Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mark_v7.exe

Overview

General Information

Sample name:mark_v7.exe
Analysis ID:1580601
MD5:53c8388962d7d25bfd57ddda57097212
SHA1:a20d210fd3c0d006289025ccaa2f08a2b3d4fc0b
SHA256:f35a62dc13fd9fc4707aac5039481f28c94ef217694df7ab8ea567a5d08ba920
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to inject threads in other processes
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
Sigma detected: Communication To Uncommon Destination Ports
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • mark_v7.exe (PID: 3884 cmdline: "C:\Users\user\Desktop\mark_v7.exe" MD5: 53C8388962D7D25BFD57DDDA57097212)
    • conhost.exe (PID: 4152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 167.99.31.61, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Users\user\Desktop\mark_v7.exe, Initiated: true, ProcessId: 3884, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49699
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-25T12:01:57.759310+010020127361Malware Command and Control Activity Detected192.168.2.649699167.99.31.618080TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-25T12:01:57.759310+010028032702Potentially Bad Traffic192.168.2.649699167.99.31.618080TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: mark_v7.exeVirustotal: Detection: 33%Perma Link
Source: mark_v7.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.9% probability
Source: mark_v7.exeJoe Sandbox ML: detected
Source: mark_v7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F64178 FindFirstFileExW,0_2_00007FF6A4F64178

Networking

barindex
Source: Network trafficSuricata IDS: 2012736 - Severity 1 - ET MALWARE Trojan-GameThief.Win32.OnLineGames.bnye Checkin : 192.168.2.6:49699 -> 167.99.31.61:8080
Source: global trafficTCP traffic: 192.168.2.6:49699 -> 167.99.31.61:8080
Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49699 -> 167.99.31.61:8080
Source: global trafficHTTP traffic detected: GET /sc.wav HTTP/1.1User-Agent: Mozilla/5.0Host: vpn.reconix.co:8080Cache-Control: no-cache
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F54910 InternetOpenW,InternetSetOptionW,InternetSetOptionW,InternetSetOptionW,InternetOpenUrlW,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetSetOptionW,InternetCloseHandle,InternetCloseHandle,0_2_00007FF6A4F54910
Source: global trafficHTTP traffic detected: GET /sc.wav HTTP/1.1User-Agent: Mozilla/5.0Host: vpn.reconix.co:8080Cache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: vpn.reconix.co
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABBB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co/
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABBB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co/K
Source: mark_v7.exeString found in binary or memory: http://vpn.reconix.co:8080/sc.wav
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co:8080/sc.wav3f
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co:8080/sc.wavM
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co:8080/sc.wavR
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://vpn.reconix.co:8080/sc.wavr
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F55E500_2_00007FF6A4F55E50
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F549100_2_00007FF6A4F54910
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F67F100_2_00007FF6A4F67F10
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F6CD580_2_00007FF6A4F6CD58
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F62DDC0_2_00007FF6A4F62DDC
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5E8D80_2_00007FF6A4F5E8D8
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5D7E40_2_00007FF6A4F5D7E4
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F629480_2_00007FF6A4F62948
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F641780_2_00007FF6A4F64178
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5D9E80_2_00007FF6A4F5D9E8
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F554500_2_00007FF6A4F55450
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F6345C0_2_00007FF6A4F6345C
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F604940_2_00007FF6A4F60494
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F683AC0_2_00007FF6A4F683AC
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5E3B80_2_00007FF6A4F5E3B8
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5DBEC0_2_00007FF6A4F5DBEC
Source: classification engineClassification label: mal68.evad.winEXE@2/1@1/1
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F543F0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF6A4F543F0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4152:120:WilError_03
Source: mark_v7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\mark_v7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: mark_v7.exeVirustotal: Detection: 33%
Source: mark_v7.exeReversingLabs: Detection: 23%
Source: unknownProcess created: C:\Users\user\Desktop\mark_v7.exe "C:\Users\user\Desktop\mark_v7.exe"
Source: C:\Users\user\Desktop\mark_v7.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\mark_v7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: mark_v7.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: mark_v7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: mark_v7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: mark_v7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: mark_v7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: mark_v7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: mark_v7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: mark_v7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\mark_v7.exeAPI coverage: 8.5 %
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F64178 FindFirstFileExW,0_2_00007FF6A4F64178
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABB77000.00000004.00000020.00020000.00000000.sdmp, mark_v7.exe, 00000000.00000002.2119178428.0000024BABBC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mark_v7.exe, 00000000.00000002.2119178428.0000024BABBC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F60C64 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A4F60C64
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F6685C GetProcessHeap,0_2_00007FF6A4F6685C
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F59D44 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6A4F59D44
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F60C64 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A4F60C64
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5A4E8 SetUnhandledExceptionFilter,0_2_00007FF6A4F5A4E8
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5A344 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6A4F5A344

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F55450 VirtualAllocEx,WriteProcessMemory,_invalid_parameter,CreateRemoteThreadEx,GetThreadId,WaitForSingleObject,0_2_00007FF6A4F55450
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F6CBA0 cpuid 0_2_00007FF6A4F6CBA0
Source: C:\Users\user\Desktop\mark_v7.exeCode function: 0_2_00007FF6A4F5A224 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6A4F5A224
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
System Information Discovery
SSHKeylogging12
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
mark_v7.exe34%VirustotalBrowse
mark_v7.exe24%ReversingLabs
mark_v7.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://vpn.reconix.co:8080/sc.wav0%Avira URL Cloudsafe
http://vpn.reconix.co/0%Avira URL Cloudsafe
http://vpn.reconix.co/K0%Avira URL Cloudsafe
http://vpn.reconix.co:8080/sc.wavR0%Avira URL Cloudsafe
http://vpn.reconix.co:8080/sc.wavM0%Avira URL Cloudsafe
http://vpn.reconix.co:8080/sc.wav3f0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
vpn.reconix.co
167.99.31.61
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://vpn.reconix.co:8080/sc.wavtrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://vpn.reconix.co/Kmark_v7.exe, 00000000.00000002.2119178428.0000024BABBB9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://vpn.reconix.co/mark_v7.exe, 00000000.00000002.2119178428.0000024BABBB9000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://vpn.reconix.co:8080/sc.wavMmark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://vpn.reconix.co:8080/sc.wav3fmark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://vpn.reconix.co:8080/sc.wavRmark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://vpn.reconix.co:8080/sc.wavrmark_v7.exe, 00000000.00000002.2119178428.0000024BABB9E000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      167.99.31.61
      vpn.reconix.coUnited States
      14061DIGITALOCEAN-ASNUStrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1580601
      Start date and time:2024-12-25 12:01:06 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 49s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:mark_v7.exe
      Detection:MAL
      Classification:mal68.evad.winEXE@2/1@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 96%
      • Number of executed functions: 10
      • Number of non-executed functions: 37
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197, 172.202.163.200
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      DIGITALOCEAN-ASNUStelnet.x86.elfGet hashmaliciousUnknownBrowse
      • 138.68.169.173
      armv7l.elfGet hashmaliciousMiraiBrowse
      • 138.197.191.101
      nabspc.elfGet hashmaliciousUnknownBrowse
      • 46.101.240.213
      arm.elfGet hashmaliciousUnknownBrowse
      • 134.122.107.59
      a1K847qsM0.exeGet hashmaliciousNjratBrowse
      • 167.71.56.116
      https://flowto.it/8tooc2sec?fc=0Get hashmaliciousUnknownBrowse
      • 161.35.24.67
      https://qulatrics.com/Get hashmaliciousUnknownBrowse
      • 206.189.225.178
      https://qulatrics.com/Get hashmaliciousUnknownBrowse
      • 206.189.225.178
      https://liladelman.com/rental/1218-west-side-road-block-island/Get hashmaliciousUnknownBrowse
      • 159.89.55.215
      OZq1f2sZz3.exeGet hashmaliciousAsyncRATBrowse
      • 104.236.39.42
      No context
      No context
      Process:C:\Users\user\Desktop\mark_v7.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):95
      Entropy (8bit):4.682785614283304
      Encrypted:false
      SSDEEP:3:12OE4VbAZEkMJQXkyfnOBFReDRF2Iv:0Ovb+E3okQK0Rrv
      MD5:D5285F4EE776789D007ECF657E651AE2
      SHA1:F26C7502EFE3FEB19D7A95D6257C2B2EACA8F3B0
      SHA-256:7EEBC929D33573533AA6C33CF5400E6A973B2CC22CF8E119BACF3F82E85398DC
      SHA-512:1BD8833C7F02DDD3C70383EE4E6C6486F2515502AE0C751FEC1431FAF285BD963EA36AAA324246E9CF83CC2E421B6B2B1BB10BAB74BEF34B4741D7B8C79A5EDB
      Malicious:false
      Reputation:low
      Preview:[i] Checking.......[!] InternetOpenUrl failed with error: 12152....[!] Failed to get buffer....
      File type:PE32+ executable (console) x86-64, for MS Windows
      Entropy (8bit):5.944520754604166
      TrID:
      • Win64 Executable Console (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:mark_v7.exe
      File size:224'768 bytes
      MD5:53c8388962d7d25bfd57ddda57097212
      SHA1:a20d210fd3c0d006289025ccaa2f08a2b3d4fc0b
      SHA256:f35a62dc13fd9fc4707aac5039481f28c94ef217694df7ab8ea567a5d08ba920
      SHA512:b59287be8eeb663b7f6ee835325714775a495ca5d37a0cbe452f1a461cb4992e076e541cd8553be5fc846f91105e2fdae69bfccc82173b8dd06f90e493a707e8
      SSDEEP:3072:sQ+3DUdFE4tZnITe3DpQx6H/nps/wrZ91rlKJIUgN:fnoezpThywrP1UgN
      TLSH:F724810AA2DC7CE9C1B2C275A73687E4E32AFC118275C74E16C41356DEBE152BD25BE0
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......P@...!...!...!.._Y...!.._Y...!.._Y...!.._Y...!...!..}!.......!.......!......<!.......!.......!....J..!...!"..!.......!..Rich.!.
      Icon Hash:0d35784d5b5b4531
      Entrypoint:0x140009d30
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x676B76BE [Wed Dec 25 03:06:38 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:7328d481aa902ed47f38a690392dd326
      Instruction
      dec eax
      sub esp, 28h
      call 00007F0C38AB0E00h
      dec eax
      add esp, 28h
      jmp 00007F0C38AB0787h
      int3
      int3
      inc eax
      push ebx
      dec eax
      sub esp, 20h
      dec eax
      mov ebx, ecx
      xor ecx, ecx
      call dword ptr [0001534Bh]
      dec eax
      mov ecx, ebx
      call dword ptr [0001533Ah]
      call dword ptr [00015344h]
      dec eax
      mov ecx, eax
      mov edx, C0000409h
      dec eax
      add esp, 20h
      pop ebx
      dec eax
      jmp dword ptr [00015338h]
      dec eax
      mov dword ptr [esp+08h], ecx
      dec eax
      sub esp, 38h
      mov ecx, 00000017h
      call dword ptr [0001532Ch]
      test eax, eax
      je 00007F0C38AB0919h
      mov ecx, 00000002h
      int 29h
      dec eax
      lea ecx, dword ptr [00021212h]
      call 00007F0C38AB0AE2h
      dec eax
      mov eax, dword ptr [esp+38h]
      dec eax
      mov dword ptr [000212F9h], eax
      dec eax
      lea eax, dword ptr [esp+38h]
      dec eax
      add eax, 08h
      dec eax
      mov dword ptr [00021289h], eax
      dec eax
      mov eax, dword ptr [000212E2h]
      dec eax
      mov dword ptr [00021153h], eax
      dec eax
      mov eax, dword ptr [esp+40h]
      dec eax
      mov dword ptr [00021257h], eax
      mov dword ptr [0002112Dh], C0000409h
      mov dword ptr [00021127h], 00000001h
      mov dword ptr [00021131h], 00000001h
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x291840x3c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d0000xb620.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3b0000x13e0.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x490000xa98.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x278100x38.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x276d00x140.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x1f0000x2e0.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x1d4c00x1d600c60d10abbd31f4864dfaca5adc5ddbe2False0.5114611037234043data6.343624939363486IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x1f0000xab460xac00cafea274428c3924cc41fee78ef5befeFalse0.4578034156976744OpenPGP Secret Key Version 25.017051968584822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x2a0000x101200x10000b65c312d085056333aa7b0fc6995082False0.2177734375data2.9682242461520474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x3b0000x13e00x14003e044d51ee287a858396c4baa0314942False0.491015625PEX Binary Archive5.239721566095961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x3d0000xb6200xb800e02ed0ed9c63f07b3046ab09986bb162False0.1734672214673913data3.8871426586005673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x490000xa980xc00ce74d870bb09d0ebaa08d8ba431a9b32False0.6520182291666666data5.750710658448876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x3d2700xb13PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8867724867724868
      RT_ICON0x3dd880xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.10341151385927505
      RT_ICON0x3ec300x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.12229241877256318
      RT_ICON0x3f4d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.11416184971098266
      RT_ICON0x3fa400xc4aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9164017800381437
      RT_ICON0x406900x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.03672649976381672
      RT_ICON0x448b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.04854771784232365
      RT_ICON0x46e600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.0698874296435272
      RT_ICON0x47f080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.1400709219858156
      RT_GROUP_ICON0x483700x84dataEnglishUnited States0.6590909090909091
      RT_MANIFEST0x483f80x224XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (488), with CRLF line terminatorsEnglishUnited States0.531021897810219
      DLLImport
      WININET.dllInternetReadFile, InternetSetOptionW, InternetCloseHandle, InternetOpenW, InternetOpenUrlW
      KERNEL32.dllRtlPcToFileHeader, WriteConsoleW, CreateFileW, HeapReAlloc, GetModuleHandleA, LoadLibraryA, lstrcmpiA, CreateRemoteThreadEx, WriteProcessMemory, WaitForSingleObject, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, CloseHandle, VirtualAllocEx, GetThreadId, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, HeapSize, RtlUnwindEx, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetStringTypeW, GetProcessHeap, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-12-25T12:01:57.759310+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649699167.99.31.618080TCP
      2024-12-25T12:01:57.759310+01002012736ET MALWARE Trojan-GameThief.Win32.OnLineGames.bnye Checkin1192.168.2.649699167.99.31.618080TCP
      TimestampSource PortDest PortSource IPDest IP
      Dec 25, 2024 12:01:55.054814100 CET496998080192.168.2.6167.99.31.61
      Dec 25, 2024 12:01:55.174252987 CET808049699167.99.31.61192.168.2.6
      Dec 25, 2024 12:01:55.174369097 CET496998080192.168.2.6167.99.31.61
      Dec 25, 2024 12:01:55.182706118 CET496998080192.168.2.6167.99.31.61
      Dec 25, 2024 12:01:55.302211046 CET808049699167.99.31.61192.168.2.6
      Dec 25, 2024 12:01:57.759211063 CET808049699167.99.31.61192.168.2.6
      Dec 25, 2024 12:01:57.759310007 CET496998080192.168.2.6167.99.31.61
      Dec 25, 2024 12:01:57.759485006 CET496998080192.168.2.6167.99.31.61
      Dec 25, 2024 12:01:57.879153013 CET808049699167.99.31.61192.168.2.6
      TimestampSource PortDest PortSource IPDest IP
      Dec 25, 2024 12:01:54.718370914 CET4919553192.168.2.61.1.1.1
      Dec 25, 2024 12:01:55.046338081 CET53491951.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Dec 25, 2024 12:01:54.718370914 CET192.168.2.61.1.1.10xa8Standard query (0)vpn.reconix.coA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Dec 25, 2024 12:01:55.046338081 CET1.1.1.1192.168.2.60xa8No error (0)vpn.reconix.co167.99.31.61A (IP address)IN (0x0001)false
      • vpn.reconix.co:8080
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.649699167.99.31.6180803884C:\Users\user\Desktop\mark_v7.exe
      TimestampBytes transferredDirectionData
      Dec 25, 2024 12:01:55.182706118 CET101OUTGET /sc.wav HTTP/1.1
      User-Agent: Mozilla/5.0
      Host: vpn.reconix.co:8080
      Cache-Control: no-cache


      Click to jump to process

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:06:01:52
      Start date:25/12/2024
      Path:C:\Users\user\Desktop\mark_v7.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\mark_v7.exe"
      Imagebase:0x7ff6a4f50000
      File size:224'768 bytes
      MD5 hash:53C8388962D7D25BFD57DDDA57097212
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:06:01:52
      Start date:25/12/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff66e660000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:3.4%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:19.1%
        Total number of Nodes:446
        Total number of Limit Nodes:13
        execution_graph 12212 7ff6a4f60039 12224 7ff6a4f609a0 12212->12224 12214 7ff6a4f6003e 12215 7ff6a4f60065 GetModuleHandleW 12214->12215 12216 7ff6a4f600af 12214->12216 12215->12216 12221 7ff6a4f60072 12215->12221 12217 7ff6a4f5ff3c 11 API calls 12216->12217 12218 7ff6a4f600eb 12217->12218 12219 7ff6a4f600f2 12218->12219 12220 7ff6a4f60108 11 API calls 12218->12220 12222 7ff6a4f60104 12220->12222 12221->12216 12223 7ff6a4f60160 GetModuleHandleExW GetProcAddress FreeLibrary 12221->12223 12223->12216 12229 7ff6a4f621e8 GetLastError 12224->12229 12230 7ff6a4f6220c FlsGetValue 12229->12230 12231 7ff6a4f62229 FlsSetValue 12229->12231 12232 7ff6a4f62223 12230->12232 12249 7ff6a4f62219 SetLastError 12230->12249 12233 7ff6a4f6223b 12231->12233 12231->12249 12232->12231 12260 7ff6a4f6108c 12233->12260 12236 7ff6a4f609a9 12251 7ff6a4f60a2c 12236->12251 12237 7ff6a4f622b5 12239 7ff6a4f60a2c _CallSETranslator 40 API calls 12237->12239 12238 7ff6a4f6224a 12240 7ff6a4f62268 FlsSetValue 12238->12240 12241 7ff6a4f62258 FlsSetValue 12238->12241 12244 7ff6a4f622ba 12239->12244 12242 7ff6a4f62286 12240->12242 12243 7ff6a4f62274 FlsSetValue 12240->12243 12245 7ff6a4f62261 12241->12245 12273 7ff6a4f61f98 12242->12273 12243->12245 12267 7ff6a4f61104 12245->12267 12249->12236 12249->12237 12321 7ff6a4f66a28 12251->12321 12266 7ff6a4f6109d _set_fmode 12260->12266 12261 7ff6a4f610ee 12281 7ff6a4f6106c 12261->12281 12262 7ff6a4f610d2 HeapAlloc 12264 7ff6a4f610ec 12262->12264 12262->12266 12264->12238 12266->12261 12266->12262 12278 7ff6a4f66968 12266->12278 12268 7ff6a4f61109 HeapFree 12267->12268 12269 7ff6a4f61138 12267->12269 12268->12269 12270 7ff6a4f61124 GetLastError 12268->12270 12269->12249 12271 7ff6a4f61131 Concurrency::details::SchedulerProxy::DeleteThis 12270->12271 12272 7ff6a4f6106c _set_fmode 9 API calls 12271->12272 12272->12269 12307 7ff6a4f61e70 12273->12307 12284 7ff6a4f669a8 12278->12284 12290 7ff6a4f62360 GetLastError 12281->12290 12283 7ff6a4f61075 12283->12264 12289 7ff6a4f65b60 EnterCriticalSection 12284->12289 12291 7ff6a4f623a1 FlsSetValue 12290->12291 12296 7ff6a4f62384 12290->12296 12292 7ff6a4f623b3 12291->12292 12297 7ff6a4f62391 12291->12297 12294 7ff6a4f6108c _set_fmode 5 API calls 12292->12294 12293 7ff6a4f6240d SetLastError 12293->12283 12295 7ff6a4f623c2 12294->12295 12298 7ff6a4f623e0 FlsSetValue 12295->12298 12299 7ff6a4f623d0 FlsSetValue 12295->12299 12296->12291 12296->12297 12297->12293 12301 7ff6a4f623ec FlsSetValue 12298->12301 12302 7ff6a4f623fe 12298->12302 12300 7ff6a4f623d9 12299->12300 12303 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 12300->12303 12301->12300 12304 7ff6a4f61f98 _set_fmode 5 API calls 12302->12304 12303->12297 12305 7ff6a4f62406 12304->12305 12306 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 12305->12306 12306->12293 12319 7ff6a4f65b60 EnterCriticalSection 12307->12319 12355 7ff6a4f669e0 12321->12355 12360 7ff6a4f65b60 EnterCriticalSection 12355->12360 12435 7ff6a4f59bb4 12456 7ff6a4f5a020 12435->12456 12438 7ff6a4f59d0b 12508 7ff6a4f5a344 IsProcessorFeaturePresent 12438->12508 12439 7ff6a4f59bd5 __scrt_acquire_startup_lock 12441 7ff6a4f59d15 12439->12441 12447 7ff6a4f59bf3 __scrt_release_startup_lock 12439->12447 12442 7ff6a4f5a344 7 API calls 12441->12442 12444 7ff6a4f59d20 _CallSETranslator 12442->12444 12443 7ff6a4f59c18 12445 7ff6a4f59c9e 12464 7ff6a4f5fe58 12445->12464 12447->12443 12447->12445 12497 7ff6a4f60204 12447->12497 12449 7ff6a4f59ca3 12470 7ff6a4f55e50 12449->12470 12453 7ff6a4f59cc7 12453->12444 12504 7ff6a4f5a1a4 12453->12504 12457 7ff6a4f5a028 12456->12457 12458 7ff6a4f5a034 __scrt_dllmain_crt_thread_attach 12457->12458 12459 7ff6a4f59bcd 12458->12459 12460 7ff6a4f5a041 12458->12460 12459->12438 12459->12439 12515 7ff6a4f60954 12460->12515 12465 7ff6a4f5fe68 12464->12465 12469 7ff6a4f5fe7d 12464->12469 12465->12469 12558 7ff6a4f5faf8 12465->12558 12469->12449 12471 7ff6a4f55e99 12470->12471 12477 7ff6a4f55f12 12471->12477 12859 7ff6a4f54130 12471->12859 12474 7ff6a4f562a0 12893 7ff6a4f543f0 CreateToolhelp32Snapshot 12474->12893 12476 7ff6a4f56068 12476->12474 12887 7ff6a4f53e40 12476->12887 12479 7ff6a4f5604a 12477->12479 12864 7ff6a4f54910 InternetOpenW 12477->12864 12481 7ff6a4f59ab0 _log10_special 8 API calls 12479->12481 12482 7ff6a4f57006 12481->12482 12502 7ff6a4f5a494 GetModuleHandleW 12482->12502 12483 7ff6a4f562ac 12484 7ff6a4f563fa 12483->12484 12490 7ff6a4f564d1 12483->12490 12496 7ff6a4f56406 12483->12496 12485 7ff6a4f53e40 80 API calls 12484->12485 12485->12496 12486 7ff6a4f561d7 12486->12474 12486->12479 12487 7ff6a4f568a4 12488 7ff6a4f53e40 80 API calls 12487->12488 12491 7ff6a4f56979 _wcsupr_s 12487->12491 12488->12491 12492 7ff6a4f53e40 80 API calls 12490->12492 12490->12496 12493 7ff6a4f53e40 80 API calls 12491->12493 12494 7ff6a4f56c20 12491->12494 12495 7ff6a4f564bb 12491->12495 12492->12496 12493->12494 12494->12495 12909 7ff6a4f55450 12494->12909 12495->12479 12496->12491 12496->12495 12904 7ff6a4f51010 12496->12904 12498 7ff6a4f6021b 12497->12498 12499 7ff6a4f6023c 12497->12499 12498->12445 12500 7ff6a4f609a0 47 API calls 12499->12500 12501 7ff6a4f60241 12500->12501 12503 7ff6a4f5a4a5 12502->12503 12503->12453 12505 7ff6a4f5a1b5 12504->12505 12506 7ff6a4f59cde 12505->12506 12507 7ff6a4f5aaf0 7 API calls 12505->12507 12506->12443 12507->12506 12509 7ff6a4f5a36a memcpy_s _CallSETranslator 12508->12509 12510 7ff6a4f5a389 RtlCaptureContext RtlLookupFunctionEntry 12509->12510 12511 7ff6a4f5a3b2 RtlVirtualUnwind 12510->12511 12512 7ff6a4f5a3ee memcpy_s 12510->12512 12511->12512 12513 7ff6a4f5a420 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12512->12513 12514 7ff6a4f5a46e _CallSETranslator 12513->12514 12514->12441 12516 7ff6a4f66884 12515->12516 12517 7ff6a4f5a046 12516->12517 12525 7ff6a4f61d00 12516->12525 12517->12459 12519 7ff6a4f5aaf0 12517->12519 12520 7ff6a4f5aaf8 12519->12520 12521 7ff6a4f5ab02 12519->12521 12537 7ff6a4f5ae80 12520->12537 12521->12459 12536 7ff6a4f65b60 EnterCriticalSection 12525->12536 12527 7ff6a4f61d10 12528 7ff6a4f65d2c 53 API calls 12527->12528 12529 7ff6a4f61d19 12528->12529 12530 7ff6a4f61d27 12529->12530 12531 7ff6a4f61b08 55 API calls 12529->12531 12532 7ff6a4f65bb4 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 12530->12532 12533 7ff6a4f61d22 12531->12533 12534 7ff6a4f61d33 12532->12534 12535 7ff6a4f61bf8 GetStdHandle GetFileType 12533->12535 12534->12516 12535->12530 12538 7ff6a4f5aafd 12537->12538 12539 7ff6a4f5ae8f 12537->12539 12541 7ff6a4f5aeec 12538->12541 12545 7ff6a4f5b0bc 12539->12545 12542 7ff6a4f5af17 12541->12542 12543 7ff6a4f5af1b 12542->12543 12544 7ff6a4f5aefa DeleteCriticalSection 12542->12544 12543->12521 12544->12542 12549 7ff6a4f5af24 12545->12549 12555 7ff6a4f5b00e TlsFree 12549->12555 12556 7ff6a4f5af68 __vcrt_InitializeCriticalSectionEx 12549->12556 12550 7ff6a4f5af96 LoadLibraryExW 12552 7ff6a4f5afb7 GetLastError 12550->12552 12553 7ff6a4f5b035 12550->12553 12551 7ff6a4f5b055 GetProcAddress 12551->12555 12552->12556 12553->12551 12554 7ff6a4f5b04c FreeLibrary 12553->12554 12554->12551 12556->12550 12556->12551 12556->12555 12557 7ff6a4f5afd9 LoadLibraryExW 12556->12557 12557->12553 12557->12556 12559 7ff6a4f5fb11 12558->12559 12572 7ff6a4f5fb0d 12558->12572 12581 7ff6a4f6508c 12559->12581 12564 7ff6a4f5fb23 12566 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12564->12566 12565 7ff6a4f5fb2f 12607 7ff6a4f5fb6c 12565->12607 12566->12572 12569 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12570 7ff6a4f5fb56 12569->12570 12571 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12570->12571 12571->12572 12572->12469 12573 7ff6a4f5fcc0 12572->12573 12574 7ff6a4f5fce9 12573->12574 12579 7ff6a4f5fd02 12573->12579 12574->12469 12575 7ff6a4f6108c _set_fmode 11 API calls 12575->12579 12576 7ff6a4f5fd92 12578 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12576->12578 12577 7ff6a4f654e0 WideCharToMultiByte _vfwprintf_l 12577->12579 12578->12574 12579->12574 12579->12575 12579->12576 12579->12577 12580 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12579->12580 12580->12579 12582 7ff6a4f65099 12581->12582 12583 7ff6a4f5fb16 12581->12583 12626 7ff6a4f622bc 12582->12626 12587 7ff6a4f655c0 GetEnvironmentStringsW 12583->12587 12588 7ff6a4f5fb1b 12587->12588 12589 7ff6a4f655f0 12587->12589 12588->12564 12588->12565 12590 7ff6a4f654e0 _vfwprintf_l WideCharToMultiByte 12589->12590 12591 7ff6a4f65641 12590->12591 12592 7ff6a4f65648 FreeEnvironmentStringsW 12591->12592 12593 7ff6a4f60b4c _vfwprintf_l 12 API calls 12591->12593 12592->12588 12594 7ff6a4f6565b 12593->12594 12595 7ff6a4f6566c 12594->12595 12596 7ff6a4f65663 12594->12596 12598 7ff6a4f654e0 _vfwprintf_l WideCharToMultiByte 12595->12598 12597 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12596->12597 12599 7ff6a4f6566a 12597->12599 12600 7ff6a4f6568f 12598->12600 12599->12592 12601 7ff6a4f6569d 12600->12601 12602 7ff6a4f65693 12600->12602 12604 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12601->12604 12603 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12602->12603 12605 7ff6a4f6569b FreeEnvironmentStringsW 12603->12605 12604->12605 12605->12588 12608 7ff6a4f5fb91 12607->12608 12609 7ff6a4f6108c _set_fmode 11 API calls 12608->12609 12620 7ff6a4f5fbc7 12609->12620 12610 7ff6a4f5fbcf 12611 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12610->12611 12612 7ff6a4f5fb37 12611->12612 12612->12569 12613 7ff6a4f5fc42 12614 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12613->12614 12614->12612 12615 7ff6a4f6108c _set_fmode 11 API calls 12615->12620 12616 7ff6a4f5fc31 12853 7ff6a4f5fc7c 12616->12853 12620->12610 12620->12613 12620->12615 12620->12616 12622 7ff6a4f5fc67 12620->12622 12624 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12620->12624 12844 7ff6a4f609cc 12620->12844 12621 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12621->12610 12623 7ff6a4f60f50 _invalid_parameter_noinfo 17 API calls 12622->12623 12625 7ff6a4f5fc7a 12623->12625 12624->12620 12627 7ff6a4f622cd FlsGetValue 12626->12627 12628 7ff6a4f622e8 FlsSetValue 12626->12628 12629 7ff6a4f622da 12627->12629 12630 7ff6a4f622e2 12627->12630 12628->12629 12631 7ff6a4f622f5 12628->12631 12632 7ff6a4f622e0 12629->12632 12633 7ff6a4f60a2c _CallSETranslator 47 API calls 12629->12633 12630->12628 12634 7ff6a4f6108c _set_fmode 11 API calls 12631->12634 12646 7ff6a4f64d64 12632->12646 12635 7ff6a4f6235d 12633->12635 12636 7ff6a4f62304 12634->12636 12637 7ff6a4f62322 FlsSetValue 12636->12637 12638 7ff6a4f62312 FlsSetValue 12636->12638 12640 7ff6a4f6232e FlsSetValue 12637->12640 12641 7ff6a4f62340 12637->12641 12639 7ff6a4f6231b 12638->12639 12642 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12639->12642 12640->12639 12643 7ff6a4f61f98 _set_fmode 11 API calls 12641->12643 12642->12629 12644 7ff6a4f62348 12643->12644 12645 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12644->12645 12645->12632 12669 7ff6a4f64fd4 12646->12669 12648 7ff6a4f64d99 12684 7ff6a4f64a64 12648->12684 12652 7ff6a4f64dc7 12653 7ff6a4f64dcf 12652->12653 12654 7ff6a4f64dde 12652->12654 12655 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12653->12655 12698 7ff6a4f65108 12654->12698 12667 7ff6a4f64db6 12655->12667 12658 7ff6a4f64eda 12659 7ff6a4f6106c _set_fmode 11 API calls 12658->12659 12660 7ff6a4f64edf 12659->12660 12663 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12660->12663 12661 7ff6a4f64f35 12662 7ff6a4f64f9c 12661->12662 12709 7ff6a4f64894 12661->12709 12666 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12662->12666 12663->12667 12664 7ff6a4f64ef4 12664->12661 12668 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12664->12668 12666->12667 12667->12583 12668->12661 12670 7ff6a4f64ff7 12669->12670 12671 7ff6a4f65001 12670->12671 12724 7ff6a4f65b60 EnterCriticalSection 12670->12724 12673 7ff6a4f65073 12671->12673 12676 7ff6a4f60a2c _CallSETranslator 47 API calls 12671->12676 12673->12648 12678 7ff6a4f6508b 12676->12678 12679 7ff6a4f650de 12678->12679 12681 7ff6a4f622bc 52 API calls 12678->12681 12679->12648 12682 7ff6a4f650c8 12681->12682 12683 7ff6a4f64d64 67 API calls 12682->12683 12683->12679 12725 7ff6a4f5d1f0 12684->12725 12687 7ff6a4f64a96 12689 7ff6a4f64aab 12687->12689 12690 7ff6a4f64a9b GetACP 12687->12690 12688 7ff6a4f64a84 GetOEMCP 12688->12689 12689->12667 12691 7ff6a4f60b4c 12689->12691 12690->12689 12692 7ff6a4f60b5b _set_fmode 12691->12692 12693 7ff6a4f60b97 12691->12693 12692->12693 12695 7ff6a4f60b7e HeapAlloc 12692->12695 12697 7ff6a4f66968 _set_fmode 2 API calls 12692->12697 12694 7ff6a4f6106c _set_fmode 11 API calls 12693->12694 12696 7ff6a4f60b95 12694->12696 12695->12692 12695->12696 12696->12652 12697->12692 12699 7ff6a4f64a64 49 API calls 12698->12699 12700 7ff6a4f65135 12699->12700 12701 7ff6a4f6528b 12700->12701 12702 7ff6a4f65172 IsValidCodePage 12700->12702 12708 7ff6a4f6518c memcpy_s 12700->12708 12703 7ff6a4f59ab0 _log10_special 8 API calls 12701->12703 12702->12701 12704 7ff6a4f65183 12702->12704 12705 7ff6a4f64ed1 12703->12705 12706 7ff6a4f651b2 GetCPInfo 12704->12706 12704->12708 12705->12658 12705->12664 12706->12701 12706->12708 12757 7ff6a4f64b7c 12708->12757 12843 7ff6a4f65b60 EnterCriticalSection 12709->12843 12726 7ff6a4f5d214 12725->12726 12732 7ff6a4f5d20f 12725->12732 12727 7ff6a4f621e8 _CallSETranslator 47 API calls 12726->12727 12726->12732 12728 7ff6a4f5d22f 12727->12728 12733 7ff6a4f62548 12728->12733 12732->12687 12732->12688 12734 7ff6a4f6255d 12733->12734 12735 7ff6a4f5d252 12733->12735 12734->12735 12741 7ff6a4f666ec 12734->12741 12737 7ff6a4f625b4 12735->12737 12738 7ff6a4f625c9 12737->12738 12739 7ff6a4f625dc 12737->12739 12738->12739 12754 7ff6a4f650ec 12738->12754 12739->12732 12742 7ff6a4f621e8 _CallSETranslator 47 API calls 12741->12742 12743 7ff6a4f666fb 12742->12743 12744 7ff6a4f66746 12743->12744 12753 7ff6a4f65b60 EnterCriticalSection 12743->12753 12744->12735 12755 7ff6a4f621e8 _CallSETranslator 47 API calls 12754->12755 12756 7ff6a4f650f5 12755->12756 12758 7ff6a4f64bb9 GetCPInfo 12757->12758 12767 7ff6a4f64caf 12757->12767 12764 7ff6a4f64bcc 12758->12764 12758->12767 12759 7ff6a4f59ab0 _log10_special 8 API calls 12760 7ff6a4f64d4e 12759->12760 12760->12701 12768 7ff6a4f66228 12764->12768 12767->12759 12769 7ff6a4f5d1f0 47 API calls 12768->12769 12770 7ff6a4f6626a 12769->12770 12788 7ff6a4f65450 12770->12788 12790 7ff6a4f65459 MultiByteToWideChar 12788->12790 12845 7ff6a4f609d9 12844->12845 12846 7ff6a4f609e3 12844->12846 12845->12846 12851 7ff6a4f609fe 12845->12851 12847 7ff6a4f6106c _set_fmode 11 API calls 12846->12847 12848 7ff6a4f609ea 12847->12848 12849 7ff6a4f60f30 _invalid_parameter_noinfo 47 API calls 12848->12849 12850 7ff6a4f609f6 12849->12850 12850->12620 12851->12850 12852 7ff6a4f6106c _set_fmode 11 API calls 12851->12852 12852->12848 12854 7ff6a4f5fc39 12853->12854 12855 7ff6a4f5fc81 12853->12855 12854->12621 12856 7ff6a4f5fcaa 12855->12856 12857 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12855->12857 12858 7ff6a4f61104 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 12856->12858 12857->12855 12858->12854 12860 7ff6a4f53e40 80 API calls 12859->12860 12862 7ff6a4f54143 12860->12862 12861 7ff6a4f54275 12861->12477 12862->12861 12863 7ff6a4f53e40 80 API calls 12862->12863 12863->12861 12865 7ff6a4f54987 12864->12865 12866 7ff6a4f54b8e InternetSetOptionW InternetSetOptionW InternetSetOptionW InternetOpenUrlW 12865->12866 12867 7ff6a4f53e40 80 API calls 12865->12867 12869 7ff6a4f54c37 12866->12869 12873 7ff6a4f54ac3 12867->12873 12868 7ff6a4f550a5 InternetReadFile 12880 7ff6a4f550ea 12868->12880 12870 7ff6a4f53e40 80 API calls 12869->12870 12874 7ff6a4f54d95 12869->12874 12872 7ff6a4f54d7f InternetCloseHandle 12870->12872 12871 7ff6a4f55320 InternetSetOptionW InternetCloseHandle InternetCloseHandle 12886 7ff6a4f5530c 12871->12886 12872->12874 12873->12866 12875 7ff6a4f54b7a 12873->12875 12874->12868 12874->12875 12876 7ff6a4f53e40 80 API calls 12874->12876 12878 7ff6a4f59ab0 _log10_special 8 API calls 12875->12878 12877 7ff6a4f54fc4 InternetCloseHandle InternetCloseHandle 12876->12877 12881 7ff6a4f54fe5 12877->12881 12879 7ff6a4f55447 12878->12879 12879->12476 12880->12871 12882 7ff6a4f53e40 80 API calls 12880->12882 12881->12868 12881->12875 12883 7ff6a4f55234 __vcrt_freefls 12882->12883 12884 7ff6a4f5523e InternetCloseHandle InternetCloseHandle 12883->12884 12885 7ff6a4f5525f 12884->12885 12885->12871 12885->12886 12886->12875 12888 7ff6a4f53e7b _vfwprintf_l 12887->12888 12933 7ff6a4f53df0 12888->12933 12891 7ff6a4f59ab0 _log10_special 8 API calls 12892 7ff6a4f53eae 12891->12892 12892->12486 12896 7ff6a4f5443e 12893->12896 12894 7ff6a4f545ff Process32FirstW 12895 7ff6a4f54621 12894->12895 12897 7ff6a4f5481f CloseHandle 12895->12897 12898 7ff6a4f54803 Process32NextW 12895->12898 12903 7ff6a4f547f6 12895->12903 12956 7ff6a4f5d2cc 12895->12956 12896->12894 12901 7ff6a4f545f1 12896->12901 12897->12901 12898->12895 12900 7ff6a4f59ab0 _log10_special 8 API calls 12902 7ff6a4f548ff 12900->12902 12901->12900 12902->12483 12903->12897 12973 7ff6a4f51ae0 12904->12973 12906 7ff6a4f59ab0 _log10_special 8 API calls 12907 7ff6a4f519ff 12906->12907 12907->12487 12908 7ff6a4f51030 _wcsupr_s 12908->12906 12910 7ff6a4f53e40 80 API calls 12909->12910 12911 7ff6a4f554b1 VirtualAllocEx 12910->12911 12912 7ff6a4f55501 12911->12912 12913 7ff6a4f5555d WriteProcessMemory 12912->12913 12921 7ff6a4f5565b 12912->12921 12919 7ff6a4f5558f 12913->12919 12914 7ff6a4f53e40 80 API calls 12918 7ff6a4f5572a _invalid_parameter 12914->12918 12915 7ff6a4f53e40 80 API calls 12916 7ff6a4f55986 CreateRemoteThreadEx 12915->12916 12917 7ff6a4f559df 12916->12917 12926 7ff6a4f53e40 80 API calls 12917->12926 12929 7ff6a4f55b27 12917->12929 12922 7ff6a4f53e40 80 API calls 12918->12922 12927 7ff6a4f558b4 12918->12927 12920 7ff6a4f53e40 80 API calls 12919->12920 12919->12921 12920->12921 12921->12914 12924 7ff6a4f55710 12921->12924 12922->12927 12923 7ff6a4f59ab0 _log10_special 8 API calls 12925 7ff6a4f55e47 12923->12925 12924->12923 12925->12495 12926->12929 12927->12915 12927->12924 12928 7ff6a4f55d30 GetThreadId 12930 7ff6a4f53e40 80 API calls 12928->12930 12929->12924 12929->12928 12931 7ff6a4f55d55 WaitForSingleObject 12930->12931 12932 7ff6a4f53e40 80 API calls 12931->12932 12932->12924 12934 7ff6a4f53e0d _vfwprintf_l 12933->12934 12937 7ff6a4f5f3f0 12934->12937 12939 7ff6a4f5f41a 12937->12939 12938 7ff6a4f5f452 12940 7ff6a4f60e64 _invalid_parameter_noinfo 37 API calls 12938->12940 12939->12938 12941 7ff6a4f5f485 12939->12941 12943 7ff6a4f5f47b 12940->12943 12948 7ff6a4f5d448 12941->12948 12944 7ff6a4f5e2c0 _invalid_parameter_noinfo 47 API calls 12943->12944 12946 7ff6a4f5f4ef 12943->12946 12944->12946 12945 7ff6a4f53e2e 12945->12891 12946->12945 12947 7ff6a4f5e2c0 _invalid_parameter_noinfo 47 API calls 12946->12947 12947->12945 12955 7ff6a4f5d1d8 EnterCriticalSection 12948->12955 12950 7ff6a4f5d465 12951 7ff6a4f5e134 _vfwprintf_l 78 API calls 12950->12951 12952 7ff6a4f5d46e 12951->12952 12953 7ff6a4f5d1e4 _vfwprintf_l LeaveCriticalSection 12952->12953 12954 7ff6a4f5d478 12953->12954 12954->12943 12957 7ff6a4f5d2fd 12956->12957 12958 7ff6a4f5d2d9 12956->12958 12960 7ff6a4f5d337 12957->12960 12963 7ff6a4f5d356 12957->12963 12958->12957 12959 7ff6a4f5d2de 12958->12959 12961 7ff6a4f6106c _set_fmode 11 API calls 12959->12961 12962 7ff6a4f6106c _set_fmode 11 API calls 12960->12962 12964 7ff6a4f5d2e3 12961->12964 12965 7ff6a4f5d33c 12962->12965 12966 7ff6a4f5d1f0 47 API calls 12963->12966 12967 7ff6a4f60f30 _invalid_parameter_noinfo 47 API calls 12964->12967 12969 7ff6a4f60f30 _invalid_parameter_noinfo 47 API calls 12965->12969 12972 7ff6a4f5d363 12966->12972 12968 7ff6a4f5d2ee 12967->12968 12968->12895 12970 7ff6a4f5d347 12969->12970 12970->12895 12971 7ff6a4f61d7c 53 API calls 12971->12972 12972->12970 12972->12971 12974 7ff6a4f51afe 12973->12974 12977 7ff6a4f51af4 12973->12977 12979 7ff6a4f538b0 12974->12979 12976 7ff6a4f51f63 lstrcmpiA 12978 7ff6a4f51b03 _wcsupr_s 12976->12978 12977->12908 12978->12976 12978->12977 12981 7ff6a4f538be _wcsupr_s 12979->12981 12980 7ff6a4f53b69 LoadLibraryA 12982 7ff6a4f538d2 12980->12982 12981->12980 12981->12982 12982->12978

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 7ff6a4f54910-7ff6a4f549dd InternetOpenW call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 7 7ff6a4f549e3-7ff6a4f549e9 0->7 8 7ff6a4f54b8e-7ff6a4f54c99 InternetSetOptionW * 3 InternetOpenUrlW call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 0->8 9 7ff6a4f549eb-7ff6a4f549f7 7->9 10 7ff6a4f549f9 7->10 22 7ff6a4f54e55-7ff6a4f54ee5 call 7ff6a4f5d040 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 8->22 23 7ff6a4f54c9f-7ff6a4f54ca5 8->23 12 7ff6a4f54a05-7ff6a4f54a9f call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 9->12 10->12 12->8 37 7ff6a4f54aa5-7ff6a4f54aaa 12->37 50 7ff6a4f54eeb-7ff6a4f54ef1 22->50 51 7ff6a4f550a5-7ff6a4f5514c InternetReadFile call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 22->51 26 7ff6a4f54ca7-7ff6a4f54cb3 23->26 27 7ff6a4f54cb5 23->27 29 7ff6a4f54cc1-7ff6a4f54d5b call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 26->29 27->29 29->22 61 7ff6a4f54d61-7ff6a4f54d66 29->61 37->8 40 7ff6a4f54ab0-7ff6a4f54acc call 7ff6a4f57031 call 7ff6a4f53e40 37->40 58 7ff6a4f54ad8-7ff6a4f54b5d call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 40->58 55 7ff6a4f54ef3-7ff6a4f54eff 50->55 56 7ff6a4f54f01 50->56 79 7ff6a4f55152-7ff6a4f5515a 51->79 80 7ff6a4f55320-7ff6a4f55377 InternetSetOptionW InternetCloseHandle * 2 51->80 60 7ff6a4f54f0d-7ff6a4f54fa7 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 55->60 56->60 58->8 97 7ff6a4f54b5f-7ff6a4f54b78 58->97 60->51 102 7ff6a4f54fad-7ff6a4f54fb2 60->102 61->22 65 7ff6a4f54d6c-7ff6a4f54d7a call 7ff6a4f57031 call 7ff6a4f53e40 61->65 82 7ff6a4f54d7f-7ff6a4f54d93 InternetCloseHandle 65->82 85 7ff6a4f5516a 79->85 86 7ff6a4f5515c-7ff6a4f55168 79->86 87 7ff6a4f55383-7ff6a4f55409 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 80->87 89 7ff6a4f54d9f-7ff6a4f54e24 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 82->89 94 7ff6a4f55176-7ff6a4f55210 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 85->94 86->94 114 7ff6a4f55437-7ff6a4f5544e call 7ff6a4f59ab0 87->114 132 7ff6a4f5540b-7ff6a4f55424 87->132 89->22 134 7ff6a4f54e26-7ff6a4f54e3f 89->134 94->80 135 7ff6a4f55216-7ff6a4f5521b 94->135 108 7ff6a4f54b7a-7ff6a4f54b82 97->108 109 7ff6a4f54b89 97->109 102->51 107 7ff6a4f54fb8-7ff6a4f54fe3 call 7ff6a4f53e40 InternetCloseHandle * 2 102->107 124 7ff6a4f54fef-7ff6a4f55074 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 107->124 108->114 109->58 124->51 155 7ff6a4f55076-7ff6a4f5508f 124->155 142 7ff6a4f55426-7ff6a4f5542e 132->142 143 7ff6a4f55432 132->143 139 7ff6a4f54e50 134->139 140 7ff6a4f54e41-7ff6a4f54e49 134->140 135->80 141 7ff6a4f55221-7ff6a4f5525d call 7ff6a4f57031 call 7ff6a4f53e40 call 7ff6a4f5f514 InternetCloseHandle * 2 135->141 139->89 140->114 161 7ff6a4f55269-7ff6a4f552ef call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 141->161 142->114 143->114 146 7ff6a4f55379-7ff6a4f5537f 143->146 146->87 159 7ff6a4f550a0 155->159 160 7ff6a4f55091-7ff6a4f55099 155->160 159->124 160->114 161->80 171 7ff6a4f552f1-7ff6a4f5530a 161->171 173 7ff6a4f5531b 171->173 174 7ff6a4f5530c-7ff6a4f55314 171->174 173->161 174->114
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Internet$Option$Open
        • String ID: $)$9$M$Mozilla/5.0$[$[!] InternetOpen failed with error: %lu$[!] InternetOpenUrl failed with error: %lu$[!] InternetReadFile failed with error: %lu$[!] Memory allocation failed$http://vpn.reconix.co:8080/sc.wav
        • API String ID: 1764825000-940793784
        • Opcode ID: 1cc16f3be70016595ce96675624f6c0d382df198ba06adb5ab39610c8a3b450b
        • Instruction ID: 8ad9fcbcdabeea8f612b059bf2ce6ce6b0cf76d19fe20984a9f68161b44bcb5b
        • Opcode Fuzzy Hash: 1cc16f3be70016595ce96675624f6c0d382df198ba06adb5ab39610c8a3b450b
        • Instruction Fuzzy Hash: 0E520271A0D5928AE768DB38A8D53BF76E1EBD4301F40503AE58AC7AA9DE7CD405CF01

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 176 7ff6a4f55e50-7ff6a4f55f07 call 7ff6a4f57027 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 185 7ff6a4f5605b-7ff6a4f560f5 call 7ff6a4f54910 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 176->185 186 7ff6a4f55f0d call 7ff6a4f54130 176->186 203 7ff6a4f560fb-7ff6a4f56104 185->203 204 7ff6a4f562a0-7ff6a4f56328 call 7ff6a4f543f0 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 185->204 189 7ff6a4f55f12-7ff6a4f55f8e call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 186->189 189->185 212 7ff6a4f55f94-7ff6a4f55f99 189->212 207 7ff6a4f56106-7ff6a4f56112 203->207 208 7ff6a4f56114 203->208 232 7ff6a4f5632e-7ff6a4f56333 204->232 233 7ff6a4f56821-7ff6a4f56899 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 204->233 211 7ff6a4f56120-7ff6a4f561ba call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 207->211 208->211 211->204 243 7ff6a4f561c0-7ff6a4f561c5 211->243 212->185 215 7ff6a4f55f9f-7ff6a4f55fa7 212->215 218 7ff6a4f55fb3-7ff6a4f5602d call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 215->218 218->185 250 7ff6a4f5602f-7ff6a4f56048 218->250 237 7ff6a4f56343 232->237 238 7ff6a4f56335-7ff6a4f56341 232->238 263 7ff6a4f56a42-7ff6a4f56b1c call 7ff6a4f537c0 * 2 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 233->263 264 7ff6a4f5689f-7ff6a4f568a6 call 7ff6a4f51010 233->264 242 7ff6a4f5634f-7ff6a4f563e9 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 237->242 238->242 282 7ff6a4f563ef-7ff6a4f563f4 242->282 283 7ff6a4f564d1-7ff6a4f56549 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 242->283 243->204 247 7ff6a4f561cb-7ff6a4f561d2 call 7ff6a4f53e40 243->247 252 7ff6a4f561d7-7ff6a4f561e0 247->252 259 7ff6a4f5604a-7ff6a4f5604f 250->259 260 7ff6a4f56056 250->260 257 7ff6a4f561ec-7ff6a4f56272 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 252->257 257->204 304 7ff6a4f56274-7ff6a4f5628d 257->304 265 7ff6a4f56ff6-7ff6a4f5700f call 7ff6a4f59ab0 259->265 260->218 319 7ff6a4f56ce9-7ff6a4f56d61 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 263->319 320 7ff6a4f56b22-7ff6a4f56b46 call 7ff6a4f53680 263->320 280 7ff6a4f568b6 264->280 281 7ff6a4f568a8-7ff6a4f568b4 264->281 286 7ff6a4f568c2-7ff6a4f5695c call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 280->286 281->286 282->283 287 7ff6a4f563fa-7ff6a4f5640f call 7ff6a4f53e40 282->287 283->233 323 7ff6a4f5654f-7ff6a4f5664e call 7ff6a4f53ef0 call 7ff6a4f53ee0 call 7ff6a4f53f10 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 283->323 286->263 331 7ff6a4f56962-7ff6a4f56967 286->331 302 7ff6a4f5641b-7ff6a4f5649e call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 287->302 350 7ff6a4f564cc 302->350 351 7ff6a4f564a0-7ff6a4f564b9 302->351 316 7ff6a4f5629b 304->316 317 7ff6a4f5628f-7ff6a4f56294 304->317 316->257 317->265 360 7ff6a4f56d67-7ff6a4f56d9b call 7ff6a4f55450 319->360 361 7ff6a4f56f29-7ff6a4f56f39 call 7ff6a4f5704f 319->361 336 7ff6a4f56b56 320->336 337 7ff6a4f56b48-7ff6a4f56b54 320->337 405 7ff6a4f56654-7ff6a4f56659 323->405 406 7ff6a4f56810-7ff6a4f56820 call 7ff6a4f53e40 323->406 331->263 338 7ff6a4f5696d-7ff6a4f56982 call 7ff6a4f53e40 331->338 342 7ff6a4f56b62-7ff6a4f56bfc call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 336->342 337->342 354 7ff6a4f5698e-7ff6a4f56a14 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 338->354 342->319 395 7ff6a4f56c02-7ff6a4f56c07 342->395 350->233 362 7ff6a4f564bb-7ff6a4f564c0 351->362 363 7ff6a4f564c7 351->363 354->263 403 7ff6a4f56a16-7ff6a4f56a2f 354->403 379 7ff6a4f56dab 360->379 380 7ff6a4f56d9d-7ff6a4f56da9 360->380 376 7ff6a4f56f45-7ff6a4f56fc8 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 361->376 362->265 363->302 426 7ff6a4f56fca-7ff6a4f56fe3 376->426 427 7ff6a4f56ff0-7ff6a4f56ff4 376->427 385 7ff6a4f56db7-7ff6a4f56e50 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 379->385 380->385 385->361 433 7ff6a4f56e56-7ff6a4f56e5b 385->433 395->319 397 7ff6a4f56c0d-7ff6a4f56c29 call 7ff6a4f57031 call 7ff6a4f53e40 395->397 428 7ff6a4f56c35-7ff6a4f56cbb call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 397->428 416 7ff6a4f56a3d 403->416 417 7ff6a4f56a31-7ff6a4f56a36 403->417 405->406 412 7ff6a4f5665f-7ff6a4f566e4 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 405->412 406->233 450 7ff6a4f566ea-7ff6a4f567f7 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 412->450 451 7ff6a4f5680e 412->451 416->354 417->265 436 7ff6a4f56feb 426->436 437 7ff6a4f56fe5-7ff6a4f56fe7 426->437 427->265 428->319 462 7ff6a4f56cbd-7ff6a4f56cd6 428->462 433->361 439 7ff6a4f56e61-7ff6a4f56e69 433->439 436->376 437->265 443 7ff6a4f56e75-7ff6a4f56efb call 7ff6a4f53f00 call 7ff6a4f53ed0 call 7ff6a4f53ec0 call 7ff6a4f53f20 439->443 443->361 471 7ff6a4f56efd-7ff6a4f56f16 443->471 450->451 485 7ff6a4f567f9-7ff6a4f567fe 450->485 451->233 466 7ff6a4f56cd8-7ff6a4f56cdd 462->466 467 7ff6a4f56ce4 462->467 466->265 467->428 476 7ff6a4f56f18-7ff6a4f56f1d 471->476 477 7ff6a4f56f24 471->477 476->265 477->443 485->451 486 7ff6a4f56800-7ff6a4f5680d call 7ff6a4f53f20 485->486 486->451
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID: *$2$B$B$[!] Failed to call OP: Status = 0x%08lx$[!] Failed to get buffer$[!] Failed to initialize API$[!] PID not found :( exiting...$[+] PID = %d$mspaint.exe
        • API String ID: 0-3587932735
        • Opcode ID: 125ca28868dcf1f8980c76e48907f2a3240e1f812d13970b13bec600d3f0bf43
        • Instruction ID: 778c55be7a725c6398a34ada32c16d0c787cfeac02d814d88a3ae8f1339d316b
        • Opcode Fuzzy Hash: 125ca28868dcf1f8980c76e48907f2a3240e1f812d13970b13bec600d3f0bf43
        • Instruction Fuzzy Hash: B2A22F31A0D5924AE768DB3CACD53BF7AE19BD4301F00503AE59EC7AA6DE6CD805CB01

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 489 7ff6a4f6799c-7ff6a4f679c1 490 7ff6a4f679c7-7ff6a4f679ca 489->490 491 7ff6a4f67c8f 489->491 493 7ff6a4f679cc-7ff6a4f679fe call 7ff6a4f60e64 490->493 494 7ff6a4f67a03-7ff6a4f67a2f 490->494 492 7ff6a4f67c91-7ff6a4f67ca1 491->492 493->492 496 7ff6a4f67a3a-7ff6a4f67a40 494->496 497 7ff6a4f67a31-7ff6a4f67a38 494->497 499 7ff6a4f67a42-7ff6a4f67a4b call 7ff6a4f6b244 496->499 500 7ff6a4f67a50-7ff6a4f67a65 call 7ff6a4f69ba4 496->500 497->493 497->496 499->500 504 7ff6a4f67a6b-7ff6a4f67a74 500->504 505 7ff6a4f67b7f-7ff6a4f67b88 500->505 504->505 508 7ff6a4f67a7a-7ff6a4f67a7e 504->508 506 7ff6a4f67b8a-7ff6a4f67b90 505->506 507 7ff6a4f67bdc-7ff6a4f67c01 WriteFile 505->507 509 7ff6a4f67bc8-7ff6a4f67bd5 call 7ff6a4f674ec 506->509 510 7ff6a4f67b92-7ff6a4f67b95 506->510 513 7ff6a4f67c0c 507->513 514 7ff6a4f67c03-7ff6a4f67c09 GetLastError 507->514 511 7ff6a4f67a8f-7ff6a4f67a9a 508->511 512 7ff6a4f67a80-7ff6a4f67a88 call 7ff6a4f5f210 508->512 529 7ff6a4f67bda 509->529 516 7ff6a4f67b97-7ff6a4f67b9a 510->516 517 7ff6a4f67bb4-7ff6a4f67bc6 call 7ff6a4f6770c 510->517 519 7ff6a4f67aab-7ff6a4f67ac0 GetConsoleMode 511->519 520 7ff6a4f67a9c-7ff6a4f67aa5 511->520 512->511 515 7ff6a4f67c0f 513->515 514->513 522 7ff6a4f67c14 515->522 523 7ff6a4f67c20-7ff6a4f67c2a 516->523 524 7ff6a4f67ba0-7ff6a4f67bb2 call 7ff6a4f675f0 516->524 537 7ff6a4f67b6c-7ff6a4f67b73 517->537 527 7ff6a4f67ac6-7ff6a4f67acc 519->527 528 7ff6a4f67b78 519->528 520->505 520->519 530 7ff6a4f67c19 522->530 531 7ff6a4f67c2c-7ff6a4f67c31 523->531 532 7ff6a4f67c88-7ff6a4f67c8d 523->532 524->537 535 7ff6a4f67ad2-7ff6a4f67ad5 527->535 536 7ff6a4f67b55-7ff6a4f67b67 call 7ff6a4f67074 527->536 528->505 529->537 530->523 538 7ff6a4f67c33-7ff6a4f67c36 531->538 539 7ff6a4f67c5f-7ff6a4f67c69 531->539 532->492 541 7ff6a4f67ad7-7ff6a4f67ada 535->541 542 7ff6a4f67ae0-7ff6a4f67aee 535->542 536->537 537->522 544 7ff6a4f67c38-7ff6a4f67c47 538->544 545 7ff6a4f67c4f-7ff6a4f67c5a call 7ff6a4f61028 538->545 546 7ff6a4f67c6b-7ff6a4f67c6e 539->546 547 7ff6a4f67c70-7ff6a4f67c7f 539->547 541->530 541->542 548 7ff6a4f67b4c-7ff6a4f67b50 542->548 549 7ff6a4f67af0 542->549 544->545 545->539 546->491 546->547 547->532 548->515 550 7ff6a4f67af4-7ff6a4f67b0b call 7ff6a4f6b24c 549->550 555 7ff6a4f67b0d-7ff6a4f67b19 550->555 556 7ff6a4f67b43-7ff6a4f67b49 GetLastError 550->556 557 7ff6a4f67b1b-7ff6a4f67b2d call 7ff6a4f6b24c 555->557 558 7ff6a4f67b38-7ff6a4f67b3f 555->558 556->548 557->556 562 7ff6a4f67b2f-7ff6a4f67b36 557->562 558->548 560 7ff6a4f67b41 558->560 560->550 562->558
        APIs
        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6A4F67987), ref: 00007FF6A4F67AB8
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6A4F67987), ref: 00007FF6A4F67B43
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ConsoleErrorLastMode
        • String ID:
        • API String ID: 953036326-0
        • Opcode ID: 4e94c7dd292bbb1844349f8ba6a6562a6c97a9a5ec7bf7282ab70a4c1b87f342
        • Instruction ID: e906c9d8b409dd1595b69f6733f32fcfa7c8023a39e245db93b0bff3c2abc3e2
        • Opcode Fuzzy Hash: 4e94c7dd292bbb1844349f8ba6a6562a6c97a9a5ec7bf7282ab70a4c1b87f342
        • Instruction Fuzzy Hash: A491C772E1969289F7508F759CC02BDABE6BB85B88F146135DE0E976A9CF3CD441C700

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Process$CurrentExitTerminate
        • String ID:
        • API String ID: 1703294689-0
        • Opcode ID: 75cd47252ca348697d664fbe1d63f24b799ff1fe1c3d7420bdb75bc166d426d2
        • Instruction ID: 49d9dfd17f8e69ae46e3608c61c7d4715a83a9da455955f3724bb24903457f63
        • Opcode Fuzzy Hash: 75cd47252ca348697d664fbe1d63f24b799ff1fe1c3d7420bdb75bc166d426d2
        • Instruction Fuzzy Hash: F0D09E10F1A6C65AEA186F709DD517992515FC9741F503838D90F873B3DE2DA44D8610

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
        • String ID:
        • API String ID: 1236291503-0
        • Opcode ID: a66286efb5a1ddf67842e73e227ff26c37883cb43728f71b61ba9f623028d243
        • Instruction ID: 57c4d58fee5fb94c577c1d4fe0e70937b14752be9992543991c846bd0d82388f
        • Opcode Fuzzy Hash: a66286efb5a1ddf67842e73e227ff26c37883cb43728f71b61ba9f623028d243
        • Instruction Fuzzy Hash: 19314B31E0E64342FA18AB359CD57B95291AFC5784F44A035EA4EC72F7DE6DA405C212

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 688 7ff6a4f674ec-7ff6a4f67552 call 7ff6a4f6d2f0 691 7ff6a4f675c3-7ff6a4f675ed call 7ff6a4f59ab0 688->691 692 7ff6a4f67554 688->692 694 7ff6a4f67559-7ff6a4f6755c 692->694 695 7ff6a4f67582-7ff6a4f675a7 WriteFile 694->695 696 7ff6a4f6755e-7ff6a4f67565 694->696 700 7ff6a4f675bb-7ff6a4f675c1 GetLastError 695->700 701 7ff6a4f675a9-7ff6a4f675b2 695->701 698 7ff6a4f67567-7ff6a4f6756d 696->698 699 7ff6a4f67570-7ff6a4f67580 696->699 698->699 699->694 699->695 700->691 701->691 702 7ff6a4f675b4-7ff6a4f675b7 701->702 702->692 703 7ff6a4f675b9 702->703 703->691
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID:
        • API String ID: 442123175-0
        • Opcode ID: 8b83b15cc7c4a0d3b101f8f03bbeaddeebe49cb913055b88c9d1f2e5de7b0d23
        • Instruction ID: 14a0e847c139bf282258b946e2c77e03d4c4ea6c1cf161abd529ce8f9342f616
        • Opcode Fuzzy Hash: 8b83b15cc7c4a0d3b101f8f03bbeaddeebe49cb913055b88c9d1f2e5de7b0d23
        • Instruction Fuzzy Hash: 6931D772A1AB858AEB109F35E8C06A9B7A2FB98780F446432DB4DC3765DF3CD516C700

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: FileHandleType
        • String ID:
        • API String ID: 3000768030-0
        • Opcode ID: 9fd783dc2a4900c3051b301bdee6de2fd5b39a3cbceec82b59b58416dab91fa5
        • Instruction ID: fa81fff0bdcfacbd0f9d50c068afe7e60c8a8c5f33fac37072425e9fca165d51
        • Opcode Fuzzy Hash: 9fd783dc2a4900c3051b301bdee6de2fd5b39a3cbceec82b59b58416dab91fa5
        • Instruction Fuzzy Hash: BD314431E19B9591EB648B259AD01BCA650FB85BB4B642339DB6E873F0CF38E451D340

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: HandleModule$AddressFreeLibraryProc
        • String ID:
        • API String ID: 3947729631-0
        • Opcode ID: d25aa29243dea4088ad385749646983487e0f95e9894d38747cc099433b70f8d
        • Instruction ID: 837099060bc4f72be0b96ac3bb329ef9c42e06948ea54d08c4eabf4caa75b523
        • Opcode Fuzzy Hash: d25aa29243dea4088ad385749646983487e0f95e9894d38747cc099433b70f8d
        • Instruction Fuzzy Hash: B1216D32A166819EEB24DFB4C8802BC73A4EB8471CF241635D75D87AE6DF38D584CB40

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: _vfwprintf_l
        • String ID:
        • API String ID: 1692953108-0
        • Opcode ID: f4572c094ca873bd20381e012b646367b31b00622fe0f684fecc9b91589cd55f
        • Instruction ID: c486e23210ae1c95900e6b2bef6b26f5ab720e8bb603dbc6db5d66ea283a4cc1
        • Opcode Fuzzy Hash: f4572c094ca873bd20381e012b646367b31b00622fe0f684fecc9b91589cd55f
        • Instruction Fuzzy Hash: 97F0F232A19B8086E620DB24F89161AB7A0FB88394F406225EACC87B29DF3CC1108B40

        Control-flow Graph

        APIs
        • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FF6A4F5A034
          • Part of subcall function 00007FF6A4F5AAF0: __vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00007FF6A4F5AAF8
          • Part of subcall function 00007FF6A4F5AAF0: __vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00007FF6A4F5AAFD
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: __scrt_dllmain_crt_thread_attach__vcrt_uninitialize_locks__vcrt_uninitialize_ptd
        • String ID:
        • API String ID: 1208906642-0
        • Opcode ID: b5fc25849003a3a8ada5ab860e3edbd7bd8deed7f2fec2fd8e76e0a2fb528f7b
        • Instruction ID: 0cb5a14e833e9c742f56a135dc04811fbbb897663836d8e47d742d5c4bed1bcb
        • Opcode Fuzzy Hash: b5fc25849003a3a8ada5ab860e3edbd7bd8deed7f2fec2fd8e76e0a2fb528f7b
        • Instruction Fuzzy Hash: BCE0B670D1F24384FE683A311DD22B906802FA5349F50B07BD50EC31A39E9E34769663
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: AllocMemoryProcessVirtualWrite_invalid_parameter_vfwprintf_l
        • String ID: K$Z$[$[!] Failed to call CRT: Status = 0x%08lx$[!] Failed to call WriteProcessMemory: Status = 0x%08lx$[!] Failed to change permissions to READ_EXECUTE: Status = 0x%08lx$[+] Clean Up$[i] Calling CreateRemoteThreadEx to execute the shellcode$[i] Changing permissions to READ_EXECUTE$[i] Thread ID: %lu$[i] size: %lu bytes
        • API String ID: 1260537430-2531971748
        • Opcode ID: af27fc23d4f720fcdd1a3f81f4176ef7d0de5332f78082368a147727be6b4980
        • Instruction ID: ad9a041c0abdc2b2a73cc3b1cf23c7b6a8bb42393ef11bf664b90d3f8efd0e2f
        • Opcode Fuzzy Hash: af27fc23d4f720fcdd1a3f81f4176ef7d0de5332f78082368a147727be6b4980
        • Instruction Fuzzy Hash: 6F421471A0D5928AE768DB38A8D43BF76E1EBD4301F00513AE589C7AA9DE7CD905CF01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
        • API String ID: 808467561-2761157908
        • Opcode ID: 22158d967f507a41f7d4223f1c49d9dbd0af371d615fed8ca836a079cd5b1536
        • Instruction ID: 30adad060cf521b57cfc81886861459fcefc790f907805998671d708af5c1ef8
        • Opcode Fuzzy Hash: 22158d967f507a41f7d4223f1c49d9dbd0af371d615fed8ca836a079cd5b1536
        • Instruction Fuzzy Hash: 3EB2D972A1A2D28BE7648F74D980BFDB7A1FB94744F506139DA0D97A94DF3CA900CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: CreateFirstProcess32SnapshotToolhelp32
        • String ID: $$E
        • API String ID: 2353314856-928736151
        • Opcode ID: 27f4ea1f1bf3220c08c763b2075ef71db40dc3594e777dbe87ea2a6dd8378b8f
        • Instruction ID: 8d391ef759ac648f836759a47a3a9abfeed0f75744c2f4545d98e737aec580ce
        • Opcode Fuzzy Hash: 27f4ea1f1bf3220c08c763b2075ef71db40dc3594e777dbe87ea2a6dd8378b8f
        • Instruction Fuzzy Hash: 41D11071A0D5924BD768DB3CA8D537B7AE1EBC4301F10513AE68AC7AA9DE6CD805CF01
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
        • String ID:
        • API String ID: 3140674995-0
        • Opcode ID: bc5d155351869abd3934ceb4587d6c72f84c0e544f419129d2cd5d9115ac6f4b
        • Instruction ID: fc3b473d6def05761a1d0374d7371cd7dbfe764e5e9e595febaf7295b7e839dc
        • Opcode Fuzzy Hash: bc5d155351869abd3934ceb4587d6c72f84c0e544f419129d2cd5d9115ac6f4b
        • Instruction Fuzzy Hash: 7B313072A0AB8196EB608F70E8803ED7364FB84748F44543ADB4E87BA9DF78D558C710
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
        • String ID:
        • API String ID: 1239891234-0
        • Opcode ID: 8e59c9358d1640dcb3c9bfe80af94b7b5c29a699d3f0c094609e3e576e38442c
        • Instruction ID: 48f19df72324740dbed2d5db630e2330e8a5b9d357388b9a0a8f2fbfa135fd06
        • Opcode Fuzzy Hash: 8e59c9358d1640dcb3c9bfe80af94b7b5c29a699d3f0c094609e3e576e38442c
        • Instruction Fuzzy Hash: 5B315E32619B819ADB60CF35E8802AE73A0FBC8754F501536EA9D83B65DF38D555CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: 09b34e5eb01b65e21e5ab57414b660caf1064f2ae994193f6f09143ea654af88
        • Instruction ID: 62d4a8fef68c4421bb088b191a96c4ac6fcc6a17e532ade4a007db037c03d016
        • Opcode Fuzzy Hash: 09b34e5eb01b65e21e5ab57414b660caf1064f2ae994193f6f09143ea654af88
        • Instruction Fuzzy Hash: 0F111C22B19B018AEB008F70EC952A833A4FB59758F442E31DA6D877A4DF7CD1648340
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: memcpy_s
        • String ID:
        • API String ID: 1502251526-0
        • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
        • Instruction ID: c46763b9b502b3b887af65583fa52a5148d14ae862e7ae2ac72b3bac8832411d
        • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
        • Instruction Fuzzy Hash: 31C1E472B1A6C687EB24CF29A48466AF791F7C4B84F44A139DB4A83754DF3DE901CB40
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ExceptionRaise_clrfp
        • String ID:
        • API String ID: 15204871-0
        • Opcode ID: f33f0bd377485474e369ffe98575429038715d08cf8a835ef38705ff0538d6ee
        • Instruction ID: be8a18da2c905ce06c1b4018f8915f900b48513ee291a144027d2c67090cc6a1
        • Opcode Fuzzy Hash: f33f0bd377485474e369ffe98575429038715d08cf8a835ef38705ff0538d6ee
        • Instruction Fuzzy Hash: 45B13B73A06BC5CAEB15CF29C8863687BA0F784B88F159925DA9D877B8CF39D451C700
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID: e+000$gfff
        • API String ID: 0-3030954782
        • Opcode ID: 45b46012d1c0bf26ac58a82852236fe0cc570d8ff39719d27a42e62241cab812
        • Instruction ID: a63ef6debd535cd3ccb0a7067fe6b1fd68cc1e4e59fdeff390bafb42d15c036a
        • Opcode Fuzzy Hash: 45b46012d1c0bf26ac58a82852236fe0cc570d8ff39719d27a42e62241cab812
        • Instruction Fuzzy Hash: 71516A62B1D2C246E7249E359C80769FB91F794B94F09E235CB988BAE5CF7DD4408700
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b397099d2791fc469ffcdc7faae3aec4ebe3785fccec4a2873f13ca3cb35dc6d
        • Instruction ID: 51ff057e6c6783ef1cf8d355f77f353aa65a42549df7c7d02c2308c130221d63
        • Opcode Fuzzy Hash: b397099d2791fc469ffcdc7faae3aec4ebe3785fccec4a2873f13ca3cb35dc6d
        • Instruction Fuzzy Hash: 0C51F722B097D185FB10AB76AD805AEBBA1FB80794F245135EE5CA7BA9DF3CD401C704
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID: gfffffff
        • API String ID: 0-1523873471
        • Opcode ID: 5d3aa5215e7b1499e55759fc0027dbc7cd5f8292022a9b8a81994a20105cf082
        • Instruction ID: 1b803ddc3994100c4798099422f7f54580f09fc155dcb714e6bd854b94fa37df
        • Opcode Fuzzy Hash: 5d3aa5215e7b1499e55759fc0027dbc7cd5f8292022a9b8a81994a20105cf082
        • Instruction Fuzzy Hash: 55A15762B0A7C646EB21DF39A8807ADFB94EB91B84F06A031DE4D877A5DE3DD501C701
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID: 0-3916222277
        • Opcode ID: 9292c1909d4d5ff6e19cd41967842bf288430eb099d74b57b4701dd6f40ec8f4
        • Instruction ID: e31d5b1d36ad31b1da5327e44c9a7a9849cf2f9ed230e639dbeb90a19c8141ba
        • Opcode Fuzzy Hash: 9292c1909d4d5ff6e19cd41967842bf288430eb099d74b57b4701dd6f40ec8f4
        • Instruction Fuzzy Hash: 10B1B176A1A78185E7A48F39C89027D3BA4EB85F88F18A135DA4DC73ADDF39D440C742
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: HeapProcess
        • String ID:
        • API String ID: 54951025-0
        • Opcode ID: 7b84f975143446e2cbcd9f8a2807d50c1265a4eafd489251f556ad3b39486447
        • Instruction ID: e061977f487819f45f4e78194dfb3c27ffab262c554d20e499b4b1214b978602
        • Opcode Fuzzy Hash: 7b84f975143446e2cbcd9f8a2807d50c1265a4eafd489251f556ad3b39486447
        • Instruction Fuzzy Hash: B5B09224E0BA82C2EA082B316CC221422E4BF88700F985138C00CC2330DF2C20B56B10
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e038a71e764e5f07ea2d3f7507c68c1bff02966f0ea4b3a5e2a13bfc42550c64
        • Instruction ID: 27e054b3b0433e4dcec1ec82004af0f48e4d9fb7920bae254ba705bd5faeffca
        • Opcode Fuzzy Hash: e038a71e764e5f07ea2d3f7507c68c1bff02966f0ea4b3a5e2a13bfc42550c64
        • Instruction Fuzzy Hash: A4E19032A0964285E7E48B38C9D837827A1EB85B58F14E235CA4DC76EDDF29E841C302
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: c0beef57d4d81ae4f9477feb73e5011971a425e07953d9e6409e3cb8347ca993
        • Instruction ID: c77e0589ccba6cee8f534d29193a7a46249b298d2b9c34b8ca3476022d49ae47
        • Opcode Fuzzy Hash: c0beef57d4d81ae4f9477feb73e5011971a425e07953d9e6409e3cb8347ca993
        • Instruction Fuzzy Hash: 2281C272A0D7C146E774CB29988176AEA91FBC5794F545239DE8E83BA9DF3DE4008B00
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 91f19b1489606b8bc19d5a4809129a5af38383a0e9e623e80f569da898e81a1e
        • Instruction ID: 6f326178f71e73cf4b833fcbf885b5c61bd1c6055584950bc988b316dff87097
        • Opcode Fuzzy Hash: 91f19b1489606b8bc19d5a4809129a5af38383a0e9e623e80f569da898e81a1e
        • Instruction Fuzzy Hash: 93516476A1B65186E7248B39C48033837A0EB95F59F24E131CE8D977B5CF3AE842C781
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f5768c36f5caadb0d001be6ede6c0a97f1360bd3ad018192d3e7a341192088c4
        • Instruction ID: 03c2567107501ddd147b623935a12c366bac10f9715c9b6dc508f36f258d137a
        • Opcode Fuzzy Hash: f5768c36f5caadb0d001be6ede6c0a97f1360bd3ad018192d3e7a341192088c4
        • Instruction Fuzzy Hash: 05517376A1B65186E7648B39C48022937A1EBC4F58F28E131CE4C977B5CF3AE942C742
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b4804d1b93ce0b97165496bd195f56fd62168f29abec30e04b3eb9e9b2791b78
        • Instruction ID: 1a9fc7ce232ebc52635ec9555c1e7aad792f3b155c7a6e18ab4548a9d1a3752c
        • Opcode Fuzzy Hash: b4804d1b93ce0b97165496bd195f56fd62168f29abec30e04b3eb9e9b2791b78
        • Instruction Fuzzy Hash: 97519F76A1BA5186E7258B39C89423837B0EB85F58F25E131CA4D877A4CF7AE843C741
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ErrorFreeHeapLast
        • String ID:
        • API String ID: 485612231-0
        • Opcode ID: e39d3a6a4745a9ca475ce6e16f80eb61d7b6675672aa413b282b817f4f332eb4
        • Instruction ID: b0af4668889e99eb96d3e8b19c23d80a55a37cdb3c793734a8c627ff28791fa1
        • Opcode Fuzzy Hash: e39d3a6a4745a9ca475ce6e16f80eb61d7b6675672aa413b282b817f4f332eb4
        • Instruction Fuzzy Hash: 0B41D462B15A9585EF08CF3ADD94169A3A1BB88FC0B59A432DE0DD7B68DF3CD4418300
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 06765e3e769664596c98c1387e2f6e4fe9174840ac955173aff2e886965b2cc6
        • Instruction ID: 662098ef8528d2c0eacd89c9015ee540f8d5aa3aced0d7d25487249242e1b5ba
        • Opcode Fuzzy Hash: 06765e3e769664596c98c1387e2f6e4fe9174840ac955173aff2e886965b2cc6
        • Instruction Fuzzy Hash: 47F04F71B1D2D5CADBA4CF28AC826297791E748384B90913ED68DC3A24DA3C90608F44
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d852e4f6dd6e88fc97deae05714aa7b452463a0eb018e0a0a536b7ed936e6541
        • Instruction ID: 7ec774d92f66e6e8a3df279323b815018b2dd24142fe6548bc974657ed381676
        • Opcode Fuzzy Hash: d852e4f6dd6e88fc97deae05714aa7b452463a0eb018e0a0a536b7ed936e6541
        • Instruction Fuzzy Hash: 5CA0012290E846A4E6048B60AC941216620AB90300B817432C11D879719E7CA490C261
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
        • String ID: csm$csm$csm
        • API String ID: 849930591-393685449
        • Opcode ID: 06d78aa3b8356eedd2fca4e3a56e75d54ba4396f55f007474ca930dfdee9f5da
        • Instruction ID: e646efb29deb02aca9c890f499f8b265d6e39173a5f50e33bd0a049560446804
        • Opcode Fuzzy Hash: 06d78aa3b8356eedd2fca4e3a56e75d54ba4396f55f007474ca930dfdee9f5da
        • Instruction Fuzzy Hash: 69D184329097818AEB20DF75D8803AD77A0FB85789F14A135EE4D97B66CF38E090C742
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: AddressFreeLibraryProc
        • String ID: api-ms-$ext-ms-
        • API String ID: 3013587201-537541572
        • Opcode ID: ddb3ae1cebc378c8412ada9312686c7672396f7e2ca393543f714a7511f8aa28
        • Instruction ID: 7e88a56f062826628b597f0e3af3406d6d972377898d693582938bc2762a46c3
        • Opcode Fuzzy Hash: ddb3ae1cebc378c8412ada9312686c7672396f7e2ca393543f714a7511f8aa28
        • Instruction Fuzzy Hash: 2C41CB21B1AA8285EE55DB36AD806B6A395BF85B90F486635DD0DC77A8EF3CE405C300
        APIs
        • LoadLibraryExW.KERNEL32(?,?,?,00007FF6A4F5B1D6,?,?,?,00007FF6A4F5AEC8,?,?,?,00007FF6A4F5AAD1), ref: 00007FF6A4F5AFA9
        • GetLastError.KERNEL32(?,?,?,00007FF6A4F5B1D6,?,?,?,00007FF6A4F5AEC8,?,?,?,00007FF6A4F5AAD1), ref: 00007FF6A4F5AFB7
        • LoadLibraryExW.KERNEL32(?,?,?,00007FF6A4F5B1D6,?,?,?,00007FF6A4F5AEC8,?,?,?,00007FF6A4F5AAD1), ref: 00007FF6A4F5AFE1
        • FreeLibrary.KERNEL32(?,?,?,00007FF6A4F5B1D6,?,?,?,00007FF6A4F5AEC8,?,?,?,00007FF6A4F5AAD1), ref: 00007FF6A4F5B04F
        • GetProcAddress.KERNEL32(?,?,?,00007FF6A4F5B1D6,?,?,?,00007FF6A4F5AEC8,?,?,?,00007FF6A4F5AAD1), ref: 00007FF6A4F5B05B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Library$Load$AddressErrorFreeLastProc
        • String ID: api-ms-
        • API String ID: 2559590344-2084034818
        • Opcode ID: 5002c3478240859d91d603377b4c8c51d1ae95930c09dffe45f68fcb7a3bfa4d
        • Instruction ID: a339f599dcc22e83b779181a844eddef10855c5c0c449ed0d6df13721d0f5eba
        • Opcode Fuzzy Hash: 5002c3478240859d91d603377b4c8c51d1ae95930c09dffe45f68fcb7a3bfa4d
        • Instruction Fuzzy Hash: 0731EE31A1BB4295EE11DB22AC8067573D4BF84BA0F59A535DD2D8B3A4EF3CE445C301
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Value$ErrorLast
        • String ID:
        • API String ID: 2506987500-0
        • Opcode ID: fd3f4e450e7988948c209e1879f635c239aea1308d636bb6eeb1547c5c7661e5
        • Instruction ID: 0c2ea16c3aed831fb5f543138d8d2a9236715f75d19d445d5c9bcbc9d411c169
        • Opcode Fuzzy Hash: fd3f4e450e7988948c209e1879f635c239aea1308d636bb6eeb1547c5c7661e5
        • Instruction Fuzzy Hash: 4B213E24F0F6C242FA54A7719EC1179D2529FC97B0F156F34D92E87AFBDE2CA4418600
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
        • String ID: CONOUT$
        • API String ID: 3230265001-3130406586
        • Opcode ID: 7080f1759af1962fb33c0ec0e422b44054395cda6b270677adb39bf0a386a5ef
        • Instruction ID: 4b39a429d3036e50a64f5796bd9c0913e28a760624d63ba1ebaa54fb12141b8a
        • Opcode Fuzzy Hash: 7080f1759af1962fb33c0ec0e422b44054395cda6b270677adb39bf0a386a5ef
        • Instruction Fuzzy Hash: 16116621B19B8186E7508B62EC94325B3A0FBC8FE4F045234EA5EC77A4DF7CD4548744
        APIs
        • GetLastError.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F6236F
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F623A5
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F623D2
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F623E3
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F623F4
        • SetLastError.KERNEL32(?,?,?,00007FF6A4F61075,?,?,?,?,00007FF6A4F610F3,?,?,00000000,00007FF6A4F6247E,?,?,?), ref: 00007FF6A4F6240F
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Value$ErrorLast
        • String ID:
        • API String ID: 2506987500-0
        • Opcode ID: 683b331be4a16bc35bf86e6167d4d1af5cc8b9268dbd908459ed21f39154743b
        • Instruction ID: 6c433956741e44be47f74a44b59c24460a95d542d4a999ba074c5425e26763a8
        • Opcode Fuzzy Hash: 683b331be4a16bc35bf86e6167d4d1af5cc8b9268dbd908459ed21f39154743b
        • Instruction Fuzzy Hash: F1114F20F0F2C282FA54A7355ED2179E2429FC57B0F156B35D93E876F7DE6CA4418601
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: b9b0cf25f5d9b6d9b83dfe1f7fa100c23d288bf055f6122e27c5178e075af21a
        • Instruction ID: 9e354a99ca027367218525179a2c51ec69881147bb972ad00d458703aa7256fd
        • Opcode Fuzzy Hash: b9b0cf25f5d9b6d9b83dfe1f7fa100c23d288bf055f6122e27c5178e075af21a
        • Instruction Fuzzy Hash: E7F04F21A1EB4686FA148B34ECD437AA320AFC9BA1F642635C56D872F4CF2CD444CB10
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: _set_statfp
        • String ID:
        • API String ID: 1156100317-0
        • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
        • Instruction ID: 9b68094840dd2d860fc2cb28f9a5975b4ce4ead21a7c6919426d53f91c615999
        • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
        • Instruction Fuzzy Hash: 0311C132E1EAD381F7545578EEE6375A0416FD9370F092230EAEEC72F6CE6CA8815201
        APIs
        • FlsGetValue.KERNEL32(?,?,?,00007FF6A4F60BF3,?,?,00000000,00007FF6A4F60E8E), ref: 00007FF6A4F62447
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F60BF3,?,?,00000000,00007FF6A4F60E8E), ref: 00007FF6A4F62466
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F60BF3,?,?,00000000,00007FF6A4F60E8E), ref: 00007FF6A4F6248E
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F60BF3,?,?,00000000,00007FF6A4F60E8E), ref: 00007FF6A4F6249F
        • FlsSetValue.KERNEL32(?,?,?,00007FF6A4F60BF3,?,?,00000000,00007FF6A4F60E8E), ref: 00007FF6A4F624B0
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 59724d992d15333fa193ce278d53c702b6214a622c873772a7334d43b8997db6
        • Instruction ID: 7d4709b22b057d51bad0b0818e2a186e30334e3deeb8ac4fa11de063e59a9996
        • Opcode Fuzzy Hash: 59724d992d15333fa193ce278d53c702b6214a622c873772a7334d43b8997db6
        • Instruction Fuzzy Hash: C9110A20F0F28241FE58A735AED127AE2529FC57B0F156B35ED2D87AF7DE2CA4418600
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Value
        • String ID:
        • API String ID: 3702945584-0
        • Opcode ID: 5d25d9e83496e835950b5ecd794f732d52c0690cd6a9d1688453466e3abe4f10
        • Instruction ID: 7092e15b1d98aec921f6a7647b3a931f33327be8bdedf59134ab1655461fa762
        • Opcode Fuzzy Hash: 5d25d9e83496e835950b5ecd794f732d52c0690cd6a9d1688453466e3abe4f10
        • Instruction Fuzzy Hash: B611C524E0F28641FD58A7355DD217992428FC6370E193B35D93E8B6F7DE2CB4419202
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
        • String ID: csm
        • API String ID: 2395640692-1018135373
        • Opcode ID: 5f5d302166e19634829c094452bfe87a873ebe6b813598db0edb239a19e2502c
        • Instruction ID: 87e7649f21bdcd37b495af463d0b724c2892bf0182b3d9c3896228de297f117c
        • Opcode Fuzzy Hash: 5f5d302166e19634829c094452bfe87a873ebe6b813598db0edb239a19e2502c
        • Instruction Fuzzy Hash: A7519331F1A6428ADB14CB25D9846787791EBC4B94F11D132EA5EC3768EFBCE861C702
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: CallEncodePointerTranslator
        • String ID: MOC$RCC
        • API String ID: 3544855599-2084237596
        • Opcode ID: 60f6320091066ee4df9eea52bc9c04b11228bf2b902cead3227b2dc1035e28eb
        • Instruction ID: 2af725593470bf1009f2bd1ce0d48cf27a349a2b45ed9c88b7543ab8a93a2e3f
        • Opcode Fuzzy Hash: 60f6320091066ee4df9eea52bc9c04b11228bf2b902cead3227b2dc1035e28eb
        • Instruction Fuzzy Hash: CC616E32909BC5C5E7309B25E8803AAB7A0FBC5B94F049225EB9D57B65DF7CD190CB01
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
        • String ID: csm$csm
        • API String ID: 3896166516-3733052814
        • Opcode ID: 4dedabad64849d541369821fffd6302125c4cd2447467dfb5b60e4f5a2655fe0
        • Instruction ID: 8f6e52fec9266e2c37e49f060a783574e12920fe60b50b2f08289fbcc3d4da9c
        • Opcode Fuzzy Hash: 4dedabad64849d541369821fffd6302125c4cd2447467dfb5b60e4f5a2655fe0
        • Instruction Fuzzy Hash: 7351733290A2C2C6DB748F35988426877A0FB95B94F14A135DA9EC7BA5CF3CE550CB02
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: FileWrite$ConsoleErrorLastOutput
        • String ID:
        • API String ID: 2718003287-0
        • Opcode ID: b427c493d79cd69df0973f38144ff804a1e4f3923916a32b6a0420c97276a5ad
        • Instruction ID: 45ca56301435c88f26bc4019b283482c59bf28b2bb1ed6695b5bfe69f4acbee1
        • Opcode Fuzzy Hash: b427c493d79cd69df0973f38144ff804a1e4f3923916a32b6a0420c97276a5ad
        • Instruction Fuzzy Hash: B8D11532B0AA8189E710CF75D8801AD7BB2FB84B98B005236CF5DD7BA9DE38D406C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ErrorFileLastWrite
        • String ID: U
        • API String ID: 442123175-4171548499
        • Opcode ID: a984cb8f0ef6dbe813b37106abef04d71e7b0803456cb9d357151010d4e928c2
        • Instruction ID: 2d278243b4438fa72215a75a4d6ab2c109e82a8ed9bf9e855b4fef61b5ddf390
        • Opcode Fuzzy Hash: a984cb8f0ef6dbe813b37106abef04d71e7b0803456cb9d357151010d4e928c2
        • Instruction Fuzzy Hash: E041B222A1AA8181EB60CF35E8843AAA7A1FBC8794F505031EE4DC77A8DF7CD441C750
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2119413719.00007FF6A4F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A4F50000, based on PE: true
        • Associated: 00000000.00000002.2119399418.00007FF6A4F50000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119434919.00007FF6A4F6F000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119450177.00007FF6A4F7A000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2119464758.00007FF6A4F8B000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff6a4f50000_mark_v7.jbxd
        Similarity
        • API ID: ExceptionFileHeaderRaise
        • String ID: csm
        • API String ID: 2573137834-1018135373
        • Opcode ID: c364e52ee2a58e29b16a24da1e50c5ad60b21da6634c0706be35ab7451ec72c7
        • Instruction ID: 03d79fe8b2260781f789740c12cd1e5c96283581fdd05fd19edb4db39861bf94
        • Opcode Fuzzy Hash: c364e52ee2a58e29b16a24da1e50c5ad60b21da6634c0706be35ab7451ec72c7
        • Instruction Fuzzy Hash: 1811303261AB8182EB218F25F840259B7E4FB88B84F589230DF8D47768DF3CD551CB40