291609a27100eb666b5b0fbef0ab6ff9c34a914c4aa256aee9f
                                                  • Instruction Fuzzy Hash: 0F111932218B84C7EB50CF25F95078AB3B0FB84B84F849125EB8947B68DF38D565CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 8eb0a8c4b131ff86e2201643d666c16c7870ab94c2bf69e596262afad84de1cc
                                                  • Instruction ID: d1502fffefc6a204e3e399a876522f6250b00cb6e30e7f4a92c9bfc98957aed1
                                                  • Opcode Fuzzy Hash: 8eb0a8c4b131ff86e2201643d666c16c7870ab94c2bf69e596262afad84de1cc
                                                  • Instruction Fuzzy Hash: E6D05E31700704C3EB283B712A853D802211F48710F8038F89A0302B97CD28C73A4252
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Info
                                                  • String ID:
                                                  • API String ID: 1807457897-3916222277
                                                  • Opcode ID: 63545288c66b989caff988c434e2d7c824b75562c9fdf6ba729794544d33f0a2
                                                  • Instruction ID: 0a8ee37bb5d2c17ea637baddc40fc43800d077f22693e10fb4ad56832e7e594d
                                                  • Opcode Fuzzy Hash: 63545288c66b989caff988c434e2d7c824b75562c9fdf6ba729794544d33f0a2
                                                  • Instruction Fuzzy Hash: 3F5191336196C18AE7609F29E0843ADB7E0F748744FA44139D78D47A6ACB7DD545CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID: cannot use operator[] with a numeric argument with
                                                  • API String ID: 118556049-485864652
                                                  • Opcode ID: 76e878a8cbdf53bf16af9fbe5f66f5f2444970966a37d33a13eb1dc8dec6a7f2
                                                  • Instruction ID: 8010bbf3af90554a98c3c1a0f95d39ef65c627d02253def438f1cc9af679dceb
                                                  • Opcode Fuzzy Hash: 76e878a8cbdf53bf16af9fbe5f66f5f2444970966a37d33a13eb1dc8dec6a7f2
                                                  • Instruction Fuzzy Hash: 8E312931301780D6EF189B16A9043DCB355EB08BE4F984B219E7E0BBC6DA3DC162C305
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProfile
                                                  • String ID: Unknown
                                                  • API String ID: 2104809126-1654365787
                                                  • Opcode ID: 6a83a43f42730fcae9654220d959d4fa80d2f195579dfbfa5350164919b9b0a1
                                                  • Instruction ID: dd2edc377c17760437ab3c5499cb64dd4598cc3b8726e2dcb1d4eb781fa990aa
                                                  • Opcode Fuzzy Hash: 6a83a43f42730fcae9654220d959d4fa80d2f195579dfbfa5350164919b9b0a1
                                                  • Instruction Fuzzy Hash: CC318F32628BC4C2E720CF25E5403DAB760FBD9784F945215FBC902A4ADB7DD695CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Cpp_errorThrow_std::_
                                                  • String ID:
                                                  • API String ID: 2134207285-0
                                                  • Opcode ID: 8d981a2b687dd6fb6908578d696d44363a810d7faa09f8be86248f85abcd1766
                                                  • Instruction ID: 8fadd22e46658fc3d3c2f3b00a75c7471c7c2271a4f46e265be9cf363fc6215a
                                                  • Opcode Fuzzy Hash: 8d981a2b687dd6fb6908578d696d44363a810d7faa09f8be86248f85abcd1766
                                                  • Instruction Fuzzy Hash: 4491F13270AA8482DA61EF1AD584139F3A5FB4ABD0F9A8032DB4D8B775CE3DD541C750
                                                  APIs
                                                    • Part of subcall function 00007FF7A44FE590: GetOEMCP.KERNEL32(00000001,00000000,00000000,00007FF7A44F7382), ref: 00007FF7A44FE5BA
                                                  • IsValidCodePage.KERNEL32(00000001,00000000,00000000,00007FF7A44F7382), ref: 00007FF7A44FECA1
                                                  • GetCPInfo.KERNEL32 ref: 00007FF7A44FECED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: CodeInfoPageValid
                                                  • String ID:
                                                  • API String ID: 546120528-0
                                                  • Opcode ID: b63d76eddae2a0a97ce201a85222819806dbafa7b60a15d64306885bfb31fd4f
                                                  • Instruction ID: b145473c23499ce0ca946eb43500ce48fa5dcb3eb5d97e652781b20054f6fd15
                                                  • Opcode Fuzzy Hash: b63d76eddae2a0a97ce201a85222819806dbafa7b60a15d64306885bfb31fd4f
                                                  • Instruction Fuzzy Hash: 7981E563A0A68285F7A4EF2FA084179F7E1EB44F41FA64131D64E076B8DE3EE545C321
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 73155330-0
                                                  • Opcode ID: c56f5070215b4a8c3bc90f6c3f877a7df53a7c979c2cbbb1f7e44ea1bf05212d
                                                  • Instruction ID: 477d0657fff79f8078ef287f81f44c96bf9f49b01cbdcdca7ded3773f5fcd1ff
                                                  • Opcode Fuzzy Hash: c56f5070215b4a8c3bc90f6c3f877a7df53a7c979c2cbbb1f7e44ea1bf05212d
                                                  • Instruction Fuzzy Hash: 01519D32A0AB4685EF55AF2AC49426C73A1EB49FA4FA64631CE5D033B9DE3ED441C350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: First$CloseCreateCredDriveEnumerateFileFindHandleLogicalMutexProcess32ReleaseSnapshotStringsToolhelp32
                                                  • String ID:
                                                  • API String ID: 1242419452-0
                                                  • Opcode ID: 1e0f50bf5a324b057639862f6b0c36e0d8dc654b571791b36985718e8e267fc5
                                                  • Instruction ID: 96a9c5aece35e622d80784b1056ed4585bed1ab469be1f29495ee3230f4a9385
                                                  • Opcode Fuzzy Hash: 1e0f50bf5a324b057639862f6b0c36e0d8dc654b571791b36985718e8e267fc5
                                                  • Instruction Fuzzy Hash: 3951D1726547C4C3FF60AB25E5453DDE311EF85BA0FD44211EAAC16ADBDE6AC4A28303
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseDriveFileFindFirstHandleLogicalMutexReleaseStrings
                                                  • String ID:
                                                  • API String ID: 3179890297-0
                                                  • Opcode ID: ef0d96d75a3b96cb2ac75637f9e91ddc45070675a6ce27774970758768ec2d3d
                                                  • Instruction ID: 3afdfa448a8011226ec30e338593497532448c7dd07635e7c5142cf66edd7f3e
                                                  • Opcode Fuzzy Hash: ef0d96d75a3b96cb2ac75637f9e91ddc45070675a6ce27774970758768ec2d3d
                                                  • Instruction Fuzzy Hash: 9E51DF726147C4C3FF209B25E5453DEA312EF85BA0FD44311EAAC16ADADE69C4A28303
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                  • String ID:
                                                  • API String ID: 73155330-0
                                                  • Opcode ID: 76e95b6b704b97de0ba2019d634527e76de5605452a466bcb0a745c9ccca2119
                                                  • Instruction ID: cef8a07ea1eed63d0324d344b3d3bfebcfb1e104074f589dfe7edda6b52a3f57
                                                  • Opcode Fuzzy Hash: 76e95b6b704b97de0ba2019d634527e76de5605452a466bcb0a745c9ccca2119
                                                  • Instruction Fuzzy Hash: 2C41066270BA8549EE64BF17958827AD251BB44BE4F8A0730DE7D077F9DE3DD0418320
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FolderFreeKnownPathTask
                                                  • String ID:
                                                  • API String ID: 969438705-0
                                                  • Opcode ID: 683ea69237fd4e2fcfc755988fba80c4d6975a56b19d3b06368b75a078237d42
                                                  • Instruction ID: f783454819107b2cd7fba13eef77d8f6d18143317ad86a03ea9b3e6e0909d7e5
                                                  • Opcode Fuzzy Hash: 683ea69237fd4e2fcfc755988fba80c4d6975a56b19d3b06368b75a078237d42
                                                  • Instruction Fuzzy Hash: DF319572514B84C2E7208B25E48039AB361FB997F4F905315FAAD03A95DB7DC1918B40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpen
                                                  • String ID:
                                                  • API String ID: 47109696-0
                                                  • Opcode ID: cb5083d97ad469c6c3493b2db064592496b758c58094e11f55f9889ab986e620
                                                  • Instruction ID: 968ed2a1167a131419e896269b7501aba0ce32fca2df140c565edc7bccea465a
                                                  • Opcode Fuzzy Hash: cb5083d97ad469c6c3493b2db064592496b758c58094e11f55f9889ab986e620
                                                  • Instruction Fuzzy Hash: D621D332314B84C6FF609B26E9443DAE360EF99BD4F885121FA4D13BA9DF69C5A1C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                                                  • String ID:
                                                  • API String ID: 3548387204-0
                                                  • Opcode ID: 7ff40415909f9658f6c8f05c258e32d0ae2fe3074e8ab3fcee39be1765333c0d
                                                  • Instruction ID: 566c75dafd4795ee5f7817b379e3896f8ff23a4ba437ef577be7fea5a2173326
                                                  • Opcode Fuzzy Hash: 7ff40415909f9658f6c8f05c258e32d0ae2fe3074e8ab3fcee39be1765333c0d
                                                  • Instruction Fuzzy Hash: D711AF19E1B10369FA947FB754CA2B985514F90342FE20874E60E4A2FBFD1FB8514232
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLastPointer
                                                  • String ID:
                                                  • API String ID: 2976181284-0
                                                  • Opcode ID: aae81a2dd0585ac03914996930617a7374804057a0023572312201c9d4728205
                                                  • Instruction ID: 90904cec1db2fcc783d0969752a0c03a50a24875fd9b2daca7280391c8db4f7d
                                                  • Opcode Fuzzy Hash: aae81a2dd0585ac03914996930617a7374804057a0023572312201c9d4728205
                                                  • Instruction Fuzzy Hash: 2611A072304B80C2DB30DB25A5442DDA361AB85FF4F944311EE7A0B7E9CF79C1618B41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 1173176844-0
                                                  • Opcode ID: f8b37a40f335e3c3195e14df9e3c0dcbaf99f4209189463ec543eb89a52f6b74
                                                  • Instruction ID: 6ca6854236ff01a5631b4d82425953a5fc1ea896aa15053b1c0a60170173e6a4
                                                  • Opcode Fuzzy Hash: f8b37a40f335e3c3195e14df9e3c0dcbaf99f4209189463ec543eb89a52f6b74
                                                  • Instruction Fuzzy Hash: F9E08605E1F20748FC683D6318CA0B481800FD8732EAB1730D93E082FBBD1EB4454130
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                                  • String ID:
                                                  • API String ID: 1173176844-0
                                                  • Opcode ID: cb30be615b2a740bb91050d633ba98dd94f54af7fee1c5634fd4bcc6230015a6
                                                  • Instruction ID: 489275de3057579928d3f671310ef80600a34e8a1bd016d2b620ec73b7c3cb07
                                                  • Opcode Fuzzy Hash: cb30be615b2a740bb91050d633ba98dd94f54af7fee1c5634fd4bcc6230015a6
                                                  • Instruction Fuzzy Hash: 76E01260731105C7FF7835B116157E451884F2D770EDC17A0693545AD3ED14C6764633
                                                  APIs
                                                  • RtlFreeHeap.NTDLL(?,?,3824448B482475C0,00007FF7A450011E,?,?,?,00007FF7A450049B,?,?,00000000,00007FF7A44FE208,?,?,00007FF7A4505462,00007FF7A44FE13B), ref: 00007FF7A44F5D72
                                                  • GetLastError.KERNEL32(?,?,3824448B482475C0,00007FF7A450011E,?,?,?,00007FF7A450049B,?,?,00000000,00007FF7A44FE208,?,?,00007FF7A4505462,00007FF7A44FE13B), ref: 00007FF7A44F5D7C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: cbe3ac59e7844d0f39d24919fd8d71206b1736601cc1fc9aef317310203d6668
                                                  • Instruction ID: b566cec36b0c3d855161ffbc3fec4c6bf9f8a2050285f6d78c2d122764a66f9c
                                                  • Opcode Fuzzy Hash: cbe3ac59e7844d0f39d24919fd8d71206b1736601cc1fc9aef317310203d6668
                                                  • Instruction Fuzzy Hash: 26E08C32F0B60242FB187FF398C903892914F88F80FCA8034D80D42276DE3E68954330
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 0de784133231444de2e8ac2bf85233e30d04ba23b6457a4fa09f5d6357980d18
                                                  • Instruction ID: bb7cfc523137742ecb19c0746fd1574426e3a2f7bf8b8a8efe2e623d7d7e06ef
                                                  • Opcode Fuzzy Hash: 0de784133231444de2e8ac2bf85233e30d04ba23b6457a4fa09f5d6357980d18
                                                  • Instruction Fuzzy Hash: 51415121B0B74245FEA6AF0392942799250AF45BC0F864034DF4D27BBDDEBFE4568351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 45209dc9db24084941d5b4e6ac6d9946b256a9172249de886d3448e3530a5b4a
                                                  • Instruction ID: 9db31d11e5f51340ee4ac4ef593c65a0fa6ccd5a87ba4b1d6a53f2c335d0de33
                                                  • Opcode Fuzzy Hash: 45209dc9db24084941d5b4e6ac6d9946b256a9172249de886d3448e3530a5b4a
                                                  • Instruction Fuzzy Hash: 9AE02E31B21204C3FF3DA7F29A493F982856F89B40FC020A09805C2292EE3988B08B02
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 7627ebc1c9c8bd860e8bc9382eb45467d66776eed4bb860d5b88a8fd11fc05cd
                                                  • Instruction ID: 12ab71140d1ccead6a99cf110f05253f8aba85cfdd4f5e021af591fb4231848b
                                                  • Opcode Fuzzy Hash: 7627ebc1c9c8bd860e8bc9382eb45467d66776eed4bb860d5b88a8fd11fc05cd
                                                  • Instruction Fuzzy Hash: 45618C72201A80C6FF24CE1A90443ADA3A9EF55F94FD58621DF6D0B7D2DE3AE4A19301
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 9761ae92462a5efc8d833711558f290d21a3228fb8a73918b336a9c919ce9e76
                                                  • Instruction ID: 33e422d3b197152977e24da53b5d2197b2a21d6290cc4cc1a270d362a3324bc3
                                                  • Opcode Fuzzy Hash: 9761ae92462a5efc8d833711558f290d21a3228fb8a73918b336a9c919ce9e76
                                                  • Instruction Fuzzy Hash: E3516A32301B54CAEB198F2AC05439C73A5FB48FA4F984512DE1E47BA9DF3AC4A1C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: edde4a4270a045642456d5ae94b45b1a61b59367cbc2ae79fcd3e95f9d9ef683
                                                  • Instruction ID: 250944cd04e4a34d95a1b7570c4057d89a7d1964a08e4fff7254a02027fa3291
                                                  • Opcode Fuzzy Hash: edde4a4270a045642456d5ae94b45b1a61b59367cbc2ae79fcd3e95f9d9ef683
                                                  • Instruction Fuzzy Hash: D241A172315784C2EB289F26A5143DEB755FB44BE4F944A21AFAD07BC9DE39C0618309
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_fs_directory_iterator_open
                                                  • String ID:
                                                  • API String ID: 4007087469-0
                                                  • Opcode ID: b165754dbc8285719f9dd60d32b9377288e672771641b871c799b37d7bd4e097
                                                  • Instruction ID: e36965f0a3d6102da5206647ae2a2d2b7100864b8e7e524c2c210c5296f6e10e
                                                  • Opcode Fuzzy Hash: b165754dbc8285719f9dd60d32b9377288e672771641b871c799b37d7bd4e097
                                                  • Instruction Fuzzy Hash: F241E473A40644C3EB218B19E6443F9A361EB85BF4FA44321EE68437E5EF79C6A18701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InformationVolume__std_fs_get_current_path
                                                  • String ID:
                                                  • API String ID: 155845060-0
                                                  • Opcode ID: 2316ad3bb71fdcb27310d868fceba78f7c90a4096c3bc18ad90a91b627b354ab
                                                  • Instruction ID: f0e735d6ca6f1c5f861ba1b3f8b36f7fbb7c611a9b515bc362d7c3baeda8e927
                                                  • Opcode Fuzzy Hash: 2316ad3bb71fdcb27310d868fceba78f7c90a4096c3bc18ad90a91b627b354ab
                                                  • Instruction Fuzzy Hash: 69519D33A14B84C6EB10CF38E8453DD7764FB99788F904215EB8853AA9DF78C691CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 071ebb08b0fc02b9d3ef8c25180f68ab3a457de1887feec64baca47ad46b2841
                                                  • Instruction ID: 9e1ff8fa94b16acfdec7affc516d530e7bcb40f9d4e8431a4c10de01ed6179f9
                                                  • Opcode Fuzzy Hash: 071ebb08b0fc02b9d3ef8c25180f68ab3a457de1887feec64baca47ad46b2841
                                                  • Instruction Fuzzy Hash: A341DE32210204C7FB388F19E5413EDF3A0EB51B48F900205EA9A877E1CB3AD422CF52
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4af04fc58c3735e03b8fc41b2b089ef38169f45a84e4e2090fc73d8f9fef22e2
                                                  • Instruction ID: 92325cd09f4abb30c02c77a3e57bb3bef73ebf8bcac16d482a39ca150152f1c9
                                                  • Opcode Fuzzy Hash: 4af04fc58c3735e03b8fc41b2b089ef38169f45a84e4e2090fc73d8f9fef22e2
                                                  • Instruction Fuzzy Hash: 4D31B671311640C6FF289B56A6143EDF392EF48BD0FD84631EA6D0BBD9DA79C1A18309
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 32d35f8b75417bc3833d0e237fb6496e18b6cfdddd0f8cbb12e1cdf034ad0677
                                                  • Instruction ID: ee3b36fb4b84a44cf82c855effeb267a06afce65f6835e8f9c4e4ec8eae5de5f
                                                  • Opcode Fuzzy Hash: 32d35f8b75417bc3833d0e237fb6496e18b6cfdddd0f8cbb12e1cdf034ad0677
                                                  • Instruction Fuzzy Hash: 42319332311B84C3EB24DB25E24439EB399EB48BD4F904625EBAE17BD9DF39D1618701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 511fa010988e2f6443044a92af9fab06c8b3a34665d7397b8e3076bf5f49563d
                                                  • Instruction ID: b0608a5deacdf31f3e1485b2d57fc6a0b815aceb1246889620284e6b1fad19a7
                                                  • Opcode Fuzzy Hash: 511fa010988e2f6443044a92af9fab06c8b3a34665d7397b8e3076bf5f49563d
                                                  • Instruction Fuzzy Hash: 8C21F732711B50C2FF1DEB15A6013E9A251EF54BB4F644B219A3C43BEAEE79C4E28341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 917a793721063d462ff31f6642dac392bfad5ea588ad0e64b7d56717294e925f
                                                  • Instruction ID: c7f8ff1c16c681c5b838fc865374560135442977c4d46d083c41e5663765d2fa
                                                  • Opcode Fuzzy Hash: 917a793721063d462ff31f6642dac392bfad5ea588ad0e64b7d56717294e925f
                                                  • Instruction Fuzzy Hash: FF21F772301654CAFF1DDB6597143E9A2819F00FE4FC40A209E2E0BFC9EE79C4A18346
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: fb2abcc3e97f28c6e70c47a0fd1fa5229a04abe3fde6ae5ca4541a6dce7644a9
                                                  • Instruction ID: 8dd4e8bb8ddfb8d2d3869f2b0c8d5f7a1071035c3a7b8c34723e41c12dc53d6c
                                                  • Opcode Fuzzy Hash: fb2abcc3e97f28c6e70c47a0fd1fa5229a04abe3fde6ae5ca4541a6dce7644a9
                                                  • Instruction Fuzzy Hash: CE319332614640C7F7166F5599813EDBBA4AF84BA5FD60205EA29033E2DB7AC4708B13
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HandleModule$AddressFreeLibraryProc
                                                  • String ID:
                                                  • API String ID: 3947729631-0
                                                  • Opcode ID: a6d988fad7f82c8ed6f6a36b49a2ab38b1c706cf5ea4fa191dba1a8892074849
                                                  • Instruction ID: 2f9b9da77e0b35b4c9481948b935063bbfda01fc160696dce89911fa50d92e48
                                                  • Opcode Fuzzy Hash: a6d988fad7f82c8ed6f6a36b49a2ab38b1c706cf5ea4fa191dba1a8892074849
                                                  • Instruction Fuzzy Hash: 69219032A10700CAEB258F64D4403EC37A0EB44768F8856A9DB6C46ED9DB74C7A5C791
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: a50a0b47cc8fb1f1aa58c7d522dfd3dac9cb2a3c51579a89a64ad1e107e1cc06
                                                  • Instruction ID: a1a9b5b49b470e20963f8a3e657c3bbd398a8af2d4c3f50d0fbc7e6a99ca1841
                                                  • Opcode Fuzzy Hash: a50a0b47cc8fb1f1aa58c7d522dfd3dac9cb2a3c51579a89a64ad1e107e1cc06
                                                  • Instruction Fuzzy Hash: CD219632614B80D7DB61CF19E5803E977A0FB84B54FA44314EB7A876D5DB79CC208B01
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 77eb78eceebaf9aac1283afbdc11339d6bb147956a1b1fa3eec95f7ad3fa8818
                                                  • Instruction ID: cb0ef18e60c4a34eb6c17ad30ca53da69dae1a95287a524d7b3a3d47c686261b
                                                  • Opcode Fuzzy Hash: 77eb78eceebaf9aac1283afbdc11339d6bb147956a1b1fa3eec95f7ad3fa8818
                                                  • Instruction Fuzzy Hash: 5A118132214680C3FB659F5199003EDE2E4BF85B80FD84861EE8947796DBBAC9718B02
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem
                                                  • String ID:
                                                  • API String ID: 31276548-0
                                                  • Opcode ID: 5cb06c29aa60c649fdf38176c6d8eec79acc4c06d7406d5603b5f59ca669a07d
                                                  • Instruction ID: 6cd4ea20dfe7471ef2e3b50a38a873040f5b949b7b6e70b55f23a256db754da6
                                                  • Opcode Fuzzy Hash: 5cb06c29aa60c649fdf38176c6d8eec79acc4c06d7406d5603b5f59ca669a07d
                                                  • Instruction Fuzzy Hash: B5311922E18EC19AF3129FB890412F8E372BF6530DF456231DE4822475EF7662D5C350
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: send
                                                  • String ID:
                                                  • API String ID: 2809346765-0
                                                  • Opcode ID: 233c3997310a297041e1e3fb15b3d4c80a1f67aef0062fad458dcd648ec2920d
                                                  • Instruction ID: e6e54a9d35799afd07164cfb85664b253c59307a84b88f2260f255582706c308
                                                  • Opcode Fuzzy Hash: 233c3997310a297041e1e3fb15b3d4c80a1f67aef0062fad458dcd648ec2920d
                                                  • Instruction Fuzzy Hash: CA01D632714B84C2EB508F2AF544699A3A0FB88FE4F986130EF5D43B4CDB28C8918740
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem
                                                  • String ID:
                                                  • API String ID: 31276548-0
                                                  • Opcode ID: 4193701b040240acb4aee85f10277e2056db2b535a089b50bbfe366aa39793ce
                                                  • Instruction ID: 16709a2b3731b84fb5c4f3b10ea935f29b24bd20ba7e9d1f736060b9500d0616
                                                  • Opcode Fuzzy Hash: 4193701b040240acb4aee85f10277e2056db2b535a089b50bbfe366aa39793ce
                                                  • Instruction Fuzzy Hash: F5F03131B09A458BD748DB1EA851129B7E2F788700F804139E54EC3774DE7DE851CB50
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFindNext
                                                  • String ID:
                                                  • API String ID: 2029273394-0
                                                  • Opcode ID: 2a33c8ed0ea8a7ff33b4bf5881203da667c28cb78f46e6057f686215caa0375e
                                                  • Instruction ID: aa4e03acc70fd110041658a6d7d8dc0e6feb7a4c539880dbf4012135a4210693
                                                  • Opcode Fuzzy Hash: 2a33c8ed0ea8a7ff33b4bf5881203da667c28cb78f46e6057f686215caa0375e
                                                  • Instruction Fuzzy Hash: B8016236208AC0C1EB70CB52F4443DAB360FBC8B94F804062DE8D43B59DE39C986CB00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 3ae8ffb49856a14d60f99efa49b0fe83e22d235a8448dcdbc0ad68fd56e97e18
                                                  • Instruction ID: bd9b9dbc1ec54c3b7037121bd4d9bf9a0e69e673e0d05df58a522ec11acc3220
                                                  • Opcode Fuzzy Hash: 3ae8ffb49856a14d60f99efa49b0fe83e22d235a8448dcdbc0ad68fd56e97e18
                                                  • Instruction Fuzzy Hash: 2BE09231215A41C3EB657BA995813ACF150AF547B4FE48321AB38022DADA3A84704B02
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFindNext
                                                  • String ID:
                                                  • API String ID: 2029273394-0
                                                  • Opcode ID: ed1b562b9eaccad4d1a8cb5c87ebc476f475394f3bf74eab8c21655979839179
                                                  • Instruction ID: 068c8424da6932274988f47a12006f23afbf14de0032e524e0c6f510b255e153
                                                  • Opcode Fuzzy Hash: ed1b562b9eaccad4d1a8cb5c87ebc476f475394f3bf74eab8c21655979839179
                                                  • Instruction Fuzzy Hash: 92C09236F26901C3E7782B775E827C212E0AF68700FD411A4C50480254DAAC82F7BB53
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoNativeSystem
                                                  • String ID:
                                                  • API String ID: 1721193555-0
                                                  • Opcode ID: 2207f1aaff4f69cd87f85f70297096fb5378e3f094066669bafcd2760b152ba3
                                                  • Instruction ID: 48d8e3dc39aedd3dd4a5e489f74dee4facbc67b2ddad5a708fbbce9efd8d00e4
                                                  • Opcode Fuzzy Hash: 2207f1aaff4f69cd87f85f70297096fb5378e3f094066669bafcd2760b152ba3
                                                  • Instruction Fuzzy Hash: 73B09236B248C0D3C621EB04EC420897331FB94B19FD00040E28942624DE2DDA2A8E00
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem
                                                  • String ID:
                                                  • API String ID: 31276548-0
                                                  • Opcode ID: eb0f60a92e298239e1933a600cd8bffc64c19650151f80036a0ab61d3fcc7aa1
                                                  • Instruction ID: c49473976cff4b780e72f28bbc11ef07794769ccd76a73b583221a0fa6cd2c7b
                                                  • Opcode Fuzzy Hash: eb0f60a92e298239e1933a600cd8bffc64c19650151f80036a0ab61d3fcc7aa1
                                                  • Instruction Fuzzy Hash: C3B09226A19C80C3C621FF05F88202AB771FB98B08FC00160E28D42634CE2CDA2A8F01
                                                  APIs
                                                    • Part of subcall function 00007FF7A453ACE0: GetSystemInfo.KERNEL32(?,?,?,?,?,?,00007FF7A453B6C4), ref: 00007FF7A453ACF4
                                                  • InitializeCriticalSection.KERNEL32 ref: 00007FF7A453B770
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: CriticalInfoInitializeSectionSystem
                                                  • String ID:
                                                  • API String ID: 3396500325-0
                                                  • Opcode ID: bcaedd984716a8154b1a368fb8aa1922a009770eacb742e215039dbb87c58d74
                                                  • Instruction ID: a9ca7189b9332a3994c82e7ae7ae51ec89d86890a973a7cc128243ccfe975ca1
                                                  • Opcode Fuzzy Hash: bcaedd984716a8154b1a368fb8aa1922a009770eacb742e215039dbb87c58d74
                                                  • Instruction Fuzzy Hash: 2F41BD32A05B898AD714DF12E48055EFBA8FB64B90F868035DF9943B71DF39E591C710
                                                  APIs
                                                  • HeapAlloc.KERNEL32(?,?,00000000,00007FF7A44F63DE,?,?,?,00007FF7A44F5E75,?,?,?,?,00007FF7A4506AB6,?,?,00000000), ref: 00007FF7A44F5D39
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: 6a7b2ae2170dc6773900311a114643c1bba646b3fe3a9b71f003f2cd5f34c263
                                                  • Instruction ID: 9256b33858e506e5d8c8752d538582a373cf572255ce64fabfaa8ad3b74682a7
                                                  • Opcode Fuzzy Hash: 6a7b2ae2170dc6773900311a114643c1bba646b3fe3a9b71f003f2cd5f34c263
                                                  • Instruction Fuzzy Hash: FBF04F62B1B60641FE587F6756C82B592D15F45F80F8E8030C80E862FAEE2EA4808230
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: eb99e2a0aa2c5a543b3daa01bf1a85af620a59f00b68e4e07b531dba3724a22a
                                                  • Instruction ID: f8ad2a2fe6a2e00386f4eee2ed8bd9334e26f5ba61ea04ee695b06bba23f53b5
                                                  • Opcode Fuzzy Hash: eb99e2a0aa2c5a543b3daa01bf1a85af620a59f00b68e4e07b531dba3724a22a
                                                  • Instruction Fuzzy Hash: 93F0A030311384C7FF64AB715A507E992805F84BA0FED07205D2A866C2DE29C4718B23
                                                  APIs
                                                  • HeapAlloc.KERNEL32(?,?,?,00007FF7A4506A9D,?,?,00000000,00007FF7A45061AB,?,?,?,00007FF7A450518B,?,?,?,00007FF7A4505081), ref: 00007FF7A44F86F2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401832050.00007FF7A44D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7A44D0000, based on PE: true
                                                  • Associated: 00000000.00000002.2401681609.00007FF7A44D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401884187.00007FF7A4558000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2401978302.00007FF7A46A1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2402002248.00007FF7A46A5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_7ff7a44d0000_file.jbxd
                                                  Similarity
                                                  • API ID: AllocHeap
                                                  • String ID:
                                                  • API String ID: 4292702814-0
                                                  • Opcode ID: 144fe1f293cd251bad933485d3714c65b006d2fb5feaa7cd2b0c19a24d47c173
                                                  • Instruction ID: 390a259ea26598e4ad0eea9fb449bcc37fa3aca43afc8c1197bfea5a906616f8
                                                  • Opcode Fuzzy Hash: 144fe1f293cd251bad933485d3714c65b006d2fb5feaa7cd2b0c19a24d47c173
                                                  • Instruction Fuzzy Hash: CFF05E13A0F64241FE547FA359C027592C15F84FA0F8A0A30D82E492FAEF2EE4508234
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$lstrcat$AllocateInitLockMemoryObjectStringUnicodeVirtual$AcquireEnumerateFolderFreeInitializeKnownLoadedModulesPathReleaseTaskUninitialize
                                                  • String ID: aaa$bbb$ccc
                                                  • API String ID: 1424456515-3079797815
                                                  • Opcode ID: ecfe2223f7eeadde9645535169031763849063726ed6cb75cf5c1d5538711545
                                                  • Instruction ID: 0cf41520ad6843f75f278a941e44b4b2a109d69319aa08a644f594383c3545fe
                                                  • Opcode Fuzzy Hash: ecfe2223f7eeadde9645535169031763849063726ed6cb75cf5c1d5538711545
                                                  • Instruction Fuzzy Hash: CBD2B736625FC88AD7A18F69E88169EB3B4F788788F505215EECD57B18EF38C164C740
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID: "$#base$#include$*$/$No closed word$Unexpected eof$conditional not closed$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                                                  • API String ID: 118556049-2258937249
                                                  • Opcode ID: fb3d0ce16be8bf1dd10de808007757ac4d7fbd6a137d3b39eb93e2abab2d2ff1
                                                  • Instruction ID: 0c765bbc9e5e68ba38809b3ddf8ef34d875b254fd95f7a3166bb73fad3ddb55f
                                                  • Opcode Fuzzy Hash: fb3d0ce16be8bf1dd10de808007757ac4d7fbd6a137d3b39eb93e2abab2d2ff1
                                                  • Instruction Fuzzy Hash: A1E2AF72201BC4C6EF718F25D9843EDA762FB44798FD48112DA4D0BAA9DF79C6A5C302
                                                  APIs
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0000012A222AFD91
                                                    • Part of subcall function 0000012A2228DA30: __std_exception_copy.LIBVCRUNTIME ref: 0000012A2228DA73
                                                    • Part of subcall function 0000012A22311108: RtlPcToFileHeader.KERNEL32 ref: 0000012A2231114C
                                                    • Part of subcall function 0000012A22311108: RaiseException.KERNEL32 ref: 0000012A22311192
                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0000012A222AFE52
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$ExceptionFileHeaderRaise__std_exception_copy
                                                  • String ID: "$#base$#include$*$/$No closed word$Unexpected eof$conditional not closed$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                                                  • API String ID: 145623376-2258937249
                                                  • Opcode ID: 89209a7afa24ffc67a57109ed1a85645ccff237d790de18acd80f9e8b496254e
                                                  • Instruction ID: 678099c456b1839c64a7d3690c93d7f9c98518060b0ccb3e7acd752d17dbcca7
                                                  • Opcode Fuzzy Hash: 89209a7afa24ffc67a57109ed1a85645ccff237d790de18acd80f9e8b496254e
                                                  • Instruction Fuzzy Hash: E3E2A072201BC4C6EB75CF24D9803EDA761FB44798F948512DA8D0BE99DF7AC6A5C302
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID: BOOTNXT$autorun.inf$boot.ini$boot.sdi$bootfont.bin$bootmgfw.efi$bootmgr$bootsect.bak$bootstat.dat$d3d9caps.dat$desktop.ini$gdipfontcachev1.dat$iconcache.db$indexervolumeguid$mib.bin$ntldr$ntuser.dat$ntuser.dat.log$ntuser.ini$reagent.xml$thumbs.db$winre.wim$winsipolicy.p7b$wpsettings.dat
                                                  • API String ID: 118556049-850610325
                                                  • Opcode ID: 5513c3b579e186655d849d8761bd1d669df1bc04df69b312f31a70fd7f9fa00f
                                                  • Instruction ID: 92cafcd89debf59711a24507ae4f986c34443a78e93247dada661d3101674da0
                                                  • Opcode Fuzzy Hash: 5513c3b579e186655d849d8761bd1d669df1bc04df69b312f31a70fd7f9fa00f
                                                  • Instruction Fuzzy Hash: DCC1B862D60FC9C6E720DB34C9927F45361FBEE384FA06316A98861857EBA4E7D4C341
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Initialize$Security
                                                  • String ID: @
                                                  • API String ID: 119290355-2766056989
                                                  • Opcode ID: 43fd713c0aac2b623095c3864f0337a62321213f8725a0f2194c45e222ca4bf1
                                                  • Instruction ID: 0acfd85c825a1401b7cb72875df1e8c823a26c5c2bdb14c542c9f7f1a7b4d79e
                                                  • Opcode Fuzzy Hash: 43fd713c0aac2b623095c3864f0337a62321213f8725a0f2194c45e222ca4bf1
                                                  • Instruction Fuzzy Hash: 80D1B932B14B84CAFB20CF75E5443DD7361EB88B98F805215EE5917AA9DF3AC2A5C341
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID: #recycle$$recycle.bin$$windows.~bt$$windows.~ws$$winreagent$All users$AppData$Application Data$Boot$PerfLogs$Program Files$Program Files (x86)$ProgramData$System Volume Information$Windows$Windows.old$Windows.~bt$bootmgr$config.msi$ntldr
                                                  • API String ID: 118556049-2722463023
                                                  • Opcode ID: 386f32a4d5dfa40681defb2796dbc9df35ae9b808f07fb7c421dba766f82abc8
                                                  • Instruction ID: 739013510afade3e62a78958bd5732c6838e2b246dc5936128a718a6ae2e0491
                                                  • Opcode Fuzzy Hash: 386f32a4d5dfa40681defb2796dbc9df35ae9b808f07fb7c421dba766f82abc8
                                                  • Instruction Fuzzy Hash: F2A1B662E60FC9C6E720DB34C9927F56361FBEE384FA06316798861856EF64E6D4C301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                  • API String ID: 808467561-2761157908
                                                  • Opcode ID: 61798901ef63ddb9b2fd150afb6021ea1698221561563c44f95e73f05cf7b2a0
                                                  • Instruction ID: 31d0e269d692ff329e64ac0a10399250afae46893cbb6ce1905b0cac1fd9968f
                                                  • Opcode Fuzzy Hash: 61798901ef63ddb9b2fd150afb6021ea1698221561563c44f95e73f05cf7b2a0
                                                  • Instruction Fuzzy Hash: A4B20172A10280CFE7748F68E640BEE77A1FB54788F905255DB0657E88DB38DB20CB52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterExecuteSectionShell
                                                  • String ID: .exe$.exe$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$open$runas$temp_directory_path
                                                  • API String ID: 4038919937-3845196099
                                                  • Opcode ID: e7019bed2551195b0fc9bd6dd0e9f58640fa4c8111dc492f63e14e6d27f67156
                                                  • Instruction ID: dc024a9d331c89dcaf143e8ed55d3812d7abd30cd30de45fadc4e69d037e5479
                                                  • Opcode Fuzzy Hash: e7019bed2551195b0fc9bd6dd0e9f58640fa4c8111dc492f63e14e6d27f67156
                                                  • Instruction Fuzzy Hash: F2328072610B80CAEB10CF28E9843DDB7A1FB847A8F905216EA5D47BE9DF79C195C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: lstrcpy$Objectlstrcat$AcquireAllocateInitializeLockMemoryUninitializeVirtual
                                                  • String ID:
                                                  • API String ID: 1341382831-0
                                                  • Opcode ID: 783151e39d26fda8e6c0a589f4d7636057f6fee7d799062d02aeb8ee7367c443
                                                  • Instruction ID: 93d9bec72e02b866bce81cbc4c6657c341dd4319e17a02c5efc6c6e459ad55ec
                                                  • Opcode Fuzzy Hash: 783151e39d26fda8e6c0a589f4d7636057f6fee7d799062d02aeb8ee7367c443
                                                  • Instruction Fuzzy Hash: 77B2763652AFC98AD7A18F29E88169AB3B4F389784F106215FFCD57B18EF74C2548740
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                                                  • API String ID: 0-3429737954
                                                  • Opcode ID: 7fc4497ad5e4363d28f05f684398d5144166f333990f1e9df716402873cc770a
                                                  • Instruction ID: 11a0f1bd9b8565fb17dcc1ca0185b0912eb4d691bd1a6bbc3887c6e516731f34
                                                  • Opcode Fuzzy Hash: 7fc4497ad5e4363d28f05f684398d5144166f333990f1e9df716402873cc770a
                                                  • Instruction Fuzzy Hash: 0D828D32651BC4CAEB20DF34D9843DDB360FB89798F949211EA4D5BAA9EF75C690C301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastNameTranslate$CodePageValidValue
                                                  • String ID: utf8
                                                  • API String ID: 1791977518-905460609
                                                  • Opcode ID: 7b07d4ff2d2c8ac8aae54d70d264f8f5fd38b117be414cfb2d7e50e751da9c84
                                                  • Instruction ID: c1ed369092d93b946f6fe67ab0d8365bfdd3be79c4291bcdf5aac6354a5e9317
                                                  • Opcode Fuzzy Hash: 7b07d4ff2d2c8ac8aae54d70d264f8f5fd38b117be414cfb2d7e50e751da9c84
                                                  • Instruction Fuzzy Hash: 94919E32300B40C7FB249F61DA013DA27A5FF88B84FC441A1DE5947B95EB39CA66C752
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                                  • String ID:
                                                  • API String ID: 2591520935-0
                                                  • Opcode ID: 3d25f31d395c3ae3e3608586c5fefc0b956f88d735d05026e9ed1f693fc9eb64
                                                  • Instruction ID: c982c068b2b3aa962fb492d97b9244d420b24b176ebe059cf54de8b4b93a37d7
                                                  • Opcode Fuzzy Hash: 3d25f31d395c3ae3e3608586c5fefc0b956f88d735d05026e9ed1f693fc9eb64
                                                  • Instruction Fuzzy Hash: 1A716872701710CBFF64DB60DA507E873B0BF44B48FC441A68E1957A95EB38C6A5C3A2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: value
                                                  • API String ID: 2453523683-494360628
                                                  • Opcode ID: c9a1c9679dd1c07d46a32787ed4a3d11b74ff9f1976b2642d17621ab4ff0490d
                                                  • Instruction ID: ff9f69e4fb0d587722192d2172edc8215f671475c824acae8b4f882ff16136aa
                                                  • Opcode Fuzzy Hash: c9a1c9679dd1c07d46a32787ed4a3d11b74ff9f1976b2642d17621ab4ff0490d
                                                  • Instruction Fuzzy Hash: C302AE32624BC4C6EB10CB78D5803EDA761EBC57A4F905312FA9D13AEADF69C1A5C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                  • String ID:
                                                  • API String ID: 1239891234-0
                                                  • Opcode ID: 2d623047d3aecc7385336590f9e49eab95d49ea2abbdc5ec59ad4e6f52a05f12
                                                  • Instruction ID: f4e30907014e01902fb187b29c95641003d085ff5bdaa66b5d4beb1e4a7d9148
                                                  • Opcode Fuzzy Hash: 2d623047d3aecc7385336590f9e49eab95d49ea2abbdc5ec59ad4e6f52a05f12
                                                  • Instruction Fuzzy Hash: DC314D36214F80C6EB64CF25E8403DE73A4FB88754F944226EA9D43BA9DF39C665CB41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename$files$key
                                                  • API String ID: 0-2980817763
                                                  • Opcode ID: 013352e530aa41f7b7de6df28f720281d5960d6063986b80e1d5fa1cee0b14b6
                                                  • Instruction ID: 793fc41ea1a6890e075b6fe6cd1f28577f1fcb4b921e501e7baf4e6a31a1c7c3
                                                  • Opcode Fuzzy Hash: 013352e530aa41f7b7de6df28f720281d5960d6063986b80e1d5fa1cee0b14b6
                                                  • Instruction Fuzzy Hash: D7A24C72605BC4CAEB21CF24D9803DD77A5FB897A8F905215EA9C0BBA9DF75C290C701
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: memcpy_s
                                                  • String ID:
                                                  • API String ID: 1502251526-3916222277
                                                  • Opcode ID: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                                                  • Instruction ID: af2162d345d7cf6c9a1f689e5e7de3296469d522fdcefbbff8f2f5a02cde652e
                                                  • Opcode Fuzzy Hash: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                                                  • Instruction Fuzzy Hash: 69C10772714685C7EB24CF19E188B9EF791FB94B88F848225DB4A43B84DB79D915CF00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_fs_convert_wide_to_narrow$__std_fs_code_page
                                                  • String ID: !$content$filename$status$users
                                                  • API String ID: 3645842244-3795777748
                                                  • Opcode ID: c21eaae1fa6b10ebd25a8f36edfef85f2d62dc2eeffc251c53a3cf9150cdbf15
                                                  • Instruction ID: 2f6578febfe624127f3ae7ab83f53c6edba8dc880fa36b08360e5e9e265700a9
                                                  • Opcode Fuzzy Hash: c21eaae1fa6b10ebd25a8f36edfef85f2d62dc2eeffc251c53a3cf9150cdbf15
                                                  • Instruction Fuzzy Hash: DAB28C72611BC4CAEB31DF24D8803DDA365FB85798F905211EA9D4BAAAEF75C394C301
                                                  APIs
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0000012A2231D763
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DebugDebuggerErrorLastOutputPresentString
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                  • API String ID: 389471666-631824599
                                                  • Opcode ID: 9f2ba7ac1ffdfb54cd24e7aa69bef8e5fd03b463d21a3b8ac8ac174eb3ea57fd
                                                  • Instruction ID: 102a83346ed031afbddfe33c9bb1ae4beeb8e31b8aca113332e518db804e7e4c
                                                  • Opcode Fuzzy Hash: 9f2ba7ac1ffdfb54cd24e7aa69bef8e5fd03b463d21a3b8ac8ac174eb3ea57fd
                                                  • Instruction Fuzzy Hash: 4A117C32310B40D7FB149B22DB543E972A4FF48755F8081659B4983A94EF38D1B4CB92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: array$object$object key$object separator$value
                                                  • API String ID: 2453523683-2448007618
                                                  • Opcode ID: e183b7c7a55f04622923c0a3a187c871db2666b0d2710677806a81db6397c651
                                                  • Instruction ID: b07057eed89a9092bd2dacfb1630bf84425a7a5962f79322d97aeabdbc743682
                                                  • Opcode Fuzzy Hash: e183b7c7a55f04622923c0a3a187c871db2666b0d2710677806a81db6397c651
                                                  • Instruction Fuzzy Hash: 9A42FF32614A84D3FB00DF34C4513EDA325EFD6784FC05612EA4E57A9AEF69D2A9C342
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Virtual$AllocInfoProtectQuerySystem
                                                  • String ID:
                                                  • API String ID: 3562403962-0
                                                  • Opcode ID: 0563650b0593b8a3372685d5b5ba1ed04743c52572833c5a6095c6b83099c874
                                                  • Instruction ID: 1bb3ee93076b46884f8dec22d38cec979e7b952f22d76c627bb6b2b56fe9eac4
                                                  • Opcode Fuzzy Hash: 0563650b0593b8a3372685d5b5ba1ed04743c52572833c5a6095c6b83099c874
                                                  • Instruction Fuzzy Hash: F7313A33310A84DBEB20DF35D9407D973A5FB48B88F945026AA0A8BB48DF39D655C741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_copy
                                                  • String ID: parse_error$value
                                                  • API String ID: 592178966-1739288027
                                                  • Opcode ID: f6905ed811f2d1235c2d7198258080b67331814984b245119223fdde80ccb46b
                                                  • Instruction ID: 2851909d25e3bf6ca5ac4c8f3a3e3c860b93d41f96fede93012fac4a9476070b
                                                  • Opcode Fuzzy Hash: f6905ed811f2d1235c2d7198258080b67331814984b245119223fdde80ccb46b
                                                  • Instruction Fuzzy Hash: F6F1CC72B10A84C6FB10DF74D5413EDA372EB95398FC05611EE4C26AEAEF69C2A5C341
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: content$directory_iterator::directory_iterator$exists$filename
                                                  • API String ID: 0-1400943384
                                                  • Opcode ID: ffca4aa2cce6f64ade1ec00c37f74711e974c2dc01704b9e97f69703ea275362
                                                  • Instruction ID: 870cd41ce62556a2838fb771289bf9f2f69fec827b206b1dbc4bdfe14cdeabc3
                                                  • Opcode Fuzzy Hash: ffca4aa2cce6f64ade1ec00c37f74711e974c2dc01704b9e97f69703ea275362
                                                  • Instruction Fuzzy Hash: 41528F73654BC4CAEB208F28D8803DDB7A1FB89798F905215EA9C17BA9DF75C290C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1286766494-0
                                                  • Opcode ID: 5072c22b437b18fafa0fbf01e541954b29129c0515d243df4d3db9686e45aad1
                                                  • Instruction ID: 8542b98c990fbda8d3de9331c853d5e9df2f9065e9261f17c4cabcc88bb3495e
                                                  • Opcode Fuzzy Hash: 5072c22b437b18fafa0fbf01e541954b29129c0515d243df4d3db9686e45aad1
                                                  • Instruction Fuzzy Hash: 3992B032218780C7EB258F25D6543EE37A5FF45B84F844195DB8A0BF99DB79CA20C722
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FormatInfoLocaleMessage
                                                  • String ID: !x-sys-default-locale
                                                  • API String ID: 4235545615-2729719199
                                                  • Opcode ID: c1628e58b74db45d6c1c166ba316052c12fc9305e6d311366bbb753391ec371b
                                                  • Instruction ID: d150dd07a0df5dd22dfd7d7506cf1b5b8f8cb70e36ae376ded86016203afa9c3
                                                  • Opcode Fuzzy Hash: c1628e58b74db45d6c1c166ba316052c12fc9305e6d311366bbb753391ec371b
                                                  • Instruction Fuzzy Hash: EC01A772714784C3E7258B25F6447E9B7A2F7887D4F844165D64943B98CB3CC565C701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1791019856-0
                                                  • Opcode ID: e67600567bfe96fbbb60148a47ae1074da6cf3433536b878f09fbb7db3c093e2
                                                  • Instruction ID: 45b9c436b47d490b5a4d9e08536cfb82938aa3959ccb8d7ee0337bd7928979e1
                                                  • Opcode Fuzzy Hash: e67600567bfe96fbbb60148a47ae1074da6cf3433536b878f09fbb7db3c093e2
                                                  • Instruction Fuzzy Hash: 7061AE32300641CBEB349F25E6403EDB3A1FB84B40FD48165DB9A93A95DB38E675CB12
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: FchumMbSbWM=$HdbFLydZ2ND5+cnmb/HHN0cpxtHjjKOae5irfWKS4vk=$port
                                                  • API String ID: 0-1124931492
                                                  • Opcode ID: 98394cc9c671d34c5bd172290710d06c125bfd0dc61c7d744a0fab5456db32ca
                                                  • Instruction ID: 6e6384ef9578fc839268c68722b5962f63ebe2281301782475682a65f9851fc2
                                                  • Opcode Fuzzy Hash: 98394cc9c671d34c5bd172290710d06c125bfd0dc61c7d744a0fab5456db32ca
                                                  • Instruction Fuzzy Hash: 96723D72529BC4C6EB60CB24E8803DAB3A5FB99784F505315EACD52B99EF78C194CB00
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Software$exists
                                                  • API String ID: 0-2364128853
                                                  • Opcode ID: fd2a886e43858c5e6e9e42bae0b661c2f91347490d7295cd3dd4aac71e21bb8f
                                                  • Instruction ID: 520c5dbb1184eddff73e6814b51a1ae1c25fbc51fab482480cf5b41c279331f0
                                                  • Opcode Fuzzy Hash: fd2a886e43858c5e6e9e42bae0b661c2f91347490d7295cd3dd4aac71e21bb8f
                                                  • Instruction Fuzzy Hash: 16E28F72650BC4CAEB208F29D9843DD7364FB89B98FA04211EB9D57BA9DF75C690C301
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_fs_convert_narrow_to_wide$__std_fs_code_page
                                                  • String ID: content$filename
                                                  • API String ID: 2896615418-474635906
                                                  • Opcode ID: e46f2122aad82c410b295848d973a698972ecccdd57e13d60428f3c3ef5030ea
                                                  • Instruction ID: e32081ec899fc793055c5c76e68c51da3d0ade6d4d1f19d55340a10559ab9301
                                                  • Opcode Fuzzy Hash: e46f2122aad82c410b295848d973a698972ecccdd57e13d60428f3c3ef5030ea
                                                  • Instruction Fuzzy Hash: 1AC22972619BC4C2DB708B14E4803DAF361FBC9790F905216EADD43AA9EF79C5A4CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteFileModuleNameShell
                                                  • String ID:
                                                  • API String ID: 1703432166-0
                                                  • Opcode ID: f910226d3b54d046a4c2ee7f832830fdb81b1099d40989d1f7f66936b326c7e7
                                                  • Instruction ID: ceca1da27c8f931c5d488bdcd56675e4f3291d46daa8afd7350d79c154683e96
                                                  • Opcode Fuzzy Hash: f910226d3b54d046a4c2ee7f832830fdb81b1099d40989d1f7f66936b326c7e7
                                                  • Instruction Fuzzy Hash: FB121832629FC48ADB408F29E88169EB3B5F789794F506215FEDD57B59EB38C150C700
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionRaise_clrfp
                                                  • String ID:
                                                  • API String ID: 15204871-0
                                                  • Opcode ID: cbf64ba9121148847301cc8f719ae0d59934fa317e5bb9e0b0c4cf2c486d14cb
                                                  • Instruction ID: 0a47f3533977097581d57f32167060404138cce81b3a6dd7deaa817299c28b63
                                                  • Opcode Fuzzy Hash: cbf64ba9121148847301cc8f719ae0d59934fa317e5bb9e0b0c4cf2c486d14cb
                                                  • Instruction Fuzzy Hash: 84B15973610B84CBEB15CF29C98239C77B0F784B88F558952DA9987BB4CB39C961CB11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHeapLast_invalid_parameter_noinfo$AllocFree
                                                  • String ID:
                                                  • API String ID: 749460637-0
                                                  • Opcode ID: b255b449714c885e5a0bb0d6a1e16f5ff3de5fcde9a1ceeb889da3b1d1c00cfb
                                                  • Instruction ID: 337ad79d10371a8e93ea05b57525bed83d5248c1a7d80504bbd6e8f5112ac5b3
                                                  • Opcode Fuzzy Hash: b255b449714c885e5a0bb0d6a1e16f5ff3de5fcde9a1ceeb889da3b1d1c00cfb
                                                  • Instruction Fuzzy Hash: AC61F632305781C3EB209F26A6517EEB391FF95B80F845565AE8947F85FE38C6218B11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalUnprotect
                                                  • String ID:
                                                  • API String ID: 1561624719-0
                                                  • Opcode ID: 1e24a8cc038d9e788c50d72bc66b5103239c069dd5dee8830e5511659a2ec28c
                                                  • Instruction ID: ba70607ebec54ea0fd8cadb3d0bd7ce718ac520ef16c32d3f3f7290bb58e0dae
                                                  • Opcode Fuzzy Hash: 1e24a8cc038d9e788c50d72bc66b5103239c069dd5dee8830e5511659a2ec28c
                                                  • Instruction Fuzzy Hash: 32619B32B14B80CAFB10CFB4E5403DD73A1EB5878CF948225EB8916E9ADB79C1A4C745
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataFreeLocalProtect
                                                  • String ID:
                                                  • API String ID: 2714945720-0
                                                  • Opcode ID: 1b1f0b59f50daae5b913928cb930c74407ec3cf0d3c045937b738d3d3b56883e
                                                  • Instruction ID: 7a8488fc2725951385b51ae612cda56541c9d7e0af35727b902889c494b5ea38
                                                  • Opcode Fuzzy Hash: 1b1f0b59f50daae5b913928cb930c74407ec3cf0d3c045937b738d3d3b56883e
                                                  • Instruction Fuzzy Hash: 9E413533614B80CEE3208F74E5403ED77A4FB5978CF844229EB8916E8ADB79C6A4C755
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterSection
                                                  • String ID: dumps$emoji
                                                  • API String ID: 1904992153-2873254224
                                                  • Opcode ID: 89f21fd7ff167c40c6b685fd52b6794974929237ede9a49185217d6e026611e2
                                                  • Instruction ID: a301b7c861b0c012906f02792feb674b7c4156bed63a0b8e5353747d0a05eaa3
                                                  • Opcode Fuzzy Hash: 89f21fd7ff167c40c6b685fd52b6794974929237ede9a49185217d6e026611e2
                                                  • Instruction Fuzzy Hash: 2BC16A32A51F84CAE700CF39EA812D877B1FB5A788F905255EE8C26B69EF34D161C344
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: e+000$gfff
                                                  • API String ID: 0-3030954782
                                                  • Opcode ID: f7d7acf6635923ecb5a536e0cc5907b1d60ff5164424813373545ae2aaaba18f
                                                  • Instruction ID: ca1d8736a5ca06fc632edde3b884d6085687920fe31f03e6000524442e0b984f
                                                  • Opcode Fuzzy Hash: f7d7acf6635923ecb5a536e0cc5907b1d60ff5164424813373545ae2aaaba18f
                                                  • Instruction Fuzzy Hash: D55177367182C4C7E7288E35AA407E9BB91E745B94F888261CBA84BEC1CB39C5568702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 694665b0a32a073c6327a44d4c6305803ad6deffc27ffcd301aebfd43908e18f
                                                  • Instruction ID: f7f851dee5a3c5a479850f07860755ac4217ffa49e71c0348cef3319d7c50e8e
                                                  • Opcode Fuzzy Hash: 694665b0a32a073c6327a44d4c6305803ad6deffc27ffcd301aebfd43908e18f
                                                  • Instruction Fuzzy Hash: CA028973710B84C6EB14CBA5D4403EEB3A6EB48B98F948222DE9D17B99DF35C5A1C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Info
                                                  • String ID:
                                                  • API String ID: 1807457897-0
                                                  • Opcode ID: 96164b086520156f9a4ab29e2f4e10827f8fcfd3e8ecb2edf7f234c4d657f42c
                                                  • Instruction ID: eb5708773c56322ef11704e841c29ce377f45f459f0c721c5e2488377a7f4f3d
                                                  • Opcode Fuzzy Hash: 96164b086520156f9a4ab29e2f4e10827f8fcfd3e8ecb2edf7f234c4d657f42c
                                                  • Instruction Fuzzy Hash: DB12BE32A08BD4C6E751CF3895047ED73A4FB58B48F859215EF8883696EF35D294CB01
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ae13ed17a61677afdb80beac7f468d9955fd991688634fe67f07a5118aa9c0a
                                                  • Instruction ID: 463b2480d9bbcaeaeb42964a1c53c3d2bfcf49c449cf7765bb46d9b6ae323eb9
                                                  • Opcode Fuzzy Hash: 5ae13ed17a61677afdb80beac7f468d9955fd991688634fe67f07a5118aa9c0a
                                                  • Instruction Fuzzy Hash: D6E18C72700B90C6E720DB61E5407EE77A4FB99B88F8186629F9D53B96EF38C254C701
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %
                                                  • API String ID: 0-2567322570
                                                  • Opcode ID: 0d4475c43f23c8ec1a1d4476fa06b162d9d1a11d1c05aa50102c02388e884ba3
                                                  • Instruction ID: 86c0ac85ab913ce19e26a71f49e5467522730322b8c1613ae61d5dd8710daddc
                                                  • Opcode Fuzzy Hash: 0d4475c43f23c8ec1a1d4476fa06b162d9d1a11d1c05aa50102c02388e884ba3
                                                  • Instruction Fuzzy Hash: BC121232704BC4CAFB29CFA5D4103EDA7B1EB55788F844216EE4A27B89DB39C465C742
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 347e54d5a13c956be7cd698dc90638a669ffa989abad20f87f94c84d8599c0d6
                                                  • Instruction ID: 8017f27140d7288d87f4c1d3ec98db579d85ed9cec733195db5f9d66928308b8
                                                  • Opcode Fuzzy Hash: 347e54d5a13c956be7cd698dc90638a669ffa989abad20f87f94c84d8599c0d6
                                                  • Instruction Fuzzy Hash: 4EA17772601B98CAEB01CB69D8803ECB7B0F799B88F948416DF8D57B59DB39C1A1C351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 8230080c39ec98acddb00a96bf5ae377e0064c30a013f7fc6a5e0fe4b300c046
                                                  • Instruction ID: 29e3ea80a5d91abd8cc9c2891de5dd1cb021adab80c851643d82a4bf398932e2
                                                  • Opcode Fuzzy Hash: 8230080c39ec98acddb00a96bf5ae377e0064c30a013f7fc6a5e0fe4b300c046
                                                  • Instruction Fuzzy Hash: C3A19932615B98CAEB00CBA9D8803ECB7B0F798B48F948516DF8D57B59DB39C1A1C351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: 38021ef5b019370fe08054ad70401da03efec02ddda1724ddd20f961e2ef4444
                                                  • Instruction ID: dd4f7f4621600094a2fbbd4858545250a37809296458e4b8f9759d61c116bb96
                                                  • Opcode Fuzzy Hash: 38021ef5b019370fe08054ad70401da03efec02ddda1724ddd20f961e2ef4444
                                                  • Instruction Fuzzy Hash: 1EA1AA72615B98CAEB00CBA9D4803ECB7B0FB99B88F948516DF8D17B55DB39C0A1C301
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: e7cf38834f5355907c828507a72a25953d657d233342f84dd9427b185fd96a7b
                                                  • Instruction ID: 85ebe37236eadbed244aeccdbcad8b94aa798aa0966aa3e57b61cace259f52b9
                                                  • Opcode Fuzzy Hash: e7cf38834f5355907c828507a72a25953d657d233342f84dd9427b185fd96a7b
                                                  • Instruction Fuzzy Hash: AFA18972711B98CAEB00CBA9D8803ECA7B0F759B48F948416CF8D57B59DB79C1A1C341
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task
                                                  • String ID:
                                                  • API String ID: 118556049-0
                                                  • Opcode ID: c2d40fcef9386a63fa6140481a3623f546cf2aac0fb24fac63482f73a5cc29fb
                                                  • Instruction ID: 513e0d1cec5d7e8d7212e12e434255ba18387b3130aa9d970730b4d2c14f895b
                                                  • Opcode Fuzzy Hash: c2d40fcef9386a63fa6140481a3623f546cf2aac0fb24fac63482f73a5cc29fb
                                                  • Instruction Fuzzy Hash: BDA15672605B98CAEB00CBA9D8803ECA7B0F795B88F948416DF8D57B59DF79C0A1C351
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 474895018-0
                                                  • Opcode ID: 06790a4295a3107e2dbbee03963e66067c54e8b338688e48600b3255dd4e86cc
                                                  • Instruction ID: 1146cdfee9be45ab45ce36cd07b1b216885fdccb297afed5b2a666bb7b4b2917
                                                  • Opcode Fuzzy Hash: 06790a4295a3107e2dbbee03963e66067c54e8b338688e48600b3255dd4e86cc
                                                  • Instruction Fuzzy Hash: 22612732B14290C7FB749A68C5447EDB291AF80760F9943A9DA398B7D1E675CC618703
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue$InfoLocale
                                                  • String ID:
                                                  • API String ID: 673564084-0
                                                  • Opcode ID: 26972a3f8ec8664294c930cd51fb86fe8abaacfcc16369afc2f7ca5bbb20aff8
                                                  • Instruction ID: 1b95c0a70f3ebb165c31cfb1a2ad205b2d50011de22703c7aea650c28bffe2a8
                                                  • Opcode Fuzzy Hash: 26972a3f8ec8664294c930cd51fb86fe8abaacfcc16369afc2f7ca5bbb20aff8
                                                  • Instruction Fuzzy Hash: 08318232704681C7FB68DF26E6413DA73A1FB88780FC481659A5983B86DF38D665C742
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                  • String ID:
                                                  • API String ID: 3029459697-0
                                                  • Opcode ID: 545877f1b48be7b9932d6e1bd4acb48e8ec6ab1aa6b15a7524e22e0cca3c5db5
                                                  • Instruction ID: 7508a64eca7b3042d73b0844d7c531dc0ac6952149ccba885d2422b1ed20da8b
                                                  • Opcode Fuzzy Hash: 545877f1b48be7b9932d6e1bd4acb48e8ec6ab1aa6b15a7524e22e0cca3c5db5
                                                  • Instruction Fuzzy Hash: 0C11B1B3A14644CBEB148F1AD1407EC7BA1FB90FA0FC48155D665437C0DA34C6E1C751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .
                                                  • API String ID: 0-248832578
                                                  • Opcode ID: 12a7e4541c2ed35f9cf3a3c3ac00b32631fc0276b8037fb8a9bf4062ea6a643e
                                                  • Instruction ID: 795d6493fdaf6b02ae5a57a244101e92538bfef2ef931168cca40a1d6a4f558d
                                                  • Opcode Fuzzy Hash: 12a7e4541c2ed35f9cf3a3c3ac00b32631fc0276b8037fb8a9bf4062ea6a643e
                                                  • Instruction Fuzzy Hash: A6C1A372200B84C7EB60CF26D5543EDA3A2FB58794FD44211EF9947B99DB7AC8A1C702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystemValue
                                                  • String ID:
                                                  • API String ID: 3029459697-0
                                                  • Opcode ID: 9a12b1fb76cf22861b2f448ca0e92b673a6715a3d8d74ac81b673a24401075ac
                                                  • Instruction ID: 9ba9fbc5757adbaece37d36157ec545c737fb530c6fa10a53a64d2bea65253b0
                                                  • Opcode Fuzzy Hash: 9a12b1fb76cf22861b2f448ca0e92b673a6715a3d8d74ac81b673a24401075ac
                                                  • Instruction Fuzzy Hash: DC01F772B04280CBEB204F15F5407DD76E2EB80BA4FC5C261D62547AC8CB74C9A1C712
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumLocalesSystem
                                                  • String ID:
                                                  • API String ID: 2099609381-0
                                                  • Opcode ID: 3ab42c288a21d81e2ffe37b664d861115ee0eba558140e8c864f0cc5d19cbbb4
                                                  • Instruction ID: de0b206431ef68487b94f697133a4b3ea2a46a5c213f67279d794da2e82084a1
                                                  • Opcode Fuzzy Hash: 3ab42c288a21d81e2ffe37b664d861115ee0eba558140e8c864f0cc5d19cbbb4
                                                  • Instruction Fuzzy Hash: 45F08772300B44C3E700DF2AFA806D96362FB89B80F849129EA5983364EF38C4B1CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Time$FileSystem
                                                  • String ID:
                                                  • API String ID: 2086374402-0
                                                  • Opcode ID: 713c3d38103c6f848aca492c9c1a39ab827052b45dc84a8fea4063941d8e3ae6
                                                  • Instruction ID: d12b76d280a74f52204d0caaa196094beb2f81c436f8c831e9ebf694dd443811
                                                  • Opcode Fuzzy Hash: 713c3d38103c6f848aca492c9c1a39ab827052b45dc84a8fea4063941d8e3ae6
                                                  • Instruction Fuzzy Hash: 41F027B2B2554C83EF04871594143A8E281AF68BF4FD06720AE3A0E7C8EB1DC0668701
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BlanketCreateInstanceProxy
                                                  • String ID:
                                                  • API String ID: 1899829610-0
                                                  • Opcode ID: 8a3e6e1c51c001c4c0da1831722352a0c161e157014927c20211d47a8b45fbac
                                                  • Instruction ID: e5a981f08015e8566058d881023b3b6ea23fbc8822d57032e78a8389250156ae
                                                  • Opcode Fuzzy Hash: 8a3e6e1c51c001c4c0da1831722352a0c161e157014927c20211d47a8b45fbac
                                                  • Instruction Fuzzy Hash: 6AF01C32701B44DBFB21CF70D5402EDB771FB88708F944256DA8A52A64DF25C229C382
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: gfffffff
                                                  • API String ID: 0-1523873471
                                                  • Opcode ID: fdcb331307c883477c1ebbb26715ba124aeb4ca5a2bdfa5a0e441948dc03e22f
                                                  • Instruction ID: 7419ab60f4a8dbb205a69c21c9e06964bcdb33c8a836855557e414305c198941
                                                  • Opcode Fuzzy Hash: fdcb331307c883477c1ebbb26715ba124aeb4ca5a2bdfa5a0e441948dc03e22f
                                                  • Instruction Fuzzy Hash: 13A132737047C487EB25CB29A0107DABB91EB55B84F858122DE89477C6EE3EC915CB02
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID: 0-3916222277
                                                  • Opcode ID: 8963ced5e9b6de3aab59e757bdcd7ba08b4f4af4977f145d74a5134f21bc2d58
                                                  • Instruction ID: 7439efd670bef863f83690688bf0bf4f7a74216ff569d7477a9e80b19724367f
                                                  • Opcode Fuzzy Hash: 8963ced5e9b6de3aab59e757bdcd7ba08b4f4af4977f145d74a5134f21bc2d58
                                                  • Instruction Fuzzy Hash: 22B18D73204794C7E7658F39C0507ADBBA0EB09B48FA90219CB5A07795DB37C861DB46
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: 821eb4daeda04d3c8aa90b2308e45ed5b1180566e4f4d070028705abe430cb4e
                                                  • Instruction ID: 3e636a58cb2bd908958c4b254cd2064a1364271a7fb3357f5729a0ac44df2722
                                                  • Opcode Fuzzy Hash: 821eb4daeda04d3c8aa90b2308e45ed5b1180566e4f4d070028705abe430cb4e
                                                  • Instruction Fuzzy Hash: CBB09230A23A49C3EB186B116E4238823A5BF8AB00FC84098804C81320DB2C01B54702
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef8bea2b9e28876f8b9b4e4824cd7716e0e946dc2cd3a10c77a8e21eeaef7e74
                                                  • Instruction ID: d5261cffb0bf90a8087a7be90112832713d550244784a5ce45557e5136a55b46
                                                  • Opcode Fuzzy Hash: ef8bea2b9e28876f8b9b4e4824cd7716e0e946dc2cd3a10c77a8e21eeaef7e74
                                                  • Instruction Fuzzy Hash: 07724932604BC4CAEB71CF24E8403D9B7A5F789798F905215EA9C5BB99EF39C294C704
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c4b664f3ee2bea4bb10d9a368a7c1c53d52f1da23547b0bd426001d6e8c04f18
                                                  • Instruction ID: 5d37a357ce5b593debc742bd5a724854f053915eafbba2f417ddd033de1f5c56
                                                  • Opcode Fuzzy Hash: c4b664f3ee2bea4bb10d9a368a7c1c53d52f1da23547b0bd426001d6e8c04f18
                                                  • Instruction Fuzzy Hash: 3562A231625F94CBEB939F35AA217D56364BF563C0FC19393E80A77650DB78C4628A02
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e65b2f4e4bbc789700892bdf0031f1e8fb899c5dabc392f52dc38f2e5a2dcae9
                                                  • Instruction ID: 631ec9d80fbd9b80f1d617e1bac44a3567bc1c50cdb491a7f4adf2b3c3eb8997
                                                  • Opcode Fuzzy Hash: e65b2f4e4bbc789700892bdf0031f1e8fb899c5dabc392f52dc38f2e5a2dcae9
                                                  • Instruction Fuzzy Hash: 67D1C936610644C7FB788F2985007EDB7A1EB49B48FA4420ADE59077D9DB37C8A2DF42
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 4023145424-0
                                                  • Opcode ID: eea443f3bcc904fb54bee0150b0c4244d957023c928811ec97b6a0afa435460c
                                                  • Instruction ID: 8fa6e004f0021429f1c35e059e9aa0209ba17e77c7ddfeca3e8ac8ebcbe7062b
                                                  • Opcode Fuzzy Hash: eea443f3bcc904fb54bee0150b0c4244d957023c928811ec97b6a0afa435460c
                                                  • Instruction Fuzzy Hash: D6C1A636204780C6EB609B61D9107EEA7A1FF94B88FC04015DE8A57BE5EB3EC565CB02
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6232c3cce7012c161286b434481a23847154d354bc60381b5c84130f59901b81
                                                  • Instruction ID: e64c1eb2b277453e3e777c4b7f12f48860d5c60ec2d3c901fe4adcacfa0e7f70
                                                  • Opcode Fuzzy Hash: 6232c3cce7012c161286b434481a23847154d354bc60381b5c84130f59901b81
                                                  • Instruction Fuzzy Hash: 2F02C232A15FC48DE7628F39E8913D9B7A4F79D788F105215EB9C2AB59EB70C264C340
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 30b1ff37c9c8c0ed2c94d0b59bfc79a613658ca63d3a8af0ff9b007705a1e65b
                                                  • Instruction ID: 56ff0dccd2d669ab619aacb75eb525e548e5830ca91be767e53156399231c188
                                                  • Opcode Fuzzy Hash: 30b1ff37c9c8c0ed2c94d0b59bfc79a613658ca63d3a8af0ff9b007705a1e65b
                                                  • Instruction Fuzzy Hash: C0918837314240CBFF294E2994207F9E6C0AF52794FD413289E66577C4CABAC926DF92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b64f3173518c63d885d234e93cc0a50cd31abaa228072904e3532190c524c3b3
                                                  • Instruction ID: 9b1d951dc2cbc9746efdd739ab40493203cca56d013930dbf9449d75c2b86aa7
                                                  • Opcode Fuzzy Hash: b64f3173518c63d885d234e93cc0a50cd31abaa228072904e3532190c524c3b3
                                                  • Instruction Fuzzy Hash: 4DB18E72204B94C7E7698F3AC4503EDBBA0F749B48FA8111ADF4A07399CB76C461CB46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: fa4cd667469d4b0a1c5e9f271b4667fcf9c76d7785ea79ecd5508c77b1f82ccc
                                                  • Instruction ID: bda38396c865ece23d6e3327c772f35c6c412b7890be9324e6524c77654d2b06
                                                  • Opcode Fuzzy Hash: fa4cd667469d4b0a1c5e9f271b4667fcf9c76d7785ea79ecd5508c77b1f82ccc
                                                  • Instruction Fuzzy Hash: 0C81B072300A50C7EB64CF25C5953AD63A0FB84B98F948626EE2E97B95CF3AC161C741
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 849eb030a3b6be4593520a5be339f4b3e181f24299b72aa228ec8ecff61ba610
                                                  • Instruction ID: 745d4ea7b651071f545d6b511957a4dec1a4068c05c94742341574a26bf4b1f1
                                                  • Opcode Fuzzy Hash: 849eb030a3b6be4593520a5be339f4b3e181f24299b72aa228ec8ecff61ba610
                                                  • Instruction Fuzzy Hash: 8FB10532A15FC88DD7208F79E8413DAB7B4F79A798F901215EACC26B19EB74C260C701
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c35c59ce87947df84fa0d3a28c55520bd187c5527440cbecb115127f07f88ba
                                                  • Instruction ID: 4603f97ad241aeb2877c993958b1a3296a4f21f62ffac5e0d9bcd6ffee74787e
                                                  • Opcode Fuzzy Hash: 9c35c59ce87947df84fa0d3a28c55520bd187c5527440cbecb115127f07f88ba
                                                  • Instruction Fuzzy Hash: E381F872608780C7EB74CF1A95403EAB690FB857D4F944225DB9943FD5CB3DC6508B11
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5ec938e2278b14a04dbb626e947d484f460c30e86730ef98d8f8e7ce8a528cec
                                                  • Instruction ID: 6c65e28ed7fa164cf95bc09d6eda64a10c25c359df59491d90cf14428408ab04
                                                  • Opcode Fuzzy Hash: 5ec938e2278b14a04dbb626e947d484f460c30e86730ef98d8f8e7ce8a528cec
                                                  • Instruction Fuzzy Hash: 576106B2710A88C3EF248F69D4466ECA361FB587D4F959222EF5D47B84DE3AD1A1C301
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec3095b0a070363a6b3d0b209bb6e6fc7c1252a045829612813a27797fc13bfd
                                                  • Instruction ID: 077a13ae4b32f22a623a46063eb353329e57d29a317785a84377699910921115
                                                  • Opcode Fuzzy Hash: ec3095b0a070363a6b3d0b209bb6e6fc7c1252a045829612813a27797fc13bfd
                                                  • Instruction Fuzzy Hash: 9661EE2321E2C48FD30EDF7C589106D7F61D3A7908388469DEAC5EBB4BC504C91ACBA6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32622de27a61a8a2e5330a76705853dc24aae8fd8be83df1bd1a29b95d32b718
                                                  • Instruction ID: b9c588a418d730043c49fa907d26bce0d39188cc8d84597042d60fe2a73c212e
                                                  • Opcode Fuzzy Hash: 32622de27a61a8a2e5330a76705853dc24aae8fd8be83df1bd1a29b95d32b718
                                                  • Instruction Fuzzy Hash: 3351C3AB94EAC48BF7B24A280D662C81F94EF62B14FCD70DAC740873C3D55A5A158393
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 15eac905c6263da8fcd042729b4cf6c2eac0663125a33ca76778ac8e5de10585
                                                  • Instruction ID: c993c8c53dc4c1b26984d0e782a289394175055ca2165dbb53c016a43c8c0c69
                                                  • Opcode Fuzzy Hash: 15eac905c6263da8fcd042729b4cf6c2eac0663125a33ca76778ac8e5de10585
                                                  • Instruction Fuzzy Hash: 9351BC77210650C3EB288F29C1643BCB7A1EB55F58F950118DF6A1B799CB22DCA2CB81
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65988544bd8c51d46c1f2ecd44d2c2020be5c6c9d2ff497e3ff94f9df2993759
                                                  • Instruction ID: 00d43f79438c9da48356756e68dd8c461b3938ecdfbe13836694c8bd920bd2b5
                                                  • Opcode Fuzzy Hash: 65988544bd8c51d46c1f2ecd44d2c2020be5c6c9d2ff497e3ff94f9df2993759
                                                  • Instruction Fuzzy Hash: CE51BB77604650C3E7288F28C2643FCA7A1EB55B58FA54119CF5A177A8CB26DCA2CF81
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 09a4a0272fcb28be4f4c2347f47eb615663c13edcd1074745415d1c72bb9a049
                                                  • Instruction ID: 56b31379abd1bf3959f6f0663710dd0693db34586e2d9daf4c8f77a1223c0d5a
                                                  • Opcode Fuzzy Hash: 09a4a0272fcb28be4f4c2347f47eb615663c13edcd1074745415d1c72bb9a049
                                                  • Instruction Fuzzy Hash: 3D519BB3610650C7E7288F28C1643BCABB0EB55B58F954119CF5A2B799CB27DCA1CF81
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 485612231-0
                                                  • Opcode ID: 524a67a308e0381021d23f137e11a16671e3ac2dcb6a1eb552cac3911bac65d9
                                                  • Instruction ID: da0659341f0c431e9caf20cc409e1d3b7cd42ddba6c071c683d97b5d345e17a6
                                                  • Opcode Fuzzy Hash: 524a67a308e0381021d23f137e11a16671e3ac2dcb6a1eb552cac3911bac65d9
                                                  • Instruction Fuzzy Hash: 3041B033310A54C2EF04CF2AEA142D9B3A1AB48FD4F899126EE4D97B58DF3CC5928701
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d19410ad7230259186e62de70c501f604483edc097cd3d5680812bf89975e4c9
                                                  • Instruction ID: 37cae6a6154538328bc67ccbd789fee3c1cb87e33ffedf68f01ada2411ea0d2b
                                                  • Opcode Fuzzy Hash: d19410ad7230259186e62de70c501f604483edc097cd3d5680812bf89975e4c9
                                                  • Instruction Fuzzy Hash: AF31B49B95DAC58BF3B249280D671C81FE4EB62B14F8E70CAC740873C7D55A49198753
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 938643a2e72afeb32524c677afc066cef9a073125af7897a2a4558e983be0b23
                                                  • Instruction ID: f682a038837d55b9e2df6831d027efe324aa75ae2d86f37b1a98aa9693e2fab7
                                                  • Opcode Fuzzy Hash: 938643a2e72afeb32524c677afc066cef9a073125af7897a2a4558e983be0b23
                                                  • Instruction Fuzzy Hash: 7331949B95EAC18BF3B249280D671C81FE5EB62B14F8E70CAC740873C7D55A49198753
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7e51f03ad5b1bc1da5b5b4d0cb77678dcf910ea01579b6d52af028a58c4ca108
                                                  • Instruction ID: e6472cfd919f03db14f5cfdbe59d88d076f00b1ee61ae063a7774732c12b4d10
                                                  • Opcode Fuzzy Hash: 7e51f03ad5b1bc1da5b5b4d0cb77678dcf910ea01579b6d52af028a58c4ca108
                                                  • Instruction Fuzzy Hash: 611100AB54E9C18BF3B249240F972C81BD0FB62B24F8D20CEDB4087283D5469A2953C3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 802a02f397435f7a2983d68343294454bc351265127295eb8017025d374bf0fa
                                                  • Instruction ID: 2acd5f021c3522d80acb9d6d3964bc943cb08d3d78699d9f3cfb9398e7bbb67f
                                                  • Opcode Fuzzy Hash: 802a02f397435f7a2983d68343294454bc351265127295eb8017025d374bf0fa
                                                  • Instruction Fuzzy Hash: AA01A1A751E6C08BF7734A294E7A6D82FA0AB56F40FCD90DBC390872C3D5090D2587A3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d140950b30a8c0819f409446343fd7a16b42e04218d9a303406ff1e5d3a830a6
                                                  • Instruction ID: 228e894e9867543ed86170d36645890a1338accfce7d204cfee267be0b0d7c9f
                                                  • Opcode Fuzzy Hash: d140950b30a8c0819f409446343fd7a16b42e04218d9a303406ff1e5d3a830a6
                                                  • Instruction Fuzzy Hash: EC0191AFD4D9C58BF7B149140AD72C41BD9EF62758F8970C9C7408B3C7E94A4A2B4683
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b47b12ad1dd9cb6d4a9d9e2362430c60ebee91eeab1b6ea40ce17222472a3128
                                                  • Instruction ID: 8b75a28009da2edf0da56535817584fcc8f02f2db389f2607f8fb1513c314880
                                                  • Opcode Fuzzy Hash: b47b12ad1dd9cb6d4a9d9e2362430c60ebee91eeab1b6ea40ce17222472a3128
                                                  • Instruction Fuzzy Hash: 59C09BDB50E5C587F371551D057D7CC3F949F12A10FC8648DC7B045157D44505574B97
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$Token$Process32$InformationNextOpenProcess$ConvertCreateDuplicateErrorFirstLastSnapshotStringToolhelp32_invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 1854266383-0
                                                  • Opcode ID: c6496b269248900584d7fd2b61856a7f51f25a84bdd1b29fe432eca5ef48a86e
                                                  • Instruction ID: cafe539df870c7b16f296b6c165ca5116184ab7441e8989d8e152cd74bc4dc5f
                                                  • Opcode Fuzzy Hash: c6496b269248900584d7fd2b61856a7f51f25a84bdd1b29fe432eca5ef48a86e
                                                  • Instruction Fuzzy Hash: 9B815D32214B80C7EB60CF26E9407DEB3A4FB88B94F805155EE8947B68DF79C665CB41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: No closed word$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                                                  • API String ID: 0-2700065129
                                                  • Opcode ID: 35ebc0e4c6ce7c451108ec51098032febae9265251e742270f516eca66df3e48
                                                  • Instruction ID: d9bc2d025dd2d7cfeb50c842b51e75786489e9eccd93d50277eaeec89ced344a
                                                  • Opcode Fuzzy Hash: 35ebc0e4c6ce7c451108ec51098032febae9265251e742270f516eca66df3e48
                                                  • Instruction Fuzzy Hash: E5A13C32524AC5D6EB64EF20ED803DA7765FF90348FD05452FA8A0697ADF78C6A9C301
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name$false$true
                                                  • API String ID: 164343898-1062449267
                                                  • Opcode ID: 0b2b8b1ebde26f0327f7eb5f0c4ac08a6e82aecb28469974c04ea552e424ff36
                                                  • Instruction ID: 2c1ce1dc544ec73929160bf0c4a0278ecfd1425975753aaf5d9894dd2df6b3e5
                                                  • Opcode Fuzzy Hash: 0b2b8b1ebde26f0327f7eb5f0c4ac08a6e82aecb28469974c04ea552e424ff36
                                                  • Instruction Fuzzy Hash: 87718932701B40CBEB24DFA0E5503ED77B6EF84B08F944129AE4867B99DB39C421D746
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Session$ListProcess$CriticalCurrentEnterRegisterResourcesSectionStart
                                                  • String ID:
                                                  • API String ID: 3572076967-0
                                                  • Opcode ID: d817a67acd6db6480a775f706d479f0e5b7ae8bde52ed5eae0e180c41ccf0277
                                                  • Instruction ID: 23bece05b86cee9213a68428a96e131f76b6e7c54bf88d8909425eee825439ee
                                                  • Opcode Fuzzy Hash: d817a67acd6db6480a775f706d479f0e5b7ae8bde52ed5eae0e180c41ccf0277
                                                  • Instruction Fuzzy Hash: FB514A32B10600CBF724CFA5E9407DCB3B9FB88754F80452ADA4A53B98DF349965CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: 0$f$p$p
                                                  • API String ID: 3215553584-1202675169
                                                  • Opcode ID: ddb5b90cffe7d2d3e0c664012388527694b11d3f7d0ea02711828fb826aaea95
                                                  • Instruction ID: e53f7d2a1b680502e6081b5328581b44ea2cd1c4acf2f3fe86975e23b9b95b70
                                                  • Opcode Fuzzy Hash: ddb5b90cffe7d2d3e0c664012388527694b11d3f7d0ea02711828fb826aaea95
                                                  • Instruction Fuzzy Hash: 0E12C372705241C7FB349E19E1487EEF6AAFB80754FD84115E6924BAC8D77AC9B08F02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeLibraryProc
                                                  • String ID: api-ms-$ext-ms-
                                                  • API String ID: 3013587201-537541572
                                                  • Opcode ID: 12135105b5f4dd6ea4bcef39dd476f6d9ed135b4d13e617c32e3e87089a7a057
                                                  • Instruction ID: 1248d40421ac166be686540e623962f63774f96bf1d7c23933fd81700527eff8
                                                  • Opcode Fuzzy Hash: 12135105b5f4dd6ea4bcef39dd476f6d9ed135b4d13e617c32e3e87089a7a057
                                                  • Instruction Fuzzy Hash: 2741E172311600C3FB259B269A047D9A391FF45BE0FC88125ED098B798EF39C462C742
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseFileHandleOpenRead
                                                  • String ID: File Downloader
                                                  • API String ID: 4038090926-3631955488
                                                  • Opcode ID: 3ee79157f89af13d5e06345f82add2bd8ba9855f0618fbf83edde4809386b858
                                                  • Instruction ID: 5b684b2e624b277e487976bf4e544432744e866659bfdad3b68b9d843f3189da
                                                  • Opcode Fuzzy Hash: 3ee79157f89af13d5e06345f82add2bd8ba9855f0618fbf83edde4809386b858
                                                  • Instruction Fuzzy Hash: 04316B32214B84C7EB208F26F5507EAB7A0FB89BC4F945016EE8943B58DF79D1A1CB41
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                  • String ID: CONOUT$
                                                  • API String ID: 3230265001-3130406586
                                                  • Opcode ID: 224f991252595473e360711b9ed6629489629b1a0c31b547de0f3402cf39e5f5
                                                  • Instruction ID: b3be1e9f3c399a84fb0728e6dc908d3a9a4847dd716e8d6fcdf5fa1e50110071
                                                  • Opcode Fuzzy Hash: 224f991252595473e360711b9ed6629489629b1a0c31b547de0f3402cf39e5f5
                                                  • Instruction Fuzzy Hash: 3B11B232710B40C7E3608F46EA543D9B7A0FB88FE4F800254EA1987BA8DF7CC6648745
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$CompareInfoString
                                                  • String ID:
                                                  • API String ID: 2984826149-0
                                                  • Opcode ID: f9a507bb13e9e0357262f9cd78c472a85d4b7cc200172b173b9b3c32d6c59667
                                                  • Instruction ID: 5de94da8d7a715b0ddf36e969d5a5d91ad636e1d1051d999084d2618d5f033d0
                                                  • Opcode Fuzzy Hash: f9a507bb13e9e0357262f9cd78c472a85d4b7cc200172b173b9b3c32d6c59667
                                                  • Instruction Fuzzy Hash: 6AA1C132304788C7FF348F2596403EA6691EF46BA8FC846B5FA5907BC5DB78C9658342
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ImpersonateLoggedRevertSelfUser
                                                  • String ID: APPB
                                                  • API String ID: 1724704203-1278849820
                                                  • Opcode ID: 7f7f5109e41dca8e66b5236d4894fffc124ff912079303a337b41852e6f7daf8
                                                  • Instruction ID: 4dc9e693f6fdb94137b96088ce964282c79b1f6ddcc99f696a15b45d0f4f6a69
                                                  • Opcode Fuzzy Hash: 7f7f5109e41dca8e66b5236d4894fffc124ff912079303a337b41852e6f7daf8
                                                  • Instruction Fuzzy Hash: 6812AD72B10794CAFF109BB8D9443DD6B61EB497A8F905201EA6D17EEADF79C091C302
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiStringWide
                                                  • String ID:
                                                  • API String ID: 2829165498-0
                                                  • Opcode ID: 568cdcc071fa6e11a5db189a350f89fe32867b41da656cec5731020258f84116
                                                  • Instruction ID: 5b821e0c854c7f8f201c0c8371cb8e38d2083d2e2185e62565cb5cff5d0d06b3
                                                  • Opcode Fuzzy Hash: 568cdcc071fa6e11a5db189a350f89fe32867b41da656cec5731020258f84116
                                                  • Instruction Fuzzy Hash: CA81C072210784C7EB648F61E5403EAB7E1FF95BA8F840265FE6917BD8DB38C4568702
                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 0000012A222F9D1B
                                                  • FlsSetValue.KERNEL32(?,?,8000000000000000,0000012A222F5E25,?,?,?,?,0000012A222FCF40), ref: 0000012A222F9D51
                                                  • FlsSetValue.KERNEL32(?,?,8000000000000000,0000012A222F5E25,?,?,?,?,0000012A222FCF40), ref: 0000012A222F9D7E
                                                  • FlsSetValue.KERNEL32(?,?,8000000000000000,0000012A222F5E25,?,?,?,?,0000012A222FCF40), ref: 0000012A222F9D8F
                                                  • FlsSetValue.KERNEL32(?,?,8000000000000000,0000012A222F5E25,?,?,?,?,0000012A222FCF40), ref: 0000012A222F9DA0
                                                  • SetLastError.KERNEL32 ref: 0000012A222F9DBB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$ErrorLast
                                                  • String ID:
                                                  • API String ID: 2506987500-0
                                                  • Opcode ID: 0291658c5b6c0106ab0d2cb5e60e5aeecda8532e62d2d16efa8b2628965b4a39
                                                  • Instruction ID: 0d747169887bff73c4a5e7bbc3572ffcf151efdf135fc95869ef0eb25c7b320f
                                                  • Opcode Fuzzy Hash: 0291658c5b6c0106ab0d2cb5e60e5aeecda8532e62d2d16efa8b2628965b4a39
                                                  • Instruction Fuzzy Hash: 64117F32304740C3FB78A73597613EDA2929F85BB0FA44724B8361B7D6DE6A94618F07
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 8a1d3a3be8c220392397c732354a95df63a527e80713268e78113875a5d94587
                                                  • Instruction ID: 7aa3f4232a135c8bf75632657a9d83cc2b94625ae8de57aac78ceed76121bd23
                                                  • Opcode Fuzzy Hash: 8a1d3a3be8c220392397c732354a95df63a527e80713268e78113875a5d94587
                                                  • Instruction Fuzzy Hash: 23F09071311B04C3FB248B24E9483EA6360EF89BB1FD42255CA6A467E4CF2CC369C352
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: a8e7f674e444c430dcab0a326aefe8bd211f8fcb11616e81174b6f6b026ae09c
                                                  • Instruction ID: 036a83371b9395ae8f1228f89e32aa68721e62a75aec579f49a6d34c9b0aec71
                                                  • Opcode Fuzzy Hash: a8e7f674e444c430dcab0a326aefe8bd211f8fcb11616e81174b6f6b026ae09c
                                                  • Instruction Fuzzy Hash: E0811832114B44C7F37A8F35A6403EB6360FF45794F844381FA9526EE5D734CBA28616
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 8fe47afb3800f68be13bbe9b63e2be9326a40284285b68905b179da7a6afdabd
                                                  • Instruction ID: 837deb79be7828087b26ab1eb06abf85ff31733573e4bb0e45d999caa80b1fb6
                                                  • Opcode Fuzzy Hash: 8fe47afb3800f68be13bbe9b63e2be9326a40284285b68905b179da7a6afdabd
                                                  • Instruction Fuzzy Hash: E051A472105B84C7E7629F25D4603EDBBD4AF57B44FC98101CAC84B386DABB8865CB83
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _set_statfp
                                                  • String ID:
                                                  • API String ID: 1156100317-0
                                                  • Opcode ID: bd658b213281b8180d680cb5284e660fc3441ab3d2b441db00ad661a662aa27e
                                                  • Instruction ID: 1360b881809a07562b22eef2cbd2a3d9006574860667ec5039f4f7a16285a45a
                                                  • Opcode Fuzzy Hash: bd658b213281b8180d680cb5284e660fc3441ab3d2b441db00ad661a662aa27e
                                                  • Instruction Fuzzy Hash: E411E972A20B05C7F7581129E7463E510406F593B0FD40EA4BBBA06EE78A94CB69533F
                                                  APIs
                                                  • FlsGetValue.KERNEL32(?,?,?,0000012A222F1617,?,?,00000000,0000012A222F18B2,?,?,?,?,8000000000000000,0000012A222F183E), ref: 0000012A222F9DF3
                                                  • FlsSetValue.KERNEL32(?,?,?,0000012A222F1617,?,?,00000000,0000012A222F18B2,?,?,?,?,8000000000000000,0000012A222F183E), ref: 0000012A222F9E12
                                                  • FlsSetValue.KERNEL32(?,?,?,0000012A222F1617,?,?,00000000,0000012A222F18B2,?,?,?,?,8000000000000000,0000012A222F183E), ref: 0000012A222F9E3A
                                                  • FlsSetValue.KERNEL32(?,?,?,0000012A222F1617,?,?,00000000,0000012A222F18B2,?,?,?,?,8000000000000000,0000012A222F183E), ref: 0000012A222F9E4B
                                                  • FlsSetValue.KERNEL32(?,?,?,0000012A222F1617,?,?,00000000,0000012A222F18B2,?,?,?,?,8000000000000000,0000012A222F183E), ref: 0000012A222F9E5C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: f55f60610ccbbd11ac5afcea04d06306d007cbd4dfe34afa1d74e38bb4d8ccd3
                                                  • Instruction ID: a9a2b4a960232b4a4fe5bd950c1a2abfca68b4786f1eda097d2da2641045cb24
                                                  • Opcode Fuzzy Hash: f55f60610ccbbd11ac5afcea04d06306d007cbd4dfe34afa1d74e38bb4d8ccd3
                                                  • Instruction Fuzzy Hash: EE119031304740C3FB68A32697513E9E2929F957F0F884726693A166D6EE2BC4618F07
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value
                                                  • String ID:
                                                  • API String ID: 3702945584-0
                                                  • Opcode ID: 42cfa90bd700e5d3fc50fa41c25dc326aaa7814977aea507f23d9374e29609b8
                                                  • Instruction ID: 58c8d0fc80df09d32d3920c72a31b39f8f54323056b99e082f45b28284639c7f
                                                  • Opcode Fuzzy Hash: 42cfa90bd700e5d3fc50fa41c25dc326aaa7814977aea507f23d9374e29609b8
                                                  • Instruction Fuzzy Hash: D2114031244741C3FF78B33595627E992918F85770FD80B24A9361A2D6EE2F98718F0B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                  • API String ID: 3215553584-1196891531
                                                  • Opcode ID: 0524d665bc5a06fd11eb7e2e04d7f90da3eaa764dfd4209342eddcaac0b5d37c
                                                  • Instruction ID: 827111e5c6b586276e2f7c451de0a58a7a4eedbcf7ee8379d7d0522c1531aee4
                                                  • Opcode Fuzzy Hash: 0524d665bc5a06fd11eb7e2e04d7f90da3eaa764dfd4209342eddcaac0b5d37c
                                                  • Instruction Fuzzy Hash: 0081A972604340D7FB658F29C7503F86AA0FB11B88FD58395DAB2572EAD369CD229703
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$GetcollLocinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 1287851536-1405518554
                                                  • Opcode ID: 7d59226df601bcff8e776ffd1cced10335b944736ff616c77631024c031261a6
                                                  • Instruction ID: c9aaff4d803a8d5dbf0652012cca11b5d58eea3316bf69a942a88bb6d000b6f9
                                                  • Opcode Fuzzy Hash: 7d59226df601bcff8e776ffd1cced10335b944736ff616c77631024c031261a6
                                                  • Instruction Fuzzy Hash: 2E717832702B40CBFB18DFB4D4903DD73A6EF44B98F844525EE592BE9ADA35C4618386
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __std_exception_destroy
                                                  • String ID: at line $, column
                                                  • API String ID: 2453523683-191570568
                                                  • Opcode ID: 07cc318ea6f4cb38e2858a1fcdbb1645a681353122ee49c143944ed3fea36794
                                                  • Instruction ID: bd3e67f2191488e790a341e76afde8feaeaac41e282b59f3d7cdfa962f2959e5
                                                  • Opcode Fuzzy Hash: 07cc318ea6f4cb38e2858a1fcdbb1645a681353122ee49c143944ed3fea36794
                                                  • Instruction Fuzzy Hash: 3651C472614744C2EB249F19E54439EA762FB85BD0F904215EFA803FDADF79C1A1C741
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 1612978173-1405518554
                                                  • Opcode ID: 260ccd5864991d9dece1b379a2f854b2d3b4e274d1679676f7300d2c755ddcc6
                                                  • Instruction ID: 3a44b3a8d1e2a5ba91a048ac7001c1fec6ad18f5d88c045f3e6a0afa476d27bb
                                                  • Opcode Fuzzy Hash: 260ccd5864991d9dece1b379a2f854b2d3b4e274d1679676f7300d2c755ddcc6
                                                  • Instruction Fuzzy Hash: 8B512532702B40CBEB10DFA0D5903ED73B5FF54B48F844429AA4A26A9ADB35C5369396
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite$ConsoleErrorLastOutput
                                                  • String ID:
                                                  • API String ID: 2718003287-0
                                                  • Opcode ID: 9747b9886aa077a2834e1a796ac88b116a11c1980555fa48c7763810529486d9
                                                  • Instruction ID: fcfff80bd1634af4a796741ec91a395e5edfdb87edc8d8c069b40cdeaaf14af2
                                                  • Opcode Fuzzy Hash: 9747b9886aa077a2834e1a796ac88b116a11c1980555fa48c7763810529486d9
                                                  • Instruction Fuzzy Hash: 27D11132708A80CAEB10CF79D5402EC7BB1FB44BD8F955216CE5EA7B99CA35C526CB41
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ConsoleErrorLastMode
                                                  • String ID:
                                                  • API String ID: 953036326-0
                                                  • Opcode ID: 7063050246c2fad88b065a933e2c6f249031a7ed32688652b8e99d20094d880a
                                                  • Instruction ID: 38cf7f7ef2ed6b12d9a61d2692ccf7df4d5c4cba78acfd5d8bd34edbbf4fb2ee
                                                  • Opcode Fuzzy Hash: 7063050246c2fad88b065a933e2c6f249031a7ed32688652b8e99d20094d880a
                                                  • Instruction Fuzzy Hash: 0091E473610A50CBFB60CB65D4807EDBBA0FB45B98FC46106EE0A57B94DB36C4A5CB12
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo$_get_daylight
                                                  • String ID:
                                                  • API String ID: 72036449-0
                                                  • Opcode ID: 23c2d46af6276b08be865227d4156c69869a5f5364afc3469a4aa53254264490
                                                  • Instruction ID: f915fff9da0200d1b3e313682d34b5fb314cd15e0e795be8de4217880f8cfca9
                                                  • Opcode Fuzzy Hash: 23c2d46af6276b08be865227d4156c69869a5f5364afc3469a4aa53254264490
                                                  • Instruction Fuzzy Hash: 4D51E232704240C7F77A4A28D3153FD6A90EF81714FD986A59B658F2DADA39CE708B43
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11253eda9c7c499353b49b5698aa52a541508f24b12a2406619ea18b2ea80f0c
                                                  • Instruction ID: ab4e9fb5c444bc509b1cca7538bd5edec37f9e3cf22df2f9a6ae8063841e3bca
                                                  • Opcode Fuzzy Hash: 11253eda9c7c499353b49b5698aa52a541508f24b12a2406619ea18b2ea80f0c
                                                  • Instruction Fuzzy Hash: 00411A32710784C7FB289F66A5403E9E291EF547A4F980635AF9907FD6DF39C4A28301
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnvironmentInitStringStringsUnicode$Free
                                                  • String ID:
                                                  • API String ID: 2488768755-0
                                                  • Opcode ID: cef6bd626e89cee4a41faeeadaa7e73642fdf2a1d22d5dbd2bf98128b470d8ba
                                                  • Instruction ID: d350bab4901f53f8ceac9a25eda1751ee1983745c50a10f9b76cf25d1ed42c77
                                                  • Opcode Fuzzy Hash: cef6bd626e89cee4a41faeeadaa7e73642fdf2a1d22d5dbd2bf98128b470d8ba
                                                  • Instruction Fuzzy Hash: 2051AD32A14B80C3EB218F15E54039DB364FB99B94F949215EB9903BA5DF78E5F0C305
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_RegisterSetgloballocalestd::locale::_
                                                  • String ID:
                                                  • API String ID: 3698853521-0
                                                  • Opcode ID: 52f09004af13444489614d13a4beed677261be053e2b71cb6c70c7ba7eb4c573
                                                  • Instruction ID: 58d1f8f4be785327617833c37e5323c3d5031b0cdaa2daf74e9184a8a27b8536
                                                  • Opcode Fuzzy Hash: 52f09004af13444489614d13a4beed677261be053e2b71cb6c70c7ba7eb4c573
                                                  • Instruction Fuzzy Hash: 18419132214B40C3EB14DF15EA403D9B7A4FB49B94FA41661EE9D07BA9DF79C461C702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _invalid_parameter_noinfo
                                                  • String ID:
                                                  • API String ID: 3215553584-0
                                                  • Opcode ID: 46041605b107bf846d44f5685209754c03f59a2c6bd87be6db18ef3a7a800cef
                                                  • Instruction ID: 3303802e8f1fc794c24b63f6f2d863a759fe2cca76bd226abb6873d080891978
                                                  • Opcode Fuzzy Hash: 46041605b107bf846d44f5685209754c03f59a2c6bd87be6db18ef3a7a800cef
                                                  • Instruction Fuzzy Hash: A6418E33104BC4C7E7629F21D4603EEBBA4AB16B44F88C115DBC80779ADA7B8865CB53
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: 9af72d6ad9fd38ab47eddf7528dcaacaf76fef6c26246278d57936cf75c35419
                                                  • Instruction ID: 874b61d2250d2f6f3402a664c84408290ead714eb54fcd125f39723550a7204e
                                                  • Opcode Fuzzy Hash: 9af72d6ad9fd38ab47eddf7528dcaacaf76fef6c26246278d57936cf75c35419
                                                  • Instruction Fuzzy Hash: 9A418132254A40C2EB19DF19EA403D9B7A1FB89BD4F980561EA8D47BE9DE39C461C702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: 630083b87030d874fb98124a302e25b2be5d17abf895b295ad6d9102da189e85
                                                  • Instruction ID: 49b0333310b7e42614236d79bf3a1867efb234127f5f01040c02119d9b01ee8e
                                                  • Opcode Fuzzy Hash: 630083b87030d874fb98124a302e25b2be5d17abf895b295ad6d9102da189e85
                                                  • Instruction Fuzzy Hash: 21417132244B40C3EB25DF19F6403E9B760FB89BA4F980521EA8D077A9DE38D461C742
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                                  • String ID:
                                                  • API String ID: 1168246061-0
                                                  • Opcode ID: a59cef1689774fe1fab41ed2815740ae3a49e56a25c405c4f9a4d703edcec962
                                                  • Instruction ID: 23e60f110e1f3356489a7e4334a27ba31e31dd2529591028f0e110099fd45707
                                                  • Opcode Fuzzy Hash: a59cef1689774fe1fab41ed2815740ae3a49e56a25c405c4f9a4d703edcec962
                                                  • Instruction Fuzzy Hash: D2415F32244B40C2EB15DF19F6403E9A761FB49BA4FC80661AB4D477A9DF38C4A2C742
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                                                  • String ID:
                                                  • API String ID: 4181401918-0
                                                  • Opcode ID: 341d0c1e0db9659c00f22877e9a5ce8211df1a606b3819ad1c108b85621a30d4
                                                  • Instruction ID: e5a97bff3e44433bb2c2812e3309238abab70849f5b95ab6c30dca8646676506
                                                  • Opcode Fuzzy Hash: 341d0c1e0db9659c00f22877e9a5ce8211df1a606b3819ad1c108b85621a30d4
                                                  • Instruction Fuzzy Hash: 9B419372214B40C3FB15DF19EA503D9B7A5FF89BA4F880561AA4D0B7A9DE38C471C702
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide
                                                  • String ID:
                                                  • API String ID: 203985260-0
                                                  • Opcode ID: 34891596e761fd8460ac700fee511bf0e15182bd71cca03b29692357d58ccc2a
                                                  • Instruction ID: 066688017a08c7daed11493f7dffbf684f66f5b64684874374473d7f33e6d821
                                                  • Opcode Fuzzy Hash: 34891596e761fd8460ac700fee511bf0e15182bd71cca03b29692357d58ccc2a
                                                  • Instruction Fuzzy Hash: DE216D72614B84C7E7208F16E54439EBBB5F799FD4F640168DB8993B58DB38C922CB40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesCloseErrorFileHandleLast__std_fs_open_handle
                                                  • String ID:
                                                  • API String ID: 833716960-0
                                                  • Opcode ID: 56b2687e7590be9060b2f521e43c00ef56049a5b324cbe43c349fec2da949a14
                                                  • Instruction ID: 7624223dd6368e01bf01c27263cd08e4eb719e8a6c38cfa2b76e7bf0d817edd5
                                                  • Opcode Fuzzy Hash: 56b2687e7590be9060b2f521e43c00ef56049a5b324cbe43c349fec2da949a14
                                                  • Instruction Fuzzy Hash: AF11EC31714640C7F7605F29B6443FA6662EF447F0F905664FA7747EE8DA38C4618B42
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: f17d3fb1ab4900325ab20bc1be1c582491b167ab2b0c0b2ba31f7b8690cde388
                                                  • Instruction ID: 474564a57de6220aed1c14a25210214f05485132d37bd879960342942a43d9b9
                                                  • Opcode Fuzzy Hash: f17d3fb1ab4900325ab20bc1be1c582491b167ab2b0c0b2ba31f7b8690cde388
                                                  • Instruction Fuzzy Hash: 06512832302B40CAEB14DFB0E8903ED73B4EF54B48F884425AA4967A99DE36C576D746
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                  • String ID: bad locale name
                                                  • API String ID: 3988782225-1405518554
                                                  • Opcode ID: 1793afee5c47b6d22711c2cdef7b3f3dfeb31d4047eb3ef77c9b152621f41820
                                                  • Instruction ID: 14620575f6bd0d4f724fdfc088a32d75999060f473fdcf10486c5bdfb2e312ed
                                                  • Opcode Fuzzy Hash: 1793afee5c47b6d22711c2cdef7b3f3dfeb31d4047eb3ef77c9b152621f41820
                                                  • Instruction Fuzzy Hash: 4F513832302A40CAEF20DFB0E4903ED73B5EF58B48F884425EA4967A99DE35C535D746
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _get_daylight$_invalid_parameter_noinfo
                                                  • String ID: ?
                                                  • API String ID: 1286766494-1684325040
                                                  • Opcode ID: bafd76418e14a8637ae48fdc26faac071872ff900bc580b65dcd3d0261e10793
                                                  • Instruction ID: 67687ca08ad92f979712ce86a9013bf82b25d39f099909518530092c0a42f750
                                                  • Opcode Fuzzy Hash: bafd76418e14a8637ae48fdc26faac071872ff900bc580b65dcd3d0261e10793
                                                  • Instruction Fuzzy Hash: F4416A32610780C7FB608B25D6113FAA764FF80BA4F944265EF9807FD9DB78C5618B02
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _set_errno_from_matherr
                                                  • String ID: exp
                                                  • API String ID: 1187470696-113136155
                                                  • Opcode ID: 923f91936fd528ad164bd700489891902ce9ad963cd2544eea48445b34140e2b
                                                  • Instruction ID: 94b533503cfad1585aa6d932e7ccb924c6d4b8eff3b83d7079e5dcb6c73513ac
                                                  • Opcode Fuzzy Hash: 923f91936fd528ad164bd700489891902ce9ad963cd2544eea48445b34140e2b
                                                  • Instruction Fuzzy Hash: B5212736B11614CFE750CF78D9403ED37B0FB48748F801565FA4A96B4ADB38D6518B51
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2401017716.0000012A22260000.00000040.10000000.00040000.00000000.sdmp, Offset: 0000012A22260000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12a22260000_file.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFileHeaderRaise
                                                  • String ID: csm
                                                  • API String ID: 2573137834-1018135373
                                                  • Opcode ID: a8459bb6fad1551cf5a45c3703ef9eb160a5f06788234bdcb96471953bc322dd
                                                  • Instruction ID: c0b083f66c87a85e9642a201968e105582e201f992a0bdd006a33cd0ea3c83da
                                                  • Opcode Fuzzy Hash: a8459bb6fad1551cf5a45c3703ef9eb160a5f06788234bdcb96471953bc322dd
                                                  • Instruction Fuzzy Hash: E4111C32214B8482EB218F15E5403DAB7A5FB88B94F585271EECD07B69DF39C562CB40