Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EpCAySF1G6.exe

Overview

General Information

Sample name:EpCAySF1G6.exe
renamed because original name is a hash value
Original sample name:6c2f397589156433b18b4c931a684a25.exe
Analysis ID:1581088
MD5:6c2f397589156433b18b4c931a684a25
SHA1:85364fdc36e163b705becb13a551a5625e930d50
SHA256:5f4c69564c3b8b8e151218444de219dc267207fa868b14622302f10c4726e5c0
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after accessing registry keys)
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • EpCAySF1G6.exe (PID: 5480 cmdline: "C:\Users\user\Desktop\EpCAySF1G6.exe" MD5: 6C2F397589156433B18B4C931A684A25)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-26T23:02:01.384196+010020528751A Network Trojan was detected192.168.2.4497308.218.163.626666TCP
2024-12-26T23:03:37.283111+010020528751A Network Trojan was detected192.168.2.4498158.218.163.626666TCP
2024-12-26T23:04:52.638380+010020528751A Network Trojan was detected192.168.2.4498158.218.163.626666TCP
2024-12-26T23:06:04.482553+010020528751A Network Trojan was detected192.168.2.4500088.218.163.626666TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EpCAySF1G6.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: EpCAySF1G6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: z:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: x:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: v:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: t:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: r:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: p:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: n:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: l:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: j:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: h:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: f:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: b:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: y:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: w:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: u:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: s:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: q:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: o:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: m:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: k:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: i:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: g:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: e:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile opened: [:Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C49960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,0_2_02C49960

Networking

barindex
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49730 -> 8.218.163.62:6666
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49815 -> 8.218.163.62:6666
Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:50008 -> 8.218.163.62:6666
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 8.218.163.62:6666
Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: unknownTCP traffic detected without corresponding DNS query: 8.218.163.62
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C43660 select,recv,_errno,_errno,_errno,0_2_02C43660

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: [esc]0_2_02C52000
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C52000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_02C52000
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C52000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,0_2_02C52000
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4EBE0 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,0_2_02C4EBE0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C51BF0 SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,0_2_02C51BF0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\DINPUT8.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4E0C7 ExitWindowsEx,0_2_02C4E0C7
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4E0E8 ExitWindowsEx,0_2_02C4E0E8
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4E097 ExitProcess,ExitWindowsEx,0_2_02C4E097
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4EBE00_2_02C4EBE0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C433600_2_02C43360
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5FF940_2_02C5FF94
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C467900_2_02C46790
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C474F00_2_02C474F0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C484400_2_02C48440
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C515C00_2_02C515C0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5AA5C0_2_02C5AA5C
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C60A000_2_02C60A00
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C51BF00_2_02C51BF0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C43BA00_2_02C43BA0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5D3280_2_02C5D328
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5B0BC0_2_02C5B0BC
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4B0500_2_02C4B050
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C428500_2_02C42850
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5C8700_2_02C5C870
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C6C8040_2_02C6C804
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4C1A00_2_02C4C1A0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C459300_2_02C45930
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48EC00_2_02C48EC0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5BEDC0_2_02C5BEDC
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5AE800_2_02C5AE80
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C496500_2_02C49650
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C636500_2_02C63650
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4F7900_2_02C4F790
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C55F900_2_02C55F90
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C60F300_2_02C60F30
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C6B4EC0_2_02C6B4EC
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5F4E80_2_02C5F4E8
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C69CA00_2_02C69CA0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C494600_2_02C49460
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C604140_2_02C60414
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C6CD400_2_02C6CD40
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C6BD500_2_02C6BD50
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C62D000_2_02C62D00
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4F5200_2_02C4F520
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF73D00_2_00007FF7F8DF73D0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF33900_2_00007FF7F8DF3390
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF6F700_2_00007FF7F8DF6F70
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF68600_2_00007FF7F8DF6860
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFE1C00_2_00007FF7F8DFE1C0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8E061300_2_00007FF7F8E06130
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFA30C0_2_00007FF7F8DFA30C
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFC28C0_2_00007FF7F8DFC28C
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8E024BC0_2_00007FF7F8E024BC
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF6C800_2_00007FF7F8DF6C80
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8E06C500_2_00007FF7F8E06C50
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFAD440_2_00007FF7F8DFAD44
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8E058CC0_2_00007FF7F8E058CC
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8E048980_2_00007FF7F8E04898
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF28800_2_00007FF7F8DF2880
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF62610_2_02AF6261
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B05A610_2_02B05A61
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B0FA650_2_02B0FA65
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF23210_2_02AF2321
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B010910_2_02B01091
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B0B9AD0_2_02B0B9AD
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF89910_2_02AF8991
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF91210_2_02AF9121
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AFE6B10_2_02AFE6B1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B0FEE50_2_02B0FEE5
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B016C10_2_02B016C1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF2E310_2_02AF2E31
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF36710_2_02AF3671
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AFEFF10_2_02AFEFF1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B127D10_2_02B127D1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF6FC10_2_02AF6FC1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B104D10_2_02B104D1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF54010_2_02AF5401
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AFBC710_2_02AFBC71
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B0A52D0_2_02B0A52D
Source: classification engineClassification label: mal84.spyw.evad.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C492E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,0_2_02C492E0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4A900 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,0_2_02C4A900
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48E00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_02C48E00
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48C80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,0_2_02C48C80
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48180 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,0_2_02C48180
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C47400 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_02C47400
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C47A90 CoInitialize,CoInitializeEx,CoCreateInstance,SysFreeString,CoUninitialize,0_2_02C47A90
Source: C:\Users\user\Desktop\EpCAySF1G6.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.22
Source: EpCAySF1G6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EpCAySF1G6.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EpCAySF1G6.exeReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: dinput8.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: devenum.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: msdmo.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{62BE5D10-60EB-11d0-BD3B-00A0C911CE86}\InprocServer32Jump to behavior
Source: EpCAySF1G6.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: EpCAySF1G6.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48A70 LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_02C48A70
Source: EpCAySF1G6.exeStatic PE information: real checksum: 0x2bb4f should be: 0x20c8f
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C400B7 push rdi; ret 0_2_02C400BD
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C6F949 push rbp; retf 0_2_02C6F974
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B0F787 push cs; retf 0_2_02B0F788
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF8428 push ecx; ret 0_2_02AF8429
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02AF847D push eax; ret 0_2_02AF847E
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02B10449 pushfd ; ret 0_2_02B1044A
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4E03A OpenEventLogW,ClearEventLogW,CloseEventLog,0_2_02C4E03A
Source: C:\Users\user\Desktop\EpCAySF1G6.exeKey value created or modified: HKEY_CURRENT_USER\Console\1 d33f351a4aeea5e608853d1a56661059Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\EpCAySF1G6.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-37354
Source: C:\Users\user\Desktop\EpCAySF1G6.exeStalling execution: Execution stalls by calling Sleepgraph_0-37367
Source: C:\Users\user\Desktop\EpCAySF1G6.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeWindow / User API: threadDelayed 401Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeWindow / User API: threadDelayed 1035Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeWindow / User API: threadDelayed 3506Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeWindow / User API: threadDelayed 4401Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-37112
Source: C:\Users\user\Desktop\EpCAySF1G6.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_0-36590
Source: C:\Users\user\Desktop\EpCAySF1G6.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-36586
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 6960Thread sleep count: 401 > 30Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7072Thread sleep count: 1035 > 30Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7072Thread sleep time: -1035000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7144Thread sleep count: 3506 > 30Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7144Thread sleep time: -35060s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7072Thread sleep count: 4401 > 30Jump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exe TID: 7072Thread sleep time: -4401000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C49960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,0_2_02C49960
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C489F0 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,0_2_02C489F0
Source: EpCAySF1G6.exe, 00000000.00000002.4144818078.0000000000ACB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllIIH
Source: C:\Users\user\Desktop\EpCAySF1G6.exeAPI call chain: ExitProcess graph end nodegraph_0-37203
Source: C:\Users\user\Desktop\EpCAySF1G6.exeAPI call chain: ExitProcess graph end nodegraph_0-36738
Source: C:\Users\user\Desktop\EpCAySF1G6.exeAPI call chain: ExitProcess graph end nodegraph_0-36735
Source: C:\Users\user\Desktop\EpCAySF1G6.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5C1C4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02C5C1C4
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48A70 LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,0_2_02C48A70
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C47BF0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,0_2_02C47BF0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C515C0 Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,0_2_02C515C0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5C1C4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02C5C1C4
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C54CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02C54CD0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF8580 SetUnhandledExceptionFilter,GetConsoleWindow,ShowWindow,GetCurrentThreadId,PostThreadMessageA,GetInputState,CreateThread,WaitForSingleObject,CloseHandle,Sleep,0_2_00007FF7F8DF8580
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DF8AD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7F8DF8AD0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFA5F4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F8DFA5F4
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_00007FF7F8DFCF6C SetUnhandledExceptionFilter,0_2_00007FF7F8DFCF6C

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_02C48EC0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C48EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,0_2_02C48EC0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C4A410 VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,VirtualFreeEx,0_2_02C4A410
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe0_2_02C48EC0
Source: EpCAySF1G6.exe, 00000000.00000002.4145383540.0000000002DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
Source: EpCAySF1G6.exe, 00000000.00000003.1827736904.0000000004021000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .2.4 0 min571345Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free3 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,GetTickCount,_localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,0_2_02C46790
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,GetLocaleInfoW,GetLocaleInfoW,GetACP,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,0_2_02C66254
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: _getptd,GetLocaleInfoA,0_2_02C65BD8
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,free,0_2_02C673F4
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoW,0_2_02C66020
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: EnumSystemLocalesA,0_2_02C661E8
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: EnumSystemLocalesA,0_2_02C66150
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: GetLocaleInfoW,0_2_02C65CC0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: GetLastError,free,free,GetLocaleInfoW,GetLocaleInfoW,free,GetLocaleInfoW,0_2_02C5E590
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,0_2_02C65D50
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C515C0 Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,0_2_02C515C0
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5FF94 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_02C5FF94
Source: C:\Users\user\Desktop\EpCAySF1G6.exeCode function: 0_2_02C5BA94 HeapCreate,GetVersion,HeapSetInformation,0_2_02C5BA94
Source: EpCAySF1G6.exeBinary or memory string: acs.exe
Source: EpCAySF1G6.exeBinary or memory string: vsserv.exe
Source: EpCAySF1G6.exeBinary or memory string: avcenter.exe
Source: EpCAySF1G6.exeBinary or memory string: kxetray.exe
Source: EpCAySF1G6.exeBinary or memory string: KSafeTray.exe
Source: EpCAySF1G6.exeBinary or memory string: avp.exe
Source: EpCAySF1G6.exeBinary or memory string: cfp.exe
Source: EpCAySF1G6.exeBinary or memory string: 360Safe.exe
Source: EpCAySF1G6.exeBinary or memory string: rtvscan.exe
Source: EpCAySF1G6.exeBinary or memory string: 360tray.exe
Source: EpCAySF1G6.exeBinary or memory string: TMBMSRV.exe
Source: EpCAySF1G6.exeBinary or memory string: ashDisp.exe
Source: EpCAySF1G6.exeBinary or memory string: 360Tray.exe
Source: EpCAySF1G6.exeBinary or memory string: avgwdsvc.exe
Source: EpCAySF1G6.exeBinary or memory string: AYAgent.aye
Source: EpCAySF1G6.exeBinary or memory string: RavMonD.exe
Source: EpCAySF1G6.exeBinary or memory string: QUHLPSVC.EXE
Source: EpCAySF1G6.exeBinary or memory string: Mcshield.exe
Source: EpCAySF1G6.exeBinary or memory string: K7TSecurity.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
11
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Modify Registry
121
Input Capture
2
System Time Discovery
Remote Services1
Screen Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts211
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory131
Security Software Discovery
Remote Desktop Protocol121
Input Capture
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Access Token Manipulation
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares1
Archive Collected Data
1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
Process Injection
NTDS3
Process Discovery
Distributed Component Object Model2
Clipboard Data
Protocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Indicator Removal
Cached Domain Credentials11
Peripheral Device Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem16
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EpCAySF1G6.exe68%ReversingLabsWin64.Backdoor.Farfli
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
8.218.163.62
unknownSingapore
45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1581088
Start date and time:2024-12-26 23:01:05 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 31s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:EpCAySF1G6.exe
renamed because original name is a hash value
Original Sample Name:6c2f397589156433b18b4c931a684a25.exe
Detection:MAL
Classification:mal84.spyw.evad.winEXE@1/0@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 65
  • Number of non-executed functions: 293
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • VT rate limit hit for: EpCAySF1G6.exe
TimeTypeDescription
17:02:38API Interceptor5749586x Sleep call for process: EpCAySF1G6.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCxd.ppc.elfGet hashmaliciousMiraiBrowse
  • 47.245.158.74
loligang.mpsl.elfGet hashmaliciousMiraiBrowse
  • 47.57.184.195
T1#U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousNitolBrowse
  • 8.212.102.187
splarm7.elfGet hashmaliciousUnknownBrowse
  • 47.253.191.95
nabsh4.elfGet hashmaliciousUnknownBrowse
  • 47.240.78.242
splppc.elfGet hashmaliciousUnknownBrowse
  • 47.52.40.232
arm.elfGet hashmaliciousUnknownBrowse
  • 8.208.49.9
splx86.elfGet hashmaliciousUnknownBrowse
  • 47.241.90.97
armv4l.elfGet hashmaliciousUnknownBrowse
  • 8.222.176.99
loligang.mpsl.elfGet hashmaliciousMiraiBrowse
  • 8.213.107.220
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.106036027086711
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:EpCAySF1G6.exe
File size:133'632 bytes
MD5:6c2f397589156433b18b4c931a684a25
SHA1:85364fdc36e163b705becb13a551a5625e930d50
SHA256:5f4c69564c3b8b8e151218444de219dc267207fa868b14622302f10c4726e5c0
SHA512:206fee1c1b0fdd4aa263a70d21fe0f81df6025085e03234881032ad77317c2ad90ada34bc47d3c6ac917541b7edd5ce618a93c3c3a4ce0dfdc92ba864d9be4ce
SSDEEP:3072:lO55k/y5dAj+BMTYlgEQnB+Y+pek7+3OrFZeUqe6oW:lO5n5d56TYZQnB+Dpekyyqm
TLSH:96D37D4733A450F9D4A78279C9A24A06E7B374660735A7CF17A086BA2F137D1BD3A331
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........VF.g.F.g.F.g.)...+.g.)...M.g.)...k.g.O...M.g.F.f...g.)...K.g.)...G.g.RichF.g.........................PE..d.....ld.........."
Icon Hash:90cececece8e8eb0
Entrypoint:0x140009a74
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x646C86AC [Tue May 23 09:26:04 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:fb51ede541a9ad63bf23d302e319d2a0
Instruction
dec eax
sub esp, 28h
call 00007F3970BCB628h
dec eax
add esp, 28h
jmp 00007F3970BC780Bh
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], edi
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 60h
dec eax
mov edi, edx
dec eax
mov ebx, ecx
dec eax
lea ecx, dword ptr [ebp-40h]
dec eax
lea edx, dword ptr [0000EAE5h]
inc ecx
mov eax, 00000040h
call 00007F3970BC69DFh
dec eax
lea edx, dword ptr [ebp+10h]
dec eax
mov ecx, edi
dec eax
mov dword ptr [ebp-18h], ebx
dec eax
mov dword ptr [ebp-10h], edi
call 00007F3970BCF695h
dec esp
mov ebx, eax
dec eax
mov dword ptr [ebp+10h], eax
dec eax
mov dword ptr [ebp-08h], eax
dec eax
test edi, edi
je 00007F3970BC79ADh
test byte ptr [edi], 00000008h
mov ecx, 01994000h
je 00007F3970BC7997h
mov dword ptr [ebp-20h], ecx
jmp 00007F3970BC799Eh
mov eax, dword ptr [ebp-20h]
dec ebp
test ebx, ebx
cmove eax, ecx
mov dword ptr [ebp-20h], eax
inc esp
mov eax, dword ptr [ebp-28h]
mov edx, dword ptr [ebp-3Ch]
mov ecx, dword ptr [ebp-40h]
dec esp
lea ecx, dword ptr [ebp-20h]
call dword ptr [0000E7AFh]
dec esp
lea ebx, dword ptr [esp+60h]
dec ecx
mov ebx, dword ptr [ebx+18h]
dec ecx
mov edi, dword ptr [ebx+20h]
dec ecx
mov esp, ebx
pop ebp
ret
int3
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 00000088h
dec eax
lea ecx, dword ptr [00016781h]
call dword ptr [0000E7B3h]
dec eax
mov eax, dword ptr [0001686Ch]
Programming Language:
  • [ C ] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1d0280x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000x1b4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x250000x1578.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x280000x2f8.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x180000x438.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x166060x168009cde0d8ddbf108908aa730f375bc1766False0.5621636284722222zlib compressed data6.429037086317127IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x180000x5d3a0x5e00b44503f0aa67867070e1b6433af825a5False0.3683926196808511data4.8111582224132965IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1e0000x67700x22004dddad5b9c888efde6aff4d8b6f42a73False0.22047334558823528data2.6960600551063005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x250000x15780x16006b2fcd8de66b48f900df2c9c6b6db832False0.4728338068181818data5.019696142888745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x270000x1b40x2005f882a758b6b0045acd02c3e0551be90False0.486328125data5.112623549532036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x280000x5be0x6003b9d434e2274fd734402fea8d43c6f67False0.3587239583333333data3.4572271853315204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x270580x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
DLLImport
KERNEL32.dllHeapCreate, EnterCriticalSection, DeleteCriticalSection, WaitForSingleObject, SetEvent, Sleep, CreateEventA, GetLastError, CloseHandle, GetCurrentThreadId, SwitchToThread, SetLastError, WideCharToMultiByte, lstrlenW, ResetEvent, CreateEventW, CancelIo, TryEnterCriticalSection, SetWaitableTimer, CreateWaitableTimerW, GetThreadContext, SetThreadContext, LeaveCriticalSection, GetExitCodeProcess, CreateProcessA, GetSystemDirectoryA, VirtualAllocEx, WriteProcessMemory, ResumeThread, FreeLibrary, SetUnhandledExceptionFilter, GetCurrentProcess, LoadLibraryW, GetConsoleWindow, CreateFileW, GetProcAddress, GetLocalTime, IsDebuggerPresent, GetCurrentProcessId, CreateThread, LCMapStringW, WriteConsoleW, SetStdHandle, GetStringTypeW, MultiByteToWideChar, HeapDestroy, InitializeCriticalSectionAndSpinCount, HeapFree, HeapAlloc, VirtualAlloc, OpenProcess, VirtualFree, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetConsoleMode, FlushFileBuffers, GetConsoleCP, SetFilePointer, GetSystemTimeAsFileTime, GetTickCount, QueryPerformanceCounter, GetStartupInfoW, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, RtlUnwindEx, FlsAlloc, FlsFree, FlsSetValue, FlsGetValue, HeapReAlloc, HeapSize, GetProcessHeap, ExitThread, DecodePointer, EncodePointer, GetCommandLineW, RaiseException, RtlPcToFileHeader, TerminateProcess, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, HeapSetInformation, GetVersion, GetModuleHandleW, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW
USER32.dllDispatchMessageW, PostThreadMessageA, PeekMessageW, TranslateMessage, MsgWaitForMultipleObjects, ShowWindow, GetInputState, wsprintfW
ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteValueW, RegQueryValueExW, RegCreateKeyW, RegSetValueExW
WS2_32.dllWSAWaitForMultipleEvents, WSAIoctl, connect, WSAStartup, select, WSAResetEvent, setsockopt, recv, socket, closesocket, gethostbyname, send, WSASetLastError, WSACreateEvent, shutdown, WSAEventSelect, WSAEnumNetworkEvents, WSAGetLastError, WSACloseEvent, htons, WSACleanup
WINMM.dlltimeGetTime
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
2024-12-26T23:02:01.384196+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.4497308.218.163.626666TCP
2024-12-26T23:03:37.283111+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.4498158.218.163.626666TCP
2024-12-26T23:04:52.638380+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.4498158.218.163.626666TCP
2024-12-26T23:06:04.482553+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.4500088.218.163.626666TCP
TimestampSource PortDest PortSource IPDest IP
Dec 26, 2024 23:02:01.256304979 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:01.377587080 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:01.377697945 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:01.384196043 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:01.503684044 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:03.280477047 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:03.280872107 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:03.340334892 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:03.340521097 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:03.400624990 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:03.400657892 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:03.400670052 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107058048 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107080936 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107094049 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107141972 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107160091 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107172012 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.107177019 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.107244968 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.107244968 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.332432985 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.332503080 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.332578897 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.336545944 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.336669922 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.336726904 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.344973087 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.345052958 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.345107079 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.353471994 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.353594065 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.353642941 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.361763000 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.361816883 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.361874104 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.557562113 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.557636976 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.557723999 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.560034990 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.560139894 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.560200930 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.568468094 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.568578005 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.568628073 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.576961994 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.577064037 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.577121019 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.585244894 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.585402012 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.585452080 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.593732119 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.593843937 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.593907118 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.602081060 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.602178097 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.602248907 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.782749891 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.782861948 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.782912016 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.786832094 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.788350105 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.788400888 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.788464069 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.796644926 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.796704054 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.796785116 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.804903984 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.804965019 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.804995060 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.813159943 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.813235998 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.813307047 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.821403980 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.821472883 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.821517944 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.829638004 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.829687119 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.829725027 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.837986946 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.838035107 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.838063955 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.846153975 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.846209049 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:04.846296072 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:04.887926102 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.009057045 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.009188890 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.009244919 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.012703896 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.013933897 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.013988972 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.014077902 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.021153927 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.021207094 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.021306992 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.027688026 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.027700901 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.027751923 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.035376072 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.035437107 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.035499096 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.042660952 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.042682886 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.042731047 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.049685001 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.049746037 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.049843073 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.056946993 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.057008028 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.057105064 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.063951015 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.063962936 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.064009905 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.071132898 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.071188927 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.071330070 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.078213930 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.078273058 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.078351974 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.084475994 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.084523916 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.084544897 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.091615915 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.091675997 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.233664989 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.233711958 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.233788967 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.236356020 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.236448050 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.236502886 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.241851091 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.241928101 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.241982937 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.247261047 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.247405052 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.247457027 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.252757072 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.252953053 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.253010988 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.258227110 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.258342028 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.258392096 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.263689995 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.263791084 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.263838053 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.269166946 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.269273996 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.269326925 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.274651051 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.274753094 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.274811983 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.280177116 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.280267000 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.280318975 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.285588026 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.285682917 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.285727978 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.291102886 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.291166067 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.291218996 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.296519041 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.296627045 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.296680927 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.302017927 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.302135944 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.302182913 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.307473898 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.307707071 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.307760000 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.313034058 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.313103914 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.313159943 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.318455935 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.318572998 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.318634987 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.323879957 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.323925018 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.323982954 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.459136963 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.459206104 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.459345102 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.461163044 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.461334944 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.461389065 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.465424061 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.465605021 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.465682983 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.469305992 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.469407082 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.469448090 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.473448992 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.473490953 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.473551035 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.477590084 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.477607965 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.477678061 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.481549025 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.481631041 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.481677055 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.485625029 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.485837936 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.485898972 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.489732981 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.489800930 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.489845037 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.493803978 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.494021893 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.494076014 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.497895002 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.498006105 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.498064995 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.501954079 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.502032042 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.502075911 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.506023884 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.506133080 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.506201029 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.510188103 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.510272026 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.510323048 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.514234066 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.514368057 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.514420033 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.518274069 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.518388033 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.518443108 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.522372961 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.522509098 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.522578955 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.526504993 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.526954889 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.527012110 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.530649900 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.530754089 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.530802011 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.534640074 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.534763098 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.534820080 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.538686991 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.538753986 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.538794994 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.543138027 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.543283939 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.543361902 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.546868086 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.546956062 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.547000885 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.550972939 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.551032066 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.551088095 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.555109024 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.555125952 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.555174112 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.684407949 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.684447050 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.684510946 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.685864925 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.686436892 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.686491013 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.686513901 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.689435959 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.689485073 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.689529896 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.692434072 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.692490101 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.692558050 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.695782900 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.695837975 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.695955992 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.698484898 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.698539019 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.698596954 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.701508045 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.701561928 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.701575041 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.704504013 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.704560041 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.704617023 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.707592010 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.707648993 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.707698107 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.710630894 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.710647106 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.710681915 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.713700056 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.713752031 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.713757038 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.716598988 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.716653109 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.716720104 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.719727993 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.719774008 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.719780922 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.722616911 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.722671032 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.722737074 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.725615025 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.725670099 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.725699902 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.728689909 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.728741884 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.728794098 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.731714964 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.731765032 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.731771946 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.734685898 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.734739065 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.734786987 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.737787962 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.737812042 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.737843037 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.740734100 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.740787029 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.740818024 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.743777990 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.743825912 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.743846893 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.746788979 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.746881962 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.746963024 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.749799967 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.749866009 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.749887943 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.752835989 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.752892017 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.753034115 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.755934000 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.755950928 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.755991936 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.758812904 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.758867979 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.758924961 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.761878014 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.761934996 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.761940002 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.764861107 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.764914989 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.764961004 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.767904997 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.767960072 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.768013000 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.770908117 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.770972967 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.771044970 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.773916960 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.773976088 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.774106979 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.777014017 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.777049065 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.777071953 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.779927969 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.780006886 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.780083895 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.783071995 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.783088923 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.783137083 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.785928965 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.786003113 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.885472059 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.909765959 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.909828901 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.909882069 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.910861969 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.910922050 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.911001921 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.913098097 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.913136005 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.913142920 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.915286064 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.915347099 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.915386915 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.917556047 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.917608976 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.917615891 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.919693947 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.919748068 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:05.919796944 CET6666497308.218.163.62192.168.2.4
Dec 26, 2024 23:02:05.966006994 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:06.951699972 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:07.071403027 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:07.071489096 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:08.934964895 CET497306666192.168.2.48.218.163.62
Dec 26, 2024 23:02:12.644196987 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:12.764113903 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:12.764134884 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:12.764159918 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:12.764173031 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:13.411444902 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:13.411861897 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:13.531800032 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:24.062874079 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:24.182431936 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:24.600944042 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:24.653522015 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:24.654151917 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:24.773705006 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:40.841260910 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:40.960844994 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:41.379595995 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:41.434806108 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:41.453566074 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:41.573360920 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:57.247380972 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:57.560836077 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:57.568733931 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:58.049026966 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:58.049619913 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:02:58.091160059 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:58.107176065 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:02:58.232178926 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:03:13.044573069 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:13.164547920 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:03:13.582942009 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:03:13.638226032 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:13.654225111 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:13.773884058 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:03:29.513078928 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:29.513134003 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:29.632813931 CET6666497318.218.163.62192.168.2.4
Dec 26, 2024 23:03:29.632900953 CET497316666192.168.2.48.218.163.62
Dec 26, 2024 23:03:31.450979948 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:31.570524931 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:31.570616961 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:36.516350985 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:36.638032913 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:36.638103962 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:36.638137102 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:36.640065908 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:37.282747030 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:37.283111095 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:37.402786016 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:47.903841972 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:48.195132971 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:48.616635084 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:03:48.665025949 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:03:48.784672976 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:04.497592926 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:04.617166996 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:05.038918972 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:05.106853962 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:05.118789911 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:05.238284111 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:20.279217005 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:20.446357965 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:20.820790052 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:20.872514009 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:20.874808073 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:20.994328976 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:36.278964996 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:36.398586988 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:37.013936043 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:37.060062885 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:37.082549095 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:37.202210903 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:52.638380051 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:52.638422012 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:52.758126974 CET6666498158.218.163.62192.168.2.4
Dec 26, 2024 23:04:52.758183956 CET498156666192.168.2.48.218.163.62
Dec 26, 2024 23:04:54.576163054 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:04:54.695780039 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:04:54.699410915 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:04:59.699774027 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:04:59.819567919 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:04:59.819639921 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:04:59.819674969 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:04:59.819761038 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:05:00.475269079 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:05:00.475605965 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:05:00.595387936 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:05:11.982187033 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:05:11.982348919 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:05:12.102341890 CET6666499938.218.163.62192.168.2.4
Dec 26, 2024 23:05:12.103322029 CET499936666192.168.2.48.218.163.62
Dec 26, 2024 23:05:13.920098066 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:14.039843082 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:14.043394089 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:19.423604965 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:19.543745995 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:19.543803930 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:19.543858051 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:19.543885946 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:20.199359894 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:20.199834108 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:20.319550037 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:30.919653893 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:31.039453983 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:31.466790915 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:31.515335083 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:31.835895061 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:31.955674887 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:47.497853994 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:47.617701054 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:48.044775963 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:05:48.091424942 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:48.122428894 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:05:48.242419004 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:06:04.482553005 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:06:04.482593060 CET500086666192.168.2.48.218.163.62
Dec 26, 2024 23:06:04.607287884 CET6666500088.218.163.62192.168.2.4
Dec 26, 2024 23:06:04.607356071 CET500086666192.168.2.48.218.163.62

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:17:01:58
Start date:26/12/2024
Path:C:\Users\user\Desktop\EpCAySF1G6.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\EpCAySF1G6.exe"
Imagebase:0x7ff7f8df0000
File size:133'632 bytes
MD5 hash:6C2F397589156433B18B4C931A684A25
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:4.8%
    Dynamic/Decrypted Code Coverage:52.6%
    Signature Coverage:22.5%
    Total number of Nodes:880
    Total number of Limit Nodes:38
    execution_graph 36345 2c432e0 36346 2c432ef setsockopt CancelIo closesocket SetEvent 36345->36346 36347 2c4335a 36345->36347 36346->36347 36348 2c43360 ResetEvent timeGetTime socket 36349 2c433ef lstrlenW WideCharToMultiByte 36348->36349 36350 2c433e8 36348->36350 36351 2c52694 36349->36351 36381 2c54cd0 36350->36381 36352 2c4343a lstrlenW WideCharToMultiByte gethostbyname 36351->36352 36355 2c43481 36352->36355 36354 2c4364b 36355->36350 36356 2c4348e htons connect 36355->36356 36356->36350 36357 2c434d4 setsockopt setsockopt setsockopt setsockopt 36356->36357 36358 2c435d7 36357->36358 36359 2c43588 WSAIoctl 36357->36359 36363 2c5576c 36358->36363 36359->36358 36362 2c5576c 49 API calls 36362->36350 36364 2c55797 36363->36364 36365 2c557ac 36363->36365 36411 2c55614 42 API calls __getgmtimebuf 36364->36411 36392 2c5a860 36365->36392 36367 2c5579c 36412 2c5c3b4 DecodePointer _invalid_parameter_noinfo 36367->36412 36370 2c43601 36370->36362 36372 2c55830 36413 2c55280 36372->36413 36376 2c55838 36376->36370 36419 2c55654 42 API calls 2 library calls 36376->36419 36380 2c55828 GetLastError 36380->36372 36382 2c54cd9 36381->36382 36383 2c54ce4 36382->36383 36384 2c5b7ac RtlCaptureContext RtlLookupFunctionEntry 36382->36384 36383->36354 36385 2c5b831 36384->36385 36386 2c5b7f0 RtlVirtualUnwind 36384->36386 36387 2c5b853 IsDebuggerPresent 36385->36387 36386->36387 36463 2c66784 36387->36463 36389 2c5b8b2 SetUnhandledExceptionFilter UnhandledExceptionFilter 36390 2c5b8d0 _cftoe_l 36389->36390 36391 2c5b8da GetCurrentProcess TerminateProcess 36389->36391 36390->36391 36391->36354 36393 2c5a885 36392->36393 36395 2c557c0 36393->36395 36396 2c5a8a3 Sleep 36393->36396 36420 2c640b8 36393->36420 36395->36372 36397 2c5df90 36395->36397 36396->36393 36396->36395 36430 2c5df0c GetLastError FlsGetValue 36397->36430 36399 2c5df9b 36400 2c557cd 36399->36400 36441 2c5be88 42 API calls 2 library calls 36399->36441 36402 2c5de54 36400->36402 36442 2c62cbc 36402->36442 36404 2c5dead 36405 2c62bbc _isindst LeaveCriticalSection 36404->36405 36406 2c5dec2 36405->36406 36407 2c62cbc _lock 42 API calls 36406->36407 36408 2c5decc __getgmtimebuf 36407->36408 36409 2c62bbc _isindst LeaveCriticalSection 36408->36409 36410 2c557dc CreateThread 36409->36410 36410->36370 36410->36380 36451 2c556ec 36410->36451 36411->36367 36412->36370 36414 2c55285 HeapFree 36413->36414 36415 2c552b5 free 36413->36415 36414->36415 36416 2c552a0 36414->36416 36415->36376 36450 2c55614 42 API calls __getgmtimebuf 36416->36450 36418 2c552a5 GetLastError 36418->36415 36419->36370 36421 2c640cd 36420->36421 36425 2c640ea 36420->36425 36422 2c640db 36421->36422 36421->36425 36428 2c55614 42 API calls __getgmtimebuf 36422->36428 36424 2c64102 HeapAlloc 36424->36425 36426 2c640e0 36424->36426 36425->36424 36425->36426 36429 2c5c188 DecodePointer 36425->36429 36426->36393 36428->36426 36429->36425 36431 2c5df32 36430->36431 36432 2c5df7a SetLastError 36430->36432 36433 2c5a860 __wtomb_environ 38 API calls 36431->36433 36432->36399 36434 2c5df3f __getgmtimebuf 36433->36434 36434->36432 36435 2c5df73 36434->36435 36436 2c5df5d 36434->36436 36437 2c55280 free 38 API calls 36435->36437 36438 2c5de54 __getgmtimebuf 38 API calls 36436->36438 36439 2c5df78 36437->36439 36440 2c5df64 GetCurrentThreadId 36438->36440 36439->36432 36440->36432 36443 2c62cda 36442->36443 36444 2c62ceb 36442->36444 36448 2c62bd4 42 API calls 8 library calls 36443->36448 36446 2c62cdf 36446->36444 36449 2c5be88 42 API calls 2 library calls 36446->36449 36448->36446 36450->36418 36452 2c556fa 36451->36452 36453 2c5573a 36452->36453 36457 2c5570e 36452->36457 36461 2c5dfb4 42 API calls 4 library calls 36453->36461 36455 2c55766 36462 2c556c0 44 API calls 2 library calls 36455->36462 36459 2c55721 GetLastError ExitThread 36457->36459 36460 2c55730 GetCurrentThreadId 36457->36460 36458 2c5576b 36459->36460 36460->36455 36461->36455 36462->36458 36463->36389 36464 2c43660 36465 2c43690 ctype 36464->36465 36466 2c43748 36465->36466 36467 2c436e0 select 36465->36467 36469 2c43708 recv 36465->36469 36473 2c55614 42 API calls _errno 36465->36473 36468 2c54cd0 _cftoe_l 8 API calls 36466->36468 36467->36465 36467->36466 36470 2c43780 36468->36470 36469->36465 36471 2c43789 36469->36471 36474 2c43ba0 52 API calls ctype 36471->36474 36473->36465 36474->36465 36475 2c4d920 36476 2c4d9b9 36475->36476 36477 2c4d95f RegOpenKeyExW 36475->36477 36477->36476 36478 2c4d993 RegQueryValueExW 36477->36478 36478->36476 36479 2c571e0 36480 2c57206 36479->36480 36484 2c57243 36480->36484 36488 2c5720e 36480->36488 36491 2c5708c 36480->36491 36484->36488 36534 2c51b50 36484->36534 36485 2c57288 36486 2c5708c 82 API calls 36485->36486 36485->36488 36486->36488 36487 2c51b50 270 API calls 36489 2c5727b 36487->36489 36490 2c5708c 82 API calls 36489->36490 36490->36485 36492 2c5709e 36491->36492 36493 2c5711b 36491->36493 36538 2c5ba94 HeapCreate 36492->36538 36495 2c5716c 36493->36495 36500 2c5711f 36493->36500 36497 2c571c7 36495->36497 36498 2c57171 36495->36498 36513 2c570a7 36497->36513 36556 2c5e0e8 43 API calls 2 library calls 36497->36556 36504 2c5a860 __wtomb_environ 42 API calls 36498->36504 36499 2c57156 36499->36513 36555 2c5de2c 45 API calls free 36499->36555 36500->36499 36500->36513 36552 2c61f44 43 API calls free 36500->36552 36503 2c570b3 _RTC_Initialize 36506 2c570b7 36503->36506 36512 2c570c3 GetCommandLineA 36503->36512 36514 2c57185 __getgmtimebuf 36504->36514 36544 2c5baec HeapDestroy 36506->36544 36507 2c5714c 36553 2c5de2c 45 API calls free 36507->36553 36511 2c57151 36554 2c5baec HeapDestroy 36511->36554 36545 2c623b0 47 API calls 2 library calls 36512->36545 36513->36484 36514->36513 36517 2c571a7 36514->36517 36518 2c571bd 36514->36518 36520 2c5de54 __getgmtimebuf 42 API calls 36517->36520 36522 2c55280 free 42 API calls 36518->36522 36519 2c570d5 36546 2c61c70 47 API calls 2 library calls 36519->36546 36523 2c571ae GetCurrentThreadId 36520->36523 36522->36513 36523->36513 36524 2c570e1 36525 2c570e5 36524->36525 36548 2c622b8 53 API calls 2 library calls 36524->36548 36547 2c5de2c 45 API calls free 36525->36547 36528 2c570f1 36529 2c57105 36528->36529 36549 2c61fb8 53 API calls 5 library calls 36528->36549 36529->36513 36551 2c61f44 43 API calls free 36529->36551 36532 2c570fa 36532->36529 36550 2c5bc2c 48 API calls 2 library calls 36532->36550 36535 2c51b94 36534->36535 36536 2c51b58 36534->36536 36535->36485 36535->36487 36536->36535 36537 2c51b62 CreateThread WaitForSingleObject 36536->36537 36537->36535 36557 2c515c0 36537->36557 36539 2c570a3 36538->36539 36540 2c5babc GetVersion 36538->36540 36539->36513 36543 2c5e128 47 API calls 2 library calls 36539->36543 36541 2c5bac6 HeapSetInformation 36540->36541 36542 2c5bae0 36540->36542 36541->36542 36542->36539 36543->36503 36544->36513 36545->36519 36546->36524 36547->36506 36548->36528 36549->36532 36550->36529 36551->36525 36552->36507 36553->36511 36554->36499 36555->36513 36556->36513 36600 2c56498 36557->36600 36559 2c5160c Sleep 36560 2c51655 36559->36560 36561 2c51626 36559->36561 36563 2c51663 GetLocalTime wsprintfW SetUnhandledExceptionFilter 36560->36563 36564 2c5165e 36560->36564 36562 2c55378 std::_Facet_Register 49 API calls 36561->36562 36565 2c5162f 36562->36565 36567 2c5576c 49 API calls 36563->36567 36566 2c48c80 16 API calls 36564->36566 36568 2c5576c 49 API calls 36565->36568 36566->36563 36569 2c516de CloseHandle 36567->36569 36570 2c5164c CloseHandle 36568->36570 36571 2c55378 std::_Facet_Register 49 API calls 36569->36571 36570->36560 36572 2c516f1 36571->36572 36573 2c516fe 36572->36573 36574 2c43200 10 API calls 36572->36574 36575 2c55378 std::_Facet_Register 49 API calls 36573->36575 36574->36573 36576 2c51710 36575->36576 36577 2c4c1a0 52 API calls 36576->36577 36583 2c51722 36576->36583 36577->36583 36578 2c55560 42 API calls _amsg_exit 36578->36583 36579 2c51849 EnumWindows 36580 2c51867 36579->36580 36579->36583 36581 2c51870 Sleep EnumWindows 36580->36581 36581->36581 36581->36583 36582 2c518c7 Sleep 36582->36583 36583->36578 36583->36579 36583->36582 36584 2c51915 CreateEventA 36583->36584 36585 2c55560 _amsg_exit 42 API calls 36584->36585 36586 2c51956 RegOpenKeyExW 36585->36586 36591 2c51999 36586->36591 36587 2c4fc40 64 API calls 36587->36591 36588 2c519bc Sleep RegOpenKeyExW 36590 2c519ff RegQueryValueExW 36588->36590 36588->36591 36589 2c46790 216 API calls 36589->36591 36590->36591 36591->36587 36591->36588 36591->36589 36596 2c51a4e 36591->36596 36592 2c5576c 49 API calls 36592->36596 36593 2c51b32 CloseHandle 36593->36583 36594 2c51a99 Sleep 36594->36596 36595 2c51b02 WaitForSingleObject CloseHandle 36595->36596 36596->36592 36596->36593 36596->36594 36596->36595 36597 2c51ade Sleep 36596->36597 36598 2c51ac9 WaitForSingleObject CloseHandle 36596->36598 36599 2c51b23 Sleep 36596->36599 36597->36593 36598->36597 36599->36593 36601 2c56ec0 36600->36601 36602 7ff7f8df80e0 36619 7ff7f8df98b0 36602->36619 36604 7ff7f8df810c SleepEx 36605 7ff7f8df9128 73 API calls 36604->36605 36606 7ff7f8df812a 36605->36606 36607 7ff7f8df8137 36606->36607 36608 7ff7f8df3230 10 API calls 36606->36608 36609 7ff7f8df9128 73 API calls 36607->36609 36608->36607 36610 7ff7f8df8149 36609->36610 36611 7ff7f8df6f70 75 API calls 36610->36611 36614 7ff7f8df815e 36610->36614 36611->36614 36612 7ff7f8df92d0 62 API calls _amsg_exit 36612->36614 36613 7ff7f8df8285 SleepEx 36613->36614 36614->36612 36614->36613 36615 7ff7f8df82d8 CreateEventA 36614->36615 36618 7ff7f8df3390 79 API calls 36614->36618 36617 7ff7f8df3860 75 API calls 36615->36617 36616 7ff7f8df832d SleepEx WaitForSingleObject CloseHandle CloseHandle 36616->36614 36617->36616 36618->36614 36620 7ff7f8dfcf20 36619->36620 36621 7ff7f8df98fc 36622 7ff7f8df9914 36621->36622 36661 7ff7f8df9ec8 HeapCreate 36622->36661 36625 7ff7f8df997f 36666 7ff7f8dfbbcc 36625->36666 36626 7ff7f8df9966 36733 7ff7f8dfa56c 62 API calls 2 library calls 36626->36733 36627 7ff7f8df996b 36734 7ff7f8dfa30c 62 API calls 4 library calls 36627->36734 36632 7ff7f8df9975 36735 7ff7f8df9f5c GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 36632->36735 36633 7ff7f8df99aa _RTC_Initialize 36682 7ff7f8dfd3cc GetStartupInfoW 36633->36682 36635 7ff7f8df9996 36737 7ff7f8dfa30c 62 API calls 4 library calls 36635->36737 36636 7ff7f8df9991 36736 7ff7f8dfa56c 62 API calls 2 library calls 36636->36736 36639 7ff7f8df99a0 36738 7ff7f8df9f5c GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 36639->36738 36643 7ff7f8df99c3 GetCommandLineW 36695 7ff7f8dfd344 GetEnvironmentStringsW 36643->36695 36649 7ff7f8df99ef 36708 7ff7f8dfcf84 36649->36708 36653 7ff7f8df9a02 36722 7ff7f8dfa040 36653->36722 36656 7ff7f8df9a0c 36657 7ff7f8df9a17 36656->36657 36742 7ff7f8dfa2b8 62 API calls 2 library calls 36656->36742 36730 7ff7f8df8580 6 API calls 36657->36730 36660 7ff7f8df9a37 36662 7ff7f8df9ef0 GetVersion 36661->36662 36663 7ff7f8df9959 36661->36663 36664 7ff7f8df9f14 36662->36664 36665 7ff7f8df9efa HeapSetInformation 36662->36665 36663->36625 36663->36626 36663->36627 36664->36663 36665->36664 36743 7ff7f8df9f8c 36666->36743 36668 7ff7f8dfbbd7 36747 7ff7f8dfd7cc 36668->36747 36671 7ff7f8dfbc40 36765 7ff7f8dfb8d0 65 API calls free 36671->36765 36672 7ff7f8dfbbe0 FlsAlloc 36672->36671 36673 7ff7f8dfbbf8 36672->36673 36751 7ff7f8dfc0a0 36673->36751 36676 7ff7f8df9984 36676->36633 36676->36635 36676->36636 36678 7ff7f8dfbc0f FlsSetValue 36678->36671 36679 7ff7f8dfbc22 36678->36679 36756 7ff7f8dfb8f8 36679->36756 36683 7ff7f8dfc0a0 __onexitinit 62 API calls 36682->36683 36694 7ff7f8dfd402 36683->36694 36684 7ff7f8df99b5 36684->36643 36739 7ff7f8dfa2b8 62 API calls 2 library calls 36684->36739 36685 7ff7f8dfd5d9 GetStdHandle 36690 7ff7f8dfd5b4 36685->36690 36686 7ff7f8dfd609 GetFileType 36686->36690 36687 7ff7f8dfc0a0 __onexitinit 62 API calls 36687->36694 36688 7ff7f8dfd529 36688->36690 36692 7ff7f8dfd554 GetFileType 36688->36692 36693 7ff7f8dfd562 InitializeCriticalSectionAndSpinCount 36688->36693 36689 7ff7f8dfd672 SetHandleCount 36689->36684 36690->36685 36690->36686 36690->36689 36691 7ff7f8dfd633 InitializeCriticalSectionAndSpinCount 36690->36691 36691->36684 36691->36690 36692->36688 36692->36693 36693->36684 36693->36688 36694->36684 36694->36687 36694->36688 36694->36690 36694->36694 36696 7ff7f8df99d5 36695->36696 36697 7ff7f8dfd368 36695->36697 36702 7ff7f8dfd254 GetModuleFileNameW 36696->36702 36786 7ff7f8dfc020 62 API calls malloc 36697->36786 36700 7ff7f8dfd38f _cftof_l 36701 7ff7f8dfd3a8 FreeEnvironmentStringsW 36700->36701 36701->36696 36703 7ff7f8dfd294 __wsetargv 36702->36703 36704 7ff7f8df99e1 36703->36704 36705 7ff7f8dfd2ef 36703->36705 36704->36649 36740 7ff7f8dfa2b8 62 API calls 2 library calls 36704->36740 36787 7ff7f8dfc020 62 API calls malloc 36705->36787 36707 7ff7f8dfd2f4 __wsetargv 36707->36704 36709 7ff7f8dfcfb7 _amsg_exit 36708->36709 36713 7ff7f8df99f4 36708->36713 36710 7ff7f8dfc0a0 __onexitinit 62 API calls 36709->36710 36715 7ff7f8dfcfe4 _amsg_exit 36710->36715 36711 7ff7f8dfd04c 36789 7ff7f8df9030 62 API calls 2 library calls 36711->36789 36713->36653 36741 7ff7f8dfa2b8 62 API calls 2 library calls 36713->36741 36714 7ff7f8dfc0a0 __onexitinit 62 API calls 36714->36715 36715->36711 36715->36713 36715->36714 36716 7ff7f8dfd0a1 36715->36716 36719 7ff7f8dfd08c 36715->36719 36788 7ff7f8df92d0 62 API calls 2 library calls 36715->36788 36791 7ff7f8df9030 62 API calls 2 library calls 36716->36791 36790 7ff7f8dfa740 16 API calls _fltout2 36719->36790 36724 7ff7f8dfa056 _cinit 36722->36724 36792 7ff7f8dfdb08 36724->36792 36725 7ff7f8dfa073 _initterm_e 36727 7ff7f8dfa0b9 _cinit 36725->36727 36795 7ff7f8df9728 36725->36795 36727->36656 36728 7ff7f8dfa096 36728->36727 36798 7ff7f8e074f0 WSAStartup 36728->36798 36831 7ff7f8df73d0 36730->36831 36733->36627 36734->36632 36736->36635 36737->36639 36766 7ff7f8dfb8ac EncodePointer 36743->36766 36745 7ff7f8df9f97 _initp_misc_winsig 36746 7ff7f8dfdae0 EncodePointer 36745->36746 36746->36668 36749 7ff7f8dfd7ef 36747->36749 36748 7ff7f8dfd7f5 InitializeCriticalSectionAndSpinCount 36748->36749 36750 7ff7f8dfbbdc 36748->36750 36749->36748 36749->36750 36750->36671 36750->36672 36752 7ff7f8dfc0c5 36751->36752 36754 7ff7f8dfbc07 36752->36754 36755 7ff7f8dfc0e3 Sleep 36752->36755 36767 7ff7f8dffcb4 36752->36767 36754->36671 36754->36678 36755->36752 36755->36754 36778 7ff7f8dfd9d8 36756->36778 36758 7ff7f8dfb951 36759 7ff7f8dfd8d8 type_info::_Type_info_dtor LeaveCriticalSection 36758->36759 36760 7ff7f8dfb966 36759->36760 36761 7ff7f8dfd9d8 _lock 62 API calls 36760->36761 36762 7ff7f8dfb970 __doserrno 36761->36762 36763 7ff7f8dfd8d8 type_info::_Type_info_dtor LeaveCriticalSection 36762->36763 36764 7ff7f8dfb9a2 GetCurrentThreadId 36763->36764 36764->36676 36765->36676 36768 7ff7f8dffcc9 36767->36768 36773 7ff7f8dffce6 36767->36773 36769 7ff7f8dffcd7 36768->36769 36768->36773 36775 7ff7f8df9384 62 API calls __doserrno 36769->36775 36770 7ff7f8dffcfe HeapAlloc 36770->36773 36774 7ff7f8dffcdc 36770->36774 36773->36770 36773->36774 36776 7ff7f8dfa5b8 DecodePointer 36773->36776 36774->36752 36775->36774 36777 7ff7f8dfa5d3 36776->36777 36777->36773 36779 7ff7f8dfd9f6 36778->36779 36780 7ff7f8dfda07 EnterCriticalSection 36778->36780 36784 7ff7f8dfd8f0 62 API calls 7 library calls 36779->36784 36782 7ff7f8dfd9fb 36782->36780 36785 7ff7f8dfa2b8 62 API calls 2 library calls 36782->36785 36784->36782 36786->36700 36787->36707 36788->36715 36789->36713 36791->36713 36793 7ff7f8dfdb1e EncodePointer 36792->36793 36793->36793 36794 7ff7f8dfdb33 36793->36794 36794->36725 36803 7ff7f8df961c 36795->36803 36797 7ff7f8df9731 36797->36728 36799 7ff7f8df9728 _cinit 72 API calls 36798->36799 36800 7ff7f8e07538 36799->36800 36819 7ff7f8df8ad0 36800->36819 36802 7ff7f8e07544 36802->36728 36818 7ff7f8df9f74 36803->36818 36805 7ff7f8df963d DecodePointer DecodePointer 36806 7ff7f8df9667 36805->36806 36808 7ff7f8df9702 _cinit 36805->36808 36807 7ff7f8dfc1b4 _cinit 63 API calls 36806->36807 36806->36808 36809 7ff7f8df9683 36807->36809 36808->36797 36810 7ff7f8df96e0 EncodePointer EncodePointer 36809->36810 36811 7ff7f8df969f 36809->36811 36813 7ff7f8df96b0 36809->36813 36810->36808 36812 7ff7f8dfc124 _cinit 66 API calls 36811->36812 36814 7ff7f8df96a7 36812->36814 36813->36808 36813->36814 36814->36813 36815 7ff7f8dfc124 _cinit 66 API calls 36814->36815 36816 7ff7f8df96c8 EncodePointer 36814->36816 36817 7ff7f8df96c3 36815->36817 36816->36810 36817->36808 36817->36816 36820 7ff7f8df8ad9 36819->36820 36821 7ff7f8df8ae4 36820->36821 36822 7ff7f8df9b1c RtlCaptureContext RtlLookupFunctionEntry 36820->36822 36821->36802 36823 7ff7f8df9ba1 36822->36823 36824 7ff7f8df9b60 RtlVirtualUnwind 36822->36824 36825 7ff7f8df9bc3 IsDebuggerPresent 36823->36825 36824->36825 36830 7ff7f8dfd7c4 36825->36830 36827 7ff7f8df9c22 SetUnhandledExceptionFilter UnhandledExceptionFilter 36828 7ff7f8df9c40 _cftof_l 36827->36828 36829 7ff7f8df9c4a GetCurrentProcess TerminateProcess 36827->36829 36828->36829 36829->36802 36830->36827 36832 7ff7f8df73e4 _vsprintf_s_l 36831->36832 36891 7ff7f8df8021 CreateThread WaitForSingleObject CloseHandle Sleep 36831->36891 36892 7ff7f8df72a0 36832->36892 36834 7ff7f8df7440 36835 7ff7f8df72a0 3 API calls 36834->36835 36836 7ff7f8df7456 lstrlenW lstrlenW 36835->36836 36837 7ff7f8df7489 36836->36837 36838 7ff7f8df72a0 3 API calls 36837->36838 36839 7ff7f8df752f 36838->36839 36840 7ff7f8df72a0 3 API calls 36839->36840 36841 7ff7f8df7545 lstrlenW lstrlenW 36840->36841 36845 7ff7f8df7574 36841->36845 36842 7ff7f8df72a0 3 API calls 36843 7ff7f8df760f 36842->36843 36844 7ff7f8df72a0 3 API calls 36843->36844 36846 7ff7f8df7625 lstrlenW lstrlenW 36844->36846 36845->36842 36850 7ff7f8df7654 36846->36850 36847 7ff7f8df72a0 3 API calls 36848 7ff7f8df76f3 36847->36848 36849 7ff7f8df72a0 3 API calls 36848->36849 36851 7ff7f8df7709 36849->36851 36850->36847 36852 7ff7f8df72a0 3 API calls 36851->36852 36853 7ff7f8df771f 36852->36853 36854 7ff7f8df72a0 3 API calls 36853->36854 36855 7ff7f8df7735 36854->36855 36856 7ff7f8df72a0 3 API calls 36855->36856 36857 7ff7f8df774b lstrlenW lstrlenW 36856->36857 36858 7ff7f8df780d lstrlenW lstrlenW 36857->36858 36862 7ff7f8df777a 36857->36862 36859 7ff7f8df78cd lstrlenW lstrlenW 36858->36859 36864 7ff7f8df783c 36858->36864 36860 7ff7f8df798d lstrlenW lstrlenW 36859->36860 36866 7ff7f8df78fc 36859->36866 36861 7ff7f8df7a4d lstrlenW lstrlenW 36860->36861 36869 7ff7f8df79bc 36860->36869 36863 7ff7f8df7b0d lstrlenW lstrlenW 36861->36863 36870 7ff7f8df7a7c 36861->36870 36862->36858 36865 7ff7f8df7bcd lstrlenW lstrlenW 36863->36865 36873 7ff7f8df7b3c 36863->36873 36864->36859 36867 7ff7f8df7c8d lstrlenW lstrlenW 36865->36867 36874 7ff7f8df7bfc 36865->36874 36866->36860 36868 7ff7f8df7d4d RegOpenKeyExW 36867->36868 36875 7ff7f8df7cbc 36867->36875 36871 7ff7f8df7dbb _vsprintf_s_l 36868->36871 36872 7ff7f8df7d8b RegQueryValueExW 36868->36872 36869->36861 36870->36863 36876 7ff7f8df7dd6 RegQueryValueExW 36871->36876 36871->36891 36872->36871 36873->36865 36874->36867 36875->36868 36877 7ff7f8df72a0 3 API calls 36876->36877 36878 7ff7f8df7e18 36877->36878 36879 7ff7f8df72a0 3 API calls 36878->36879 36880 7ff7f8df7e2e lstrlenW lstrlenW 36879->36880 36881 7ff7f8df7e52 36880->36881 36882 7ff7f8df72a0 3 API calls 36881->36882 36883 7ff7f8df7ede 36882->36883 36884 7ff7f8df72a0 3 API calls 36883->36884 36885 7ff7f8df7ef4 lstrlenW lstrlenW 36884->36885 36889 7ff7f8df7f23 36885->36889 36886 7ff7f8df72a0 3 API calls 36887 7ff7f8df7fe3 36886->36887 36888 7ff7f8df72a0 3 API calls 36887->36888 36890 7ff7f8df7ff9 lstrlenW lstrlenW 36888->36890 36889->36886 36890->36891 36891->36660 36893 7ff7f8df72e6 lstrlenW lstrlenW 36892->36893 36894 7ff7f8df72cc lstrlenW 36892->36894 36896 7ff7f8df7314 _cftof_l 36893->36896 36897 7ff7f8dfb7c0 36894->36897 36896->36834 36898 7ff7f8dfb7c9 36897->36898 36898->36893 36898->36898 36899 7ff7f8df945c 36900 7ff7f8df946a 36899->36900 36901 7ff7f8df94aa 36900->36901 36905 7ff7f8df947e 36900->36905 36909 7ff7f8dfba58 36901->36909 36903 7ff7f8df94d6 36941 7ff7f8df9430 36903->36941 36907 7ff7f8df9491 GetLastError ExitThread 36905->36907 36908 7ff7f8df94a0 GetCurrentThreadId 36905->36908 36906 7ff7f8df94db 36908->36903 36910 7ff7f8dfba61 36909->36910 36911 7ff7f8dfbb80 36909->36911 36912 7ff7f8dfba7c 36910->36912 36950 7ff7f8df9030 62 API calls 2 library calls 36910->36950 36911->36903 36914 7ff7f8dfba8a 36912->36914 36951 7ff7f8df9030 62 API calls 2 library calls 36912->36951 36916 7ff7f8dfba98 36914->36916 36952 7ff7f8df9030 62 API calls 2 library calls 36914->36952 36918 7ff7f8dfbaa6 36916->36918 36953 7ff7f8df9030 62 API calls 2 library calls 36916->36953 36919 7ff7f8dfbab4 36918->36919 36954 7ff7f8df9030 62 API calls 2 library calls 36918->36954 36922 7ff7f8dfbac2 36919->36922 36955 7ff7f8df9030 62 API calls 2 library calls 36919->36955 36924 7ff7f8dfbad3 36922->36924 36956 7ff7f8df9030 62 API calls 2 library calls 36922->36956 36926 7ff7f8dfbaeb 36924->36926 36957 7ff7f8df9030 62 API calls 2 library calls 36924->36957 36928 7ff7f8dfd9d8 _lock 62 API calls 36926->36928 36931 7ff7f8dfbaf7 36928->36931 36929 7ff7f8dfbb24 36959 7ff7f8dfd8d8 LeaveCriticalSection 36929->36959 36931->36929 36958 7ff7f8df9030 62 API calls 2 library calls 36931->36958 36960 7ff7f8dfba34 36941->36960 36944 7ff7f8df9447 36988 7ff7f8df940c 36944->36988 36946 7ff7f8df944e __SehTransFilter 36946->36906 36950->36912 36951->36914 36952->36916 36953->36918 36954->36919 36955->36922 36956->36924 36957->36926 36958->36929 36993 7ff7f8dfb9b0 GetLastError FlsGetValue 36960->36993 36962 7ff7f8dfba3f 36963 7ff7f8df9439 36962->36963 37005 7ff7f8dfa2b8 62 API calls 2 library calls 36962->37005 36965 7ff7f8df3690 36963->36965 36974 7ff7f8df6690 36963->36974 36983 7ff7f8df37e0 36963->36983 36966 7ff7f8df36c0 _cftof_l 36965->36966 36967 7ff7f8df3778 36966->36967 36968 7ff7f8df3710 select 36966->36968 36970 7ff7f8df3738 recv 36966->36970 36973 7ff7f8df9384 62 API calls _errno 36966->36973 37007 7ff7f8df3c80 36966->37007 36969 7ff7f8df8ad0 _cftof_l 8 API calls 36967->36969 36968->36966 36968->36967 36971 7ff7f8df37b0 36969->36971 36970->36966 36971->36944 36973->36966 36975 7ff7f8df66a8 _cftof_l 36974->36975 36976 7ff7f8df66cb RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 36975->36976 36977 7ff7f8df67a4 36976->36977 36978 7ff7f8df673d 36976->36978 36977->36944 36980 7ff7f8df6764 OpenProcess 36978->36980 36982 7ff7f8df6797 Sleep 36978->36982 37123 7ff7f8df6c80 89 API calls 2 library calls 36978->37123 36980->36978 36981 7ff7f8df677b GetExitCodeProcess 36980->36981 36981->36978 36982->36980 36984 7ff7f8df3853 36983->36984 36987 7ff7f8df37f8 36983->36987 36984->36944 36985 7ff7f8df3806 SleepEx 36985->36987 36986 7ff7f8df382f timeGetTime 36986->36987 36987->36984 36987->36985 36987->36986 36989 7ff7f8dfb9b0 __doserrno 62 API calls 36988->36989 36990 7ff7f8df9419 36989->36990 36991 7ff7f8df9426 ExitThread 36990->36991 37124 7ff7f8dfbb8c 64 API calls _freefls 36990->37124 36994 7ff7f8dfb9d6 36993->36994 36995 7ff7f8dfba1e SetLastError 36993->36995 36996 7ff7f8dfc0a0 __onexitinit 57 API calls 36994->36996 36995->36962 36997 7ff7f8dfb9e3 36996->36997 36997->36995 36998 7ff7f8dfb9eb FlsSetValue 36997->36998 36999 7ff7f8dfba01 36998->36999 37000 7ff7f8dfba17 36998->37000 37002 7ff7f8dfb8f8 __doserrno 57 API calls 36999->37002 37006 7ff7f8df9030 62 API calls 2 library calls 37000->37006 37004 7ff7f8dfba08 GetCurrentThreadId 37002->37004 37003 7ff7f8dfba1c 37003->36995 37004->36995 37006->37003 37021 7ff7f8df1080 37007->37021 37009 7ff7f8df3eae 37009->36966 37010 7ff7f8df3e95 37012 7ff7f8df11f0 65 API calls 37010->37012 37011 7ff7f8df3ca8 _cftof_l 37011->37009 37011->37010 37013 7ff7f8df3d24 timeGetTime 37011->37013 37015 7ff7f8df1080 65 API calls 37011->37015 37017 7ff7f8df3e31 VirtualAlloc 37011->37017 37037 7ff7f8df6860 37011->37037 37064 7ff7f8e01874 37011->37064 37012->37009 37028 7ff7f8df11f0 37013->37028 37015->37011 37018 7ff7f8df3e52 _cftof_l 37017->37018 37019 7ff7f8df3e6a VirtualFree 37018->37019 37019->37011 37022 7ff7f8df10a9 37021->37022 37023 7ff7f8e01874 63 API calls 37022->37023 37027 7ff7f8df1139 _cftof_l 37022->37027 37024 7ff7f8df10e2 VirtualAlloc 37023->37024 37025 7ff7f8df110a _cftof_l 37024->37025 37026 7ff7f8df112b VirtualFree 37025->37026 37025->37027 37026->37027 37027->37011 37029 7ff7f8df1200 37028->37029 37030 7ff7f8df120a 37029->37030 37031 7ff7f8e01874 63 API calls 37029->37031 37030->37011 37032 7ff7f8df122f 37031->37032 37033 7ff7f8df123c 37032->37033 37034 7ff7f8df1249 VirtualAlloc 37032->37034 37033->37011 37035 7ff7f8df1273 _cftof_l 37034->37035 37036 7ff7f8df1289 VirtualFree 37035->37036 37036->37011 37038 7ff7f8df6882 37037->37038 37061 7ff7f8df6b19 37037->37061 37039 7ff7f8df6894 RegOpenKeyExW 37038->37039 37041 7ff7f8df6b26 _cftof_l 37038->37041 37040 7ff7f8df68d5 RegQueryValueExW 37039->37040 37042 7ff7f8df69ca 37039->37042 37043 7ff7f8df69bf RegCloseKey 37040->37043 37049 7ff7f8df6916 _vsprintf_s_l 37040->37049 37044 7ff7f8df6b3b VirtualAlloc 37041->37044 37045 7ff7f8df6c2e 37042->37045 37046 7ff7f8df69fc 37042->37046 37043->37042 37055 7ff7f8df6b71 _cftof_l 37044->37055 37089 7ff7f8df94dc 37045->37089 37047 7ff7f8df6a08 VirtualFree 37046->37047 37060 7ff7f8df6a1d _vsprintf_s_l _cftof_l 37046->37060 37047->37060 37051 7ff7f8df693a RegQueryValueExW 37049->37051 37052 7ff7f8df696b _cftof_l 37051->37052 37053 7ff7f8df69b7 37051->37053 37054 7ff7f8df6980 VirtualAlloc 37052->37054 37053->37043 37110 7ff7f8df8b00 37054->37110 37055->37045 37057 7ff7f8df6bc0 RegCreateKeyW 37055->37057 37058 7ff7f8df6bdf RegDeleteValueW RegSetValueExW 37057->37058 37059 7ff7f8df6c19 RegCloseKey 37057->37059 37058->37059 37059->37045 37060->37061 37068 7ff7f8df3860 GetCurrentThreadId 37060->37068 37061->37011 37065 7ff7f8e018b0 37064->37065 37067 7ff7f8e0190b 37064->37067 37065->37067 37122 7ff7f8e02db8 63 API calls 4 library calls 37065->37122 37067->37011 37070 7ff7f8df388e 37068->37070 37069 7ff7f8df3958 37073 7ff7f8df39b1 37069->37073 37074 7ff7f8df3a40 37069->37074 37070->37069 37071 7ff7f8e01874 63 API calls 37070->37071 37072 7ff7f8df38f8 VirtualAlloc 37071->37072 37079 7ff7f8df3925 _cftof_l 37072->37079 37075 7ff7f8e01874 63 API calls 37073->37075 37076 7ff7f8df1080 65 API calls 37074->37076 37077 7ff7f8df39c7 VirtualAlloc 37075->37077 37078 7ff7f8df3a7f 37076->37078 37083 7ff7f8df39f4 _cftof_l 37077->37083 37112 7ff7f8df3b10 37078->37112 37079->37069 37080 7ff7f8df394a VirtualFree 37079->37080 37080->37069 37085 7ff7f8df3a19 VirtualFree 37083->37085 37086 7ff7f8df3a27 37083->37086 37084 7ff7f8df11f0 65 API calls 37087 7ff7f8df3ae3 GetCurrentThreadId 37084->37087 37085->37086 37086->37074 37088 7ff7f8df3af8 37087->37088 37088->37061 37090 7ff7f8df951c 37089->37090 37091 7ff7f8df9507 37089->37091 37094 7ff7f8dfc0a0 __onexitinit 62 API calls 37090->37094 37118 7ff7f8df9384 62 API calls __doserrno 37091->37118 37093 7ff7f8df950c 37119 7ff7f8dfa7e4 17 API calls _invalid_parameter_noinfo 37093->37119 37096 7ff7f8df9530 37094->37096 37098 7ff7f8df95a0 37096->37098 37099 7ff7f8dfba34 _getptd 62 API calls 37096->37099 37097 7ff7f8df6c4c SleepEx 37107 7ff7f8df3310 37097->37107 37120 7ff7f8df9030 62 API calls 2 library calls 37098->37120 37101 7ff7f8df953d 37099->37101 37103 7ff7f8dfb8f8 __doserrno 62 API calls 37101->37103 37102 7ff7f8df95a8 37102->37097 37121 7ff7f8df93c4 62 API calls 2 library calls 37102->37121 37104 7ff7f8df954c CreateThread 37103->37104 37104->37097 37106 7ff7f8df9598 GetLastError 37104->37106 37106->37098 37108 7ff7f8df331f setsockopt CancelIo closesocket SetEvent 37107->37108 37109 7ff7f8df338a 37107->37109 37108->37109 37109->37061 37111 7ff7f8df8b0c 37110->37111 37111->37053 37111->37111 37113 7ff7f8df3b48 37112->37113 37117 7ff7f8df3ba1 37112->37117 37114 7ff7f8df3b60 send 37113->37114 37116 7ff7f8df3ac4 37113->37116 37113->37117 37114->37113 37115 7ff7f8df3bb0 send 37115->37116 37115->37117 37116->37084 37117->37115 37117->37116 37118->37093 37119->37097 37120->37102 37121->37097 37122->37067 37123->36978 37124->36991 37125 2af0000 37127 2af0448 37125->37127 37128 2af05b1 37127->37128 37129 2af00dc 37127->37129 37130 2af0116 37129->37130 37132 2af032a 37129->37132 37131 2af0147 VirtualAlloc 37130->37131 37130->37132 37131->37132 37134 2af0168 37131->37134 37132->37128 37133 2af02b7 LoadLibraryA 37133->37132 37133->37134 37134->37132 37134->37133 37135 2c4e737 37136 2c4e740 37135->37136 37137 2c4e749 37135->37137 37141 2c4ea30 37136->37141 37139 2c4ea30 126 API calls 37137->37139 37140 2c4e747 37139->37140 37149 2c55378 37141->37149 37143 2c4ea51 _recalloc 37144 2c4ea64 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 37143->37144 37145 2c4eac5 GetWindowTextW 37144->37145 37146 2c4ead8 37144->37146 37145->37146 37161 2c4ebe0 7 API calls 37146->37161 37148 2c4eb15 ctype 37148->37140 37151 2c55383 37149->37151 37152 2c5539c 37151->37152 37157 2c553a2 std::_Facet_Register 37151->37157 37180 2c552c0 37151->37180 37197 2c5c188 DecodePointer 37151->37197 37152->37143 37154 2c553f3 37199 2c551f4 42 API calls std::exception::operator= 37154->37199 37156 2c55404 37200 2c5733c RaiseException ctype 37156->37200 37157->37154 37198 2c559f0 48 API calls _cinit 37157->37198 37160 2c5541a 37162 2c4ec8c 37161->37162 37163 2c4ec99 GetSystemMetrics 37161->37163 37164 2c4ed22 8 API calls 37162->37164 37165 2c4ecb4 GetSystemMetrics 37163->37165 37166 2c4ed02 GetSystemMetrics 37163->37166 37167 2c4ee5e _recalloc 37164->37167 37165->37164 37166->37164 37168 2c4ee6e GetDIBits 37167->37168 37169 2c4eea1 ctype _recalloc 37168->37169 37170 2c55378 std::_Facet_Register 49 API calls 37169->37170 37171 2c4ef0b 37170->37171 37209 2c4f080 GlobalAlloc GlobalLock 37171->37209 37174 2c4ef40 DeleteObject DeleteObject ReleaseDC 37179 2c4ef67 37174->37179 37175 2c4efaa ctype 37177 2c4efe3 DeleteObject DeleteObject ReleaseDC 37175->37177 37176 2c54cd0 _cftoe_l 8 API calls 37178 2c4f050 37176->37178 37177->37179 37178->37148 37179->37176 37181 2c55354 37180->37181 37194 2c552d8 37180->37194 37207 2c5c188 DecodePointer 37181->37207 37183 2c55310 HeapAlloc 37188 2c55349 37183->37188 37183->37194 37184 2c552f0 37184->37183 37201 2c5c13c 42 API calls 2 library calls 37184->37201 37202 2c5bedc 42 API calls 4 library calls 37184->37202 37203 2c5bb48 GetProcAddress ExitProcess malloc 37184->37203 37185 2c55359 37208 2c55614 42 API calls __getgmtimebuf 37185->37208 37188->37151 37189 2c55339 37205 2c55614 42 API calls __getgmtimebuf 37189->37205 37193 2c5533e 37206 2c55614 42 API calls __getgmtimebuf 37193->37206 37194->37183 37194->37184 37194->37189 37194->37193 37204 2c5c188 DecodePointer 37194->37204 37197->37151 37198->37154 37199->37156 37200->37160 37201->37184 37202->37184 37204->37194 37205->37193 37206->37188 37207->37185 37208->37188 37240 2c54d00 37209->37240 37211 2c4f0ea GlobalUnlock CreateStreamOnHGlobal 37212 2c4f393 GlobalFree 37211->37212 37215 2c4f110 _RunAllParam 37211->37215 37234 2c4f243 37212->37234 37213 2c54cd0 _cftoe_l 8 API calls 37214 2c4ef3c 37213->37214 37214->37174 37214->37175 37242 2c4c570 37215->37242 37217 2c4f16e 37218 2c4f176 GdipCreateBitmapFromStream 37217->37218 37219 2c4f2fb 37217->37219 37220 2c4f1a5 GdipDisposeImage 37218->37220 37221 2c4f1b0 37218->37221 37223 2c4f33e _RunAllParam 37219->37223 37224 2c4f31a DeleteObject 37219->37224 37220->37219 37247 2c4c830 GdipGetImagePixelFormat 37221->37247 37223->37212 37224->37223 37226 2c4f1d1 CreateStreamOnHGlobal 37226->37219 37227 2c4f1f0 37226->37227 37292 2c4cc50 37227->37292 37230 2c4f226 GlobalFree 37328 2c4c630 DeleteObject _RunAllParam 37230->37328 37231 2c4f24a GlobalSize 37235 2c4f25d ctype 37231->37235 37234->37213 37329 2c502a0 49 API calls 2 library calls 37235->37329 37237 2c4f28d 37238 2c4f2e5 GlobalUnlock 37237->37238 37239 2c4f2c1 DeleteObject 37237->37239 37238->37219 37239->37238 37241 2c54d0c 37240->37241 37241->37211 37241->37241 37243 2c4c57d 37242->37243 37244 2c4c584 _RunAllParam 37242->37244 37243->37217 37245 2c4c5a2 GdiplusStartup 37244->37245 37246 2c4c5df _RunAllParam 37244->37246 37245->37246 37246->37217 37248 2c4c879 GdipGetImageHeight 37247->37248 37250 2c4c8e7 GdipGetImageWidth 37248->37250 37251 2c4c8e2 37248->37251 37252 2c4c900 37250->37252 37251->37250 37330 2c4c6d0 37252->37330 37255 2c4c9d5 37258 2c54cd0 _cftoe_l 8 API calls 37255->37258 37256 2c4c930 GdipGetImagePaletteSize 37259 2c4c946 37256->37259 37257 2c4ca69 37260 2c4cba1 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 37257->37260 37261 2c4ca7e GdipBitmapLockBits 37257->37261 37262 2c4cc31 GdipDisposeImage 37258->37262 37263 2c4c960 37259->37263 37344 2c4c0e0 8 API calls 2 library calls 37259->37344 37265 2c4cb76 37260->37265 37264 2c4cab1 37261->37264 37279 2c4cb04 37261->37279 37262->37219 37262->37226 37266 2c4c99e 37263->37266 37267 2c4cafa 37263->37267 37281 2c4c964 _ftelli64 37263->37281 37264->37255 37273 2c55280 free 42 API calls 37264->37273 37265->37255 37274 2c55280 free 42 API calls 37265->37274 37270 2c552c0 malloc 42 API calls 37266->37270 37346 2c41220 DeleteCriticalSection RaiseException std::_Facet_Register 37267->37346 37268 2c4cb5f GdipBitmapUnlockBits 37268->37265 37270->37281 37273->37264 37274->37265 37275 2c4cb95 37350 2c41220 DeleteCriticalSection RaiseException std::_Facet_Register 37275->37350 37276 2c4c9c0 37276->37255 37285 2c55280 free 42 API calls 37276->37285 37277 2c4c9df GdipGetImagePalette 37284 2c4c9f4 37277->37284 37279->37268 37279->37275 37280 2c4cb8a 37279->37280 37287 2c4cb80 37279->37287 37347 2c567a8 42 API calls 4 library calls 37279->37347 37349 2c41220 DeleteCriticalSection RaiseException std::_Facet_Register 37280->37349 37281->37276 37281->37277 37286 2c4cada 37284->37286 37288 2c4ca13 37284->37288 37285->37276 37286->37255 37290 2c55280 free 42 API calls 37286->37290 37348 2c41220 DeleteCriticalSection RaiseException std::_Facet_Register 37287->37348 37345 2c4cf50 CreateCompatibleDC SelectObject SetDIBColorTable SelectObject DeleteDC 37288->37345 37290->37286 37293 2c4c570 GdiplusStartup 37292->37293 37294 2c4cc7e 37293->37294 37295 2c4cc86 GdipGetImageEncodersSize 37294->37295 37296 2c4cd30 37294->37296 37295->37296 37297 2c4cc9c 37295->37297 37298 2c54cd0 _cftoe_l 8 API calls 37296->37298 37299 2c4ccb0 37297->37299 37352 2c4c0e0 8 API calls 2 library calls 37297->37352 37302 2c4cd71 GetHGlobalFromStream GlobalLock 37298->37302 37300 2c4ccf6 37299->37300 37301 2c4cf37 37299->37301 37307 2c4ccb4 _ftelli64 37299->37307 37305 2c552c0 malloc 42 API calls 37300->37305 37353 2c41220 DeleteCriticalSection RaiseException std::_Facet_Register 37301->37353 37302->37230 37302->37231 37305->37307 37308 2c4cd37 GdipGetImageEncoders 37307->37308 37309 2c4cd1a 37307->37309 37310 2c4cd49 37308->37310 37313 2c4cd81 37308->37313 37309->37296 37311 2c55280 free 42 API calls 37309->37311 37310->37296 37312 2c55280 free 42 API calls 37310->37312 37311->37309 37312->37310 37314 2c4ce1c 37313->37314 37315 2c4ce3a 37313->37315 37314->37296 37321 2c55280 free 42 API calls 37314->37321 37316 2c4ceba GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 37315->37316 37317 2c4ce4a GdipCreateBitmapFromScan0 GdipSaveImageToStream 37315->37317 37318 2c4cf15 GdipDisposeImage 37316->37318 37320 2c4cee9 GdipDisposeImage 37316->37320 37317->37318 37319 2c4ce96 GdipDisposeImage 37317->37319 37318->37296 37322 2c4cf20 37318->37322 37319->37296 37323 2c4cea5 37319->37323 37320->37296 37324 2c4cef8 37320->37324 37321->37314 37322->37296 37325 2c55280 free 42 API calls 37322->37325 37323->37296 37326 2c55280 free 42 API calls 37323->37326 37324->37296 37327 2c55280 free 42 API calls 37324->37327 37325->37322 37326->37323 37327->37324 37329->37237 37331 2c552c0 malloc 42 API calls 37330->37331 37332 2c4c708 37331->37332 37334 2c4c73c _recalloc 37332->37334 37336 2c4c720 37332->37336 37333 2c4c735 37333->37255 37333->37256 37333->37257 37337 2c4c782 CreateDIBSection 37334->37337 37335 2c55280 free 42 API calls 37335->37336 37336->37333 37336->37335 37338 2c4c7c4 37337->37338 37339 2c4c7a2 37337->37339 37351 2c4d020 9 API calls _cftoe_l 37338->37351 37339->37333 37341 2c55280 free 42 API calls 37339->37341 37341->37339 37342 2c4c7da 37342->37333 37343 2c55280 free 42 API calls 37342->37343 37343->37342 37344->37263 37345->37257 37347->37279 37351->37342 37352->37299 37354 2c472d0 CreateMutexW CreateMutexExW 37355 2c47307 37354->37355 37363 2c47339 _recalloc 37354->37363 37356 2c47310 Sleep CreateMutexW GetLastError 37355->37356 37356->37356 37356->37363 37357 2c473b1 malloc 37358 2c473b9 GetConsoleWindow 37357->37358 37383 2c51bf0 20 API calls _cftoe_l 37358->37383 37359 2c47360 lstrlenW 37372 2c48310 37359->37372 37362 2c473d8 37364 2c473f6 37362->37364 37365 2c473dc 37362->37365 37363->37357 37363->37359 37366 2c47387 lstrcmpW 37363->37366 37367 2c4739d Sleep 37363->37367 37384 2c52000 37 API calls 3 library calls 37364->37384 37368 2c54cd0 _cftoe_l 8 API calls 37365->37368 37366->37357 37366->37367 37367->37357 37367->37363 37371 2c473ee 37368->37371 37385 2c57bb0 37372->37385 37375 2c48384 37376 2c483f5 RegCloseKey RegCloseKey 37375->37376 37377 2c48391 RegQueryValueExW 37375->37377 37378 2c54cd0 _cftoe_l 8 API calls 37376->37378 37377->37376 37379 2c483c7 lstrcmpW 37377->37379 37380 2c4841f 37378->37380 37381 2c483e2 lstrcpyW 37379->37381 37382 2c4837f 37379->37382 37380->37363 37381->37376 37382->37376 37383->37362 37386 2c48357 RegOpenKeyExW 37385->37386 37386->37375 37386->37382 37387 2c437b0 37388 2c43823 37387->37388 37390 2c437c8 37387->37390 37389 2c437d6 Sleep 37389->37390 37390->37388 37390->37389 37391 2c437ff timeGetTime 37390->37391 37391->37390 37392 2c43830 GetCurrentThreadId 37393 2c4385c 37392->37393 37405 2c41080 37393->37405 37395 2c438a5 37396 2c41080 45 API calls 37395->37396 37397 2c438df 37396->37397 37398 2c41080 45 API calls 37397->37398 37399 2c43926 ctype 37398->37399 37413 2c43a30 37399->37413 37403 2c439f5 GetCurrentThreadId 37404 2c43a05 37403->37404 37406 2c41096 37405->37406 37407 2c4108e 37405->37407 37428 2c6ca20 37406->37428 37407->37395 37410 2c410e5 ctype 37411 2c41104 VirtualFree 37410->37411 37412 2c41112 37410->37412 37411->37412 37412->37395 37414 2c43ac1 37413->37414 37418 2c43a68 37413->37418 37415 2c43ad0 send 37414->37415 37417 2c439d6 37414->37417 37415->37414 37415->37417 37416 2c43a80 send 37416->37418 37419 2c41140 37417->37419 37418->37414 37418->37416 37418->37417 37420 2c41150 37419->37420 37421 2c4115a 37420->37421 37422 2c6ca20 43 API calls 37420->37422 37421->37403 37423 2c4117f 37422->37423 37424 2c4118c 37423->37424 37425 2c41199 VirtualAlloc 37423->37425 37424->37403 37426 2c411c3 ctype 37425->37426 37427 2c411d9 VirtualFree 37426->37427 37427->37403 37429 2c6ca5c 37428->37429 37431 2c410bd VirtualAlloc 37428->37431 37429->37431 37432 2c6cbf0 43 API calls 4 library calls 37429->37432 37431->37410 37432->37431 37433 7ff7f8df3c10 WaitForSingleObject SleepEx WaitForSingleObject WaitForSingleObject Sleep
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen$QueryValue$Open
    • String ID: Console$IpDate$bb:$bd:$bh:$bz:$cl:$dd:$dl:$fz:$jp:$kl:$ll:$o1:$o2:$o3:$p1:$p2:$p3:$sh:$sx:$t1:$t2:$t3:$|p1:8.218.163.62|o1:6666|t1:1|p2:8.218.163.62|o2:6666|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:
    • API String ID: 1772312705-3774728195
    • Opcode ID: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
    • Instruction ID: 5145230fa482634ea0ee9bf68d35d51adaac2a8b7d2bd783cb75ad5ebf2fc50e
    • Opcode Fuzzy Hash: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
    • Instruction Fuzzy Hash: EC72F465F0999A86EB10BB1498446F8E361FF48784FC49035C93F066C9EE7CA549F3E8

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Info$ByteCharMultiSystemWidewsprintf$CountCurrentTickWindow_errnoinet_ntoalstrlen$AddressDirectoryForegroundHandleInputLastLocaleModuleNativeProcProcessProfileText_invalid_parameter_noinfo_localtime64gethostbynamegethostnamemalloc
    • String ID: %d min$1.0$2024.12.22$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$X64$X64 %s$kernel32.dll$x64$x86
    • API String ID: 1661628823-624405038
    • Opcode ID: 122f8fed04f656ffedd24d25d979499a4dac23aeb6196086108b6fd699c96e62
    • Instruction ID: 46bdf25aa93c84d72954466c3ee2b93cda8e8c1d06741c7facbfc7d430c08ec5
    • Opcode Fuzzy Hash: 122f8fed04f656ffedd24d25d979499a4dac23aeb6196086108b6fd699c96e62
    • Instruction Fuzzy Hash: 84F1A132304A86D6EB18DF61E8487DE77B5F784788F908126CA5E53B64DF38C669CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 315 2c515c0-2c51624 call 2c56498 Sleep 318 2c51655-2c5165c 315->318 319 2c51626-2c5164f call 2c55378 call 2c5576c CloseHandle 315->319 321 2c51663-2c516f4 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 2c5576c CloseHandle call 2c55378 318->321 322 2c5165e call 2c48c80 318->322 319->318 331 2c516f6-2c51701 call 2c43200 321->331 332 2c51703 321->332 322->321 334 2c51706-2c51718 call 2c55378 331->334 332->334 338 2c51727 334->338 339 2c5171a-2c5171d call 2c4c1a0 334->339 341 2c5172a-2c5172f 338->341 342 2c51722-2c51725 339->342 343 2c51730-2c51748 call 2c431e0 341->343 342->341 346 2c51777-2c5179b call 2c55560 * 2 343->346 347 2c5174a-2c51775 call 2c55560 * 2 343->347 356 2c517a2-2c517ca 346->356 347->356 357 2c51816-2c51820 356->357 358 2c517cc-2c5180f call 2c431e0 call 2c55560 * 2 356->358 359 2c51822-2c51827 357->359 360 2c5182e-2c51847 357->360 358->357 359->360 362 2c51899-2c518c5 call 2c56498 360->362 363 2c51849-2c51865 EnumWindows 360->363 375 2c518d7-2c51997 call 2c56498 CreateEventA call 2c55560 RegOpenKeyExW 362->375 376 2c518c7-2c518d2 Sleep 362->376 363->362 366 2c51867 363->366 369 2c51870-2c51897 Sleep EnumWindows 366->369 369->362 369->369 382 2c519a9 375->382 383 2c51999-2c519a3 call 2c4fc40 375->383 376->343 385 2c519b0-2c519ba 382->385 386 2c519a8 383->386 387 2c51a36-2c51a44 call 2c46790 385->387 388 2c519bc-2c519fd Sleep RegOpenKeyExW 385->388 386->382 392 2c51a49-2c51a4c 387->392 390 2c519ff-2c51a22 RegQueryValueExW 388->390 391 2c51a28-2c51a2d 388->391 390->391 391->385 393 2c51a2f 391->393 394 2c51a60-2c51a67 392->394 395 2c51a4e-2c51a5b 392->395 393->387 396 2c51a69-2c51a88 call 2c5576c 394->396 397 2c51a8b-2c51a8e 394->397 401 2c51b32-2c51b48 CloseHandle 395->401 396->397 400 2c51a90-2c51a97 397->400 403 2c51aec-2c51b00 400->403 404 2c51a99-2c51aa9 Sleep 400->404 401->343 408 2c51b17-2c51b31 call 2c56498 Sleep 403->408 409 2c51b02-2c51b11 WaitForSingleObject CloseHandle 403->409 404->400 405 2c51aab-2c51ab2 404->405 405->403 407 2c51ab4-2c51ac7 405->407 412 2c51ade-2c51aea Sleep 407->412 413 2c51ac9-2c51ad8 WaitForSingleObject CloseHandle 407->413 408->401 409->408 412->401 413->412
    APIs
    • Sleep.KERNEL32 ref: 02C51614
    • CloseHandle.KERNEL32 ref: 02C5164F
      • Part of subcall function 02C55560: _errno.LIBCMT ref: 02C5557F
      • Part of subcall function 02C55560: _invalid_parameter_noinfo.LIBCMT ref: 02C5558B
      • Part of subcall function 02C55560: _errno.LIBCMT ref: 02C555BB
    • GetLocalTime.KERNEL32 ref: 02C51668
    • wsprintfW.USER32 ref: 02C516AE
    • SetUnhandledExceptionFilter.KERNEL32 ref: 02C516BB
    • CloseHandle.KERNEL32 ref: 02C516E1
    • EnumWindows.USER32 ref: 02C5185A
      • Part of subcall function 02C55378: malloc.LIBCMT ref: 02C55392
      • Part of subcall function 02C5576C: _errno.LIBCMT ref: 02C55797
      • Part of subcall function 02C5576C: _invalid_parameter_noinfo.LIBCMT ref: 02C557A2
    • Sleep.KERNEL32 ref: 02C51875
    • EnumWindows.USER32 ref: 02C5188C
    • Sleep.KERNEL32 ref: 02C518CC
    • CreateEventA.KERNEL32 ref: 02C51921
    • RegOpenKeyExW.ADVAPI32 ref: 02C5198F
    • Sleep.KERNEL32 ref: 02C519C1
    • RegOpenKeyExW.ADVAPI32 ref: 02C519F5
    • RegQueryValueExW.ADVAPI32 ref: 02C51A22
    • Sleep.KERNEL32 ref: 02C51A9E
    • WaitForSingleObject.KERNEL32 ref: 02C51ACF
    • CloseHandle.KERNEL32 ref: 02C51AD8
    • Sleep.KERNEL32 ref: 02C51AE3
      • Part of subcall function 02C5576C: _getptd.LIBCMT ref: 02C557C8
      • Part of subcall function 02C5576C: CreateThread.KERNEL32 ref: 02C5581D
      • Part of subcall function 02C5576C: GetLastError.KERNEL32 ref: 02C55828
      • Part of subcall function 02C5576C: free.LIBCMT ref: 02C55833
    • WaitForSingleObject.KERNEL32 ref: 02C51B08
    • CloseHandle.KERNEL32 ref: 02C51B11
    • Sleep.KERNEL32 ref: 02C51B2B
    • CloseHandle.KERNEL32 ref: 02C51B42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Sleep$CloseHandle$_errno$CreateEnumObjectOpenSingleWaitWindows_invalid_parameter_noinfo$ErrorEventExceptionFilterLastLocalQueryThreadTimeUnhandledValue_getptdfreemallocwsprintf
    • String ID: %4d.%2d.%2d-%2d:%2d:%2d$127.0.0.1$6666$6666$6666$8.218.163.62$8.218.163.62$8.218.163.62$Console$Console\1$IpDatespecial
    • API String ID: 3428909306-2719144650
    • Opcode ID: 34ca53d58691d4d6b77f75a5af062a653cd39c481d55b8bdfed8d27cbe8b0b01
    • Instruction ID: 43212b69ecb7c4588e26361021f6cf24e94e75d8022e6f66cc57b106fea7b443
    • Opcode Fuzzy Hash: 34ca53d58691d4d6b77f75a5af062a653cd39c481d55b8bdfed8d27cbe8b0b01
    • Instruction Fuzzy Hash: 67E16C32614B90C6F710DF25F848BAE73A5F785B85F94812ADE4E47AA4DF78C684CB04

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch$BitmapBitsDesktopModeSelectWindowmalloc
    • String ID: $gfff$gfff
    • API String ID: 1524144516-4202476792
    • Opcode ID: 13dd4c7c1d2cbe625612e10cc7ad245c133778d1992cad39df60de0e299c626f
    • Instruction ID: dfd96107628cc807fee86cd6b4b997fafd9a77033af6f6658a1c67b91927488c
    • Opcode Fuzzy Hash: 13dd4c7c1d2cbe625612e10cc7ad245c133778d1992cad39df60de0e299c626f
    • Instruction Fuzzy Hash: 08C1BE32714B408AE714DF76E41875E73B2FB99B88F054229DE0AABB58EF38D485C744

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 530 7ff7f8df6860-7ff7f8df687c 531 7ff7f8df6882-7ff7f8df688e 530->531 532 7ff7f8df6c6c-7ff7f8df6c76 530->532 533 7ff7f8df6b26-7ff7f8df6b8b call 7ff7f8df8b00 VirtualAlloc call 7ff7f8df8b00 call 7ff7f8df8aac 531->533 534 7ff7f8df6894-7ff7f8df68cf RegOpenKeyExW 531->534 559 7ff7f8df6b91-7ff7f8df6bdd call 7ff7f8df8b00 * 2 RegCreateKeyW 533->559 560 7ff7f8df6c2e 533->560 535 7ff7f8df68d5-7ff7f8df6910 RegQueryValueExW 534->535 536 7ff7f8df69ca-7ff7f8df69d8 534->536 539 7ff7f8df6916-7ff7f8df6969 call 7ff7f8df8aac call 7ff7f8dfb7c0 RegQueryValueExW 535->539 540 7ff7f8df69bf-7ff7f8df69c4 RegCloseKey 535->540 538 7ff7f8df69e0-7ff7f8df69ea 536->538 542 7ff7f8df69f4-7ff7f8df69f6 538->542 543 7ff7f8df69ec-7ff7f8df69f2 538->543 562 7ff7f8df696b-7ff7f8df69b2 call 7ff7f8df8b00 VirtualAlloc call 7ff7f8df8b00 539->562 563 7ff7f8df69b7 539->563 540->536 546 7ff7f8df6c30-7ff7f8df6c62 call 7ff7f8df94dc SleepEx call 7ff7f8df3310 542->546 547 7ff7f8df69fc-7ff7f8df6a06 542->547 543->538 543->542 567 7ff7f8df6c64 546->567 551 7ff7f8df6a1d-7ff7f8df6b03 call 7ff7f8dfb7c0 * 3 call 7ff7f8df8aac call 7ff7f8df8b00 547->551 552 7ff7f8df6a08-7ff7f8df6a16 VirtualFree 547->552 583 7ff7f8df6b05-7ff7f8df6b15 call 7ff7f8df3860 551->583 584 7ff7f8df6b19-7ff7f8df6b21 call 7ff7f8df8ab4 551->584 552->551 577 7ff7f8df6bdf-7ff7f8df6c13 RegDeleteValueW RegSetValueExW 559->577 578 7ff7f8df6c19-7ff7f8df6c29 RegCloseKey call 7ff7f8df95d0 559->578 560->546 562->563 563->540 567->532 577->578 578->560 583->584 584->567
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Value$Virtual$AllocCloseQuery$CreateDeleteFreeOpenSleep
    • String ID: .$310ab5735122252c78549f78b4c30746$Console\1$d33f351a4aeea5e608853d1a56661059$l$n
    • API String ID: 544495302-2415055341
    • Opcode ID: 5694b7b157a9f67dd129e53dc4729af0b4b0346885f9078a4b7e41d62d996c72
    • Instruction ID: 3c6f940f7a47096b24a807f62c3d667a3941332eb03a86511096b99326fd386a
    • Opcode Fuzzy Hash: 5694b7b157a9f67dd129e53dc4729af0b4b0346885f9078a4b7e41d62d996c72
    • Instruction Fuzzy Hash: 8DB1A221B18B8285EB60AF61E8407A9F760FF89754F804035DA7E47AD9DF3CD108E798

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
    • String ID: 0u
    • API String ID: 950253168-3203441087
    • Opcode ID: c675cf8a70220d83b9f5f9eeca867539601b1c5dcc2814c4a89447bde27aa509
    • Instruction ID: 343cee1a1e81dac290e0cf3a17086a9af0ed35bf6b4e086e037090cd7793d8d9
    • Opcode Fuzzy Hash: c675cf8a70220d83b9f5f9eeca867539601b1c5dcc2814c4a89447bde27aa509
    • Instruction Fuzzy Hash: 21713972218B8186E720CF66F44875EB7A5F788B98F504129EB8A57F68DF3CD149CB04

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
    • String ID: 0u
    • API String ID: 950253168-3203441087
    • Opcode ID: 1ebe5ea999ada77dc3c15e7a43abbca18abc7bbb5c037e0ba44f4efe06a9ee2b
    • Instruction ID: a89fe235abc81fcef5eb4cffa8bef933f7f0078a1c855104e349fc2b2d283462
    • Opcode Fuzzy Hash: 1ebe5ea999ada77dc3c15e7a43abbca18abc7bbb5c037e0ba44f4efe06a9ee2b
    • Instruction Fuzzy Hash: 2B813E72608B8186E724DF61F44026AF7A4FB88B94F504135EBAE47B98CF3CD049EB54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 859 2c5ff94-2c5ffdc call 2c62cbc call 2c60d78 call 2c60d30 866 2c5ffe2-2c5fff1 call 2c60cd0 859->866 867 2c603ed-2c60401 call 2c5c310 859->867 872 2c5fff7-2c60006 call 2c60d00 866->872 873 2c603d9-2c603e8 call 2c5c310 866->873 874 2c60402-2c60411 867->874 878 2c603c5-2c603d4 call 2c5c310 872->878 879 2c6000c-2c60043 call 2c5a770 call 2c67620 872->879 873->867 878->873 885 2c600da-2c600e4 879->885 886 2c60049-2c6004c 879->886 888 2c600e6-2c600eb call 2c55280 885->888 889 2c600f2-2c60102 GetTimeZoneInformation 885->889 886->885 887 2c60052-2c6005c 886->887 893 2c60082-2c6009d call 2c573e0 call 2c5a7e0 887->893 894 2c6005e-2c6006b call 2c5b980 887->894 888->889 891 2c60108-2c60130 889->891 892 2c60229 889->892 898 2c60132-2c60139 891->898 899 2c60140-2c60148 891->899 896 2c6022e-2c60264 call 2c60d70 call 2c60d60 call 2c60d68 call 2c62bbc 892->896 893->892 918 2c600a3-2c600c0 call 2c573e0 call 2c5ba30 893->918 894->892 910 2c60071-2c6007b 894->910 896->874 932 2c6026a-2c60282 call 2c62774 896->932 898->899 903 2c6016d-2c60175 899->903 904 2c6014a-2c60152 899->904 909 2c6017d-2c601b7 WideCharToMultiByte 903->909 904->903 908 2c60154-2c6016b 904->908 908->909 914 2c601cd-2c601d1 909->914 915 2c601b9-2c601c1 909->915 910->893 911 2c6007d call 2c55280 910->911 911->893 920 2c601d4-2c6020a WideCharToMultiByte 914->920 915->914 919 2c601c3-2c601cb 915->919 918->896 933 2c600c6-2c600d5 call 2c5c310 918->933 919->920 923 2c60221-2c60226 920->923 924 2c6020c-2c60214 920->924 923->892 924->923 927 2c60216-2c6021f 924->927 927->892 937 2c603b0-2c603c4 call 2c5c310 932->937 938 2c60288-2c6028e 932->938 933->885 937->878 940 2c60297-2c602b3 call 2c67614 938->940 941 2c60290-2c60294 938->941 945 2c602b6-2c602ba 940->945 941->940 946 2c602c0-2c602c2 945->946 947 2c603a8-2c603ab 945->947 948 2c602c4-2c602c7 946->948 949 2c602cd-2c602d0 946->949 947->945 948->947 948->949 950 2c60336-2c60339 949->950 951 2c602d2-2c602f3 call 2c67614 949->951 952 2c60346-2c60352 950->952 953 2c6033b-2c6033e 950->953 959 2c602fd-2c60301 951->959 955 2c60354-2c6036b call 2c62774 952->955 956 2c60382-2c60387 952->956 953->952 960 2c6038a-2c603a6 call 2c60d70 call 2c60d60 955->960 966 2c6036d-2c60381 call 2c5c310 955->966 956->960 962 2c602f5-2c602f8 959->962 963 2c60303-2c60306 959->963 960->874 962->963 967 2c602fa 962->967 963->950 968 2c60308-2c60326 call 2c67614 963->968 966->956 967->959 975 2c60330-2c60334 968->975 975->950 976 2c60328-2c6032b 975->976 976->950 977 2c6032d 976->977 977->975
    APIs
    • _lock.LIBCMT ref: 02C5FFBF
      • Part of subcall function 02C62CBC: _amsg_exit.LIBCMT ref: 02C62CE6
    • _get_daylight.LIBCMT ref: 02C5FFD5
      • Part of subcall function 02C60D30: _errno.LIBCMT ref: 02C60D39
      • Part of subcall function 02C60D30: _invalid_parameter_noinfo.LIBCMT ref: 02C60D44
    • _get_daylight.LIBCMT ref: 02C5FFEA
      • Part of subcall function 02C60CD0: _errno.LIBCMT ref: 02C60CD9
      • Part of subcall function 02C60CD0: _invalid_parameter_noinfo.LIBCMT ref: 02C60CE4
    • _get_daylight.LIBCMT ref: 02C5FFFF
      • Part of subcall function 02C60D00: _errno.LIBCMT ref: 02C60D09
      • Part of subcall function 02C60D00: _invalid_parameter_noinfo.LIBCMT ref: 02C60D14
    • ___lc_codepage_func.LIBCMT ref: 02C6000C
      • Part of subcall function 02C5A770: _getptd.LIBCMT ref: 02C5A774
      • Part of subcall function 02C67620: __wtomb_environ.LIBCMT ref: 02C67650
    • free.LIBCMT ref: 02C6007D
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    • free.LIBCMT ref: 02C600E6
    • GetTimeZoneInformation.KERNEL32 ref: 02C600F9
    • WideCharToMultiByte.KERNEL32 ref: 02C601AF
    • WideCharToMultiByte.KERNEL32 ref: 02C60202
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_get_daylight_invalid_parameter_noinfo$ByteCharMultiWidefree$ErrorFreeHeapInformationLastTimeZone___lc_codepage_func__wtomb_environ_amsg_exit_getptd_lock
    • String ID: Eastern Standard Time$Eastern Summer Time
    • API String ID: 2532449802-239921721
    • Opcode ID: 0c97cee6d145cff3ac5e51c77ab776f690a74dde89f2690ff405645e1eb8e359
    • Instruction ID: 818c6e6815c6cfcc5a73ab1cfb3a9ba86861143dfa1c916c84a22d23d2d3b458
    • Opcode Fuzzy Hash: 0c97cee6d145cff3ac5e51c77ab776f690a74dde89f2690ff405645e1eb8e359
    • Instruction Fuzzy Hash: F5B1B3322047808AEB34DF25E9D877E7BA6FB85784F4481299E8E67B64DF38C551CB04

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 978 2c474f0-2c47562 call 2c57bb0 call 2c55ea4 983 2c47564-2c4756e 978->983 984 2c475e3-2c4760e CoCreateInstance 978->984 985 2c47571-2c47574 call 2c47400 983->985 986 2c47614-2c47664 984->986 987 2c477da-2c477e5 lstrlenW 984->987 993 2c47579-2c4757b 985->993 998 2c477ca-2c477d2 986->998 999 2c4766a-2c47682 986->999 988 2c477e7-2c477f7 lstrcatW 987->988 989 2c477f8-2c47800 987->989 988->989 991 2c47802 989->991 992 2c47808-2c4783a call 2c54cd0 989->992 991->992 996 2c475c1-2c475e1 call 2c55ea4 993->996 997 2c4757d-2c47587 call 2c4a550 993->997 996->984 996->985 1008 2c475a3-2c475bb lstrcatW * 2 997->1008 1009 2c47589-2c47590 call 2c4a900 997->1009 998->987 1003 2c477d4 998->1003 999->998 1007 2c47688 999->1007 1003->987 1011 2c47690-2c47732 call 2c57bb0 wsprintfW RegOpenKeyExW 1007->1011 1008->996 1009->1008 1014 2c47592-2c4759c call 2c4a600 1009->1014 1017 2c47734-2c47780 call 2c57bb0 RegQueryValueExW 1011->1017 1018 2c477ac-2c477bb 1011->1018 1014->1008 1021 2c4759e call 2c4a800 1014->1021 1025 2c477a2-2c477a6 RegCloseKey 1017->1025 1026 2c47782-2c4779c lstrcatW * 2 1017->1026 1023 2c477c2-2c477c4 1018->1023 1021->1008 1023->998 1023->1011 1025->1018 1026->1025
    APIs
    • lstrcatW.KERNEL32 ref: 02C475AB
    • lstrcatW.KERNEL32 ref: 02C475BB
      • Part of subcall function 02C4A900: GetCurrentProcess.KERNEL32 ref: 02C4A917
      • Part of subcall function 02C4A900: OpenProcessToken.ADVAPI32 ref: 02C4A928
      • Part of subcall function 02C4A900: LookupPrivilegeValueW.ADVAPI32 ref: 02C4A948
      • Part of subcall function 02C4A900: AdjustTokenPrivileges.ADVAPI32 ref: 02C4A970
      • Part of subcall function 02C4A900: GetLastError.KERNEL32 ref: 02C4A976
      • Part of subcall function 02C4A900: CloseHandle.KERNEL32 ref: 02C4A986
      • Part of subcall function 02C4A600: CreateToolhelp32Snapshot.KERNEL32 ref: 02C4A637
    • CoCreateInstance.OLE32 ref: 02C47606
    • wsprintfW.USER32 ref: 02C47703
    • RegOpenKeyExW.ADVAPI32 ref: 02C4772A
    • RegQueryValueExW.ADVAPI32 ref: 02C47778
    • lstrcatW.KERNEL32 ref: 02C4778C
    • lstrcatW.KERNEL32 ref: 02C4779C
    • RegCloseKey.ADVAPI32 ref: 02C477A6
      • Part of subcall function 02C47400: CreateToolhelp32Snapshot.KERNEL32 ref: 02C47441
      • Part of subcall function 02C47400: Process32FirstW.KERNEL32 ref: 02C47460
      • Part of subcall function 02C47400: Process32NextW.KERNEL32 ref: 02C474A0
      • Part of subcall function 02C47400: CloseHandle.KERNEL32 ref: 02C474AD
    • lstrlenW.KERNEL32 ref: 02C477DD
    • lstrcatW.KERNEL32 ref: 02C477F1
      • Part of subcall function 02C4A550: GetModuleHandleA.KERNEL32 ref: 02C4A55D
      • Part of subcall function 02C4A550: GetProcAddress.KERNEL32 ref: 02C4A575
      • Part of subcall function 02C4A550: GetProcAddress.KERNEL32 ref: 02C4A58C
      • Part of subcall function 02C4A550: GetProcAddress.KERNEL32 ref: 02C4A5A3
    Strings
    • CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}, xrefs: 02C476F8
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrcat$AddressCloseCreateHandleProc$OpenProcessProcess32SnapshotTokenToolhelp32Value$AdjustCurrentErrorFirstInstanceLastLookupModuleNextPrivilegePrivilegesQuerylstrlenwsprintf
    • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}
    • API String ID: 1729154408-4035668053
    • Opcode ID: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
    • Instruction ID: 2ed17d04980e8076a8f0db70fb0334c1b21ba0532b3eff66e4afd3fa221a4536
    • Opcode Fuzzy Hash: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
    • Instruction Fuzzy Hash: 01915C72704B9086EB20CF65E854B9E7BB1FB89B98F504116DE4D5BB28DF38C549CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1027 2c47bf0-2c47c4a call 2c466a0 * 2 1032 2c47c50-2c47c6e GetTokenInformation 1027->1032 1033 2c47d6a 1027->1033 1034 2c47ca4-2c47cc6 GetTokenInformation 1032->1034 1035 2c47c70-2c47c79 GetLastError 1032->1035 1036 2c47d6c-2c47d89 call 2c54cd0 1033->1036 1038 2c47d51-2c47d54 1034->1038 1039 2c47ccc-2c47d04 LookupAccountSidW 1034->1039 1035->1033 1040 2c47c7f-2c47c9e GetProcessHeap HeapAlloc 1035->1040 1038->1033 1044 2c47d56-2c47d64 GetProcessHeap HeapFree 1038->1044 1042 2c47d06-2c47d11 GetLastError 1039->1042 1043 2c47d2f-2c47d4c call 2c466a0 * 2 1039->1043 1040->1033 1040->1034 1045 2c47d13-2c47d29 call 2c55560 1042->1045 1046 2c47d2b-2c47d2d 1042->1046 1043->1038 1044->1033 1045->1038 1046->1036
    APIs
      • Part of subcall function 02C466A0: SysFreeString.OLEAUT32 ref: 02C466FD
      • Part of subcall function 02C466A0: SysAllocString.OLEAUT32 ref: 02C46749
    • GetTokenInformation.ADVAPI32 ref: 02C47C66
    • GetLastError.KERNEL32 ref: 02C47C70
    • GetProcessHeap.KERNEL32 ref: 02C47C83
    • HeapAlloc.KERNEL32 ref: 02C47C92
    • GetTokenInformation.ADVAPI32 ref: 02C47CBE
    • LookupAccountSidW.ADVAPI32 ref: 02C47CFC
    • GetLastError.KERNEL32 ref: 02C47D06
    • GetProcessHeap.KERNEL32 ref: 02C47D56
    • HeapFree.KERNEL32 ref: 02C47D64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountLookup
    • String ID: NONE_MAPPED$Network
    • API String ID: 1972796461-3150097737
    • Opcode ID: ac7feef6db6130654831ced217b9bb5803c1e798a4c6bdfe98388abe7cb67064
    • Instruction ID: a53d567c2539a4a175b27a11f2dc5917b7e70c0cfc6cb960f2c360484cfbb843
    • Opcode Fuzzy Hash: ac7feef6db6130654831ced217b9bb5803c1e798a4c6bdfe98388abe7cb67064
    • Instruction Fuzzy Hash: C2416232314A8186EA24DB11F848BAFB365FBC9B99F944025DE4A47B58EF3CD549CB00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1053 2c48a70-2c48a91 LoadLibraryW 1054 2c48a97-2c48aaa GetProcAddress 1053->1054 1055 2c48bd3-2c48bda 1053->1055 1056 2c48ab0-2c48b5f call 2c5553c call 2c52694 call 2c489f0 1054->1056 1057 2c48bca-2c48bcd FreeLibrary 1054->1057 1065 2c48b67-2c48b9a RegOpenKeyExW RegQueryValueExW 1056->1065 1066 2c48b61 1056->1066 1057->1055 1067 2c48bb2-2c48bc0 RegCloseKey call 2c55860 1065->1067 1068 2c48b9c-2c48b9e 1065->1068 1066->1065 1072 2c48bc5 1067->1072 1068->1067 1069 2c48ba0-2c48bad call 2c55a08 1068->1069 1069->1067 1072->1057
    APIs
    • LoadLibraryW.KERNEL32 ref: 02C48A85
    • GetProcAddress.KERNEL32 ref: 02C48AA1
    • FreeLibrary.KERNEL32 ref: 02C48BCD
      • Part of subcall function 02C5553C: _vswprintf_s_l.LIBCMT ref: 02C55556
      • Part of subcall function 02C489F0: GetModuleHandleW.KERNEL32 ref: 02C48A1B
      • Part of subcall function 02C489F0: GetProcAddress.KERNEL32 ref: 02C48A2B
      • Part of subcall function 02C489F0: GetNativeSystemInfo.KERNEL32 ref: 02C48A3B
    • RegOpenKeyExW.ADVAPI32 ref: 02C48B67
    • RegQueryValueExW.ADVAPI32 ref: 02C48B92
    • RegCloseKey.ADVAPI32 ref: 02C48BB7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValue_vswprintf_s_l
    • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
    • API String ID: 1477497710-3190923360
    • Opcode ID: 8fccf4e8e9dfffdbce54dd016b3a3e640cc6c4c560ac19f32a706210135c0e15
    • Instruction ID: 597de29e342e22bdaab0eb0f5b5bc57f0a9c44ca21c9201c75316df88e00854e
    • Opcode Fuzzy Hash: 8fccf4e8e9dfffdbce54dd016b3a3e640cc6c4c560ac19f32a706210135c0e15
    • Instruction Fuzzy Hash: 8B31B07221978186EB60DF11F848B5E7760FB89BE4F444215EE9A47B98EF3CC644CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateEvent$CountCriticalInitializeSectionSpinTimetime
    • String ID: <$<
    • API String ID: 4111701721-213342407
    • Opcode ID: 203e18af1a8a4e1e889c7495eccf5284d8b72f4a964f0ba929df4dc58f6d7ff2
    • Instruction ID: a908459800c507a9ba625334e6452727eddc3b5553096ac11ca38e7828660490
    • Opcode Fuzzy Hash: 203e18af1a8a4e1e889c7495eccf5284d8b72f4a964f0ba929df4dc58f6d7ff2
    • Instruction Fuzzy Hash: 2C81BC32601B9286E704AF30E8547AD73A8FB48F08F58413DEE694B7D8CF388055DBA4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStringslstrcatlstrlen
    • String ID: A:\$B:\
    • API String ID: 1889997506-1009255891
    • Opcode ID: 5dc2d984e07fee21b3691a8fb012607491010a079a3f60e72f83a1abb6f6c642
    • Instruction ID: e8889277c7c3d910eae3fed6214e2823309a73140da13e9a37a70cee7300599c
    • Opcode Fuzzy Hash: 5dc2d984e07fee21b3691a8fb012607491010a079a3f60e72f83a1abb6f6c642
    • Instruction Fuzzy Hash: 47316166218A9185EB30DF12F8487AF6364F7C9B89F445116DE8A87B58EF7CC245CF40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen$Thread$Window$CloseConsoleCreateCurrentExceptionFilterHandleInputMessageObjectPostShowSingleSleepStateUnhandledWait
    • String ID:
    • API String ID: 3551332608-0
    • Opcode ID: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
    • Instruction ID: 1685a28f009144f55dbf9b1bfc204bcdebf1a030d4fb220c8f738b109a44304f
    • Opcode Fuzzy Hash: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
    • Instruction Fuzzy Hash: 1C014820F18E5282F704BB75BC19569E3A1FF88B16BC08934D57F422F0DE3C6419A2A8
    APIs
    • GetDriveTypeW.KERNEL32 ref: 02C481EA
    • GetDiskFreeSpaceExW.KERNEL32 ref: 02C4820E
    • GlobalMemoryStatusEx.KERNEL32 ref: 02C48275
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DiskDriveFreeGlobalMemorySpaceStatusType
    • String ID: %sFree%d Gb $:$@$HDD:%d
    • API String ID: 3475944273-3501811827
    • Opcode ID: 76de7998e9de80cc2ded53d2e4fe325184efc08d04f63c850a58e7016f2c78a4
    • Instruction ID: d8c8c6a4d1e8d43cc55d892e4e3f98172fea36612f8227234114d771dd1bde30
    • Opcode Fuzzy Hash: 76de7998e9de80cc2ded53d2e4fe325184efc08d04f63c850a58e7016f2c78a4
    • Instruction Fuzzy Hash: EA310736209B8486E760DF15B844B8BB7A4F389798F901216EECD43B18DF38C556CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateFreeInitializeInstanceStringUninitialize
    • String ID: FriendlyName$Network
    • API String ID: 841178590-1437807293
    • Opcode ID: 84c243b931c5992d681145c8f6e0b05a35417d470a1a95b211a46464dadc8825
    • Instruction ID: 5403e7f4a03aa2c7fa5a3e09dc66f9b455da7a56a1db49801ee79afc33cb4ef9
    • Opcode Fuzzy Hash: 84c243b931c5992d681145c8f6e0b05a35417d470a1a95b211a46464dadc8825
    • Instruction Fuzzy Hash: E931FD76204A8692EB20DF75E444B9EB760F7C8F99F559016DA8E83B24DF38C189CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoSystem$AddressHandleModuleNativeProc
    • String ID: GetNativeSystemInfo$kernel32.dll
    • API String ID: 3433367815-192647395
    • Opcode ID: 89cb0620d88a823d197d8a4edb78f2da70a6a6bea98d141efa7987b94c4cb817
    • Instruction ID: f42b971558cef748db4263fdfbe33890cc6acd348a7621cd2231a68e33888276
    • Opcode Fuzzy Hash: 89cb0620d88a823d197d8a4edb78f2da70a6a6bea98d141efa7987b94c4cb817
    • Instruction Fuzzy Hash: A1F03C36619F8586EA60EB10FC5875A73A4F7C8B44F840229D6CF83758EF7CC2558B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$recvselect
    • String ID:
    • API String ID: 4102763267-0
    • Opcode ID: a87cada1dcbfab8d9f4ea9d1832976277f26580d7a4e36eb41945066a534f54b
    • Instruction ID: 723ae2cc4c4a02a4eafea5649024e450d51b842de221e30600f4f323f3df8de1
    • Opcode Fuzzy Hash: a87cada1dcbfab8d9f4ea9d1832976277f26580d7a4e36eb41945066a534f54b
    • Instruction Fuzzy Hash: 7F319AB2214AD081EB309F25E948B6E73A1FBC9BD8F944265CE8A47B94DF38C0408B15
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
    • String ID:
    • API String ID: 1789362936-0
    • Opcode ID: 0be9ed80d58a340915f6c32b2beb49099068b08a59c1afc760e6751da2d599d4
    • Instruction ID: 2b2ed5070eba9ac0beaa16cde73ca24b14d98a85102d834a24b9d15d46090a5b
    • Opcode Fuzzy Hash: 0be9ed80d58a340915f6c32b2beb49099068b08a59c1afc760e6751da2d599d4
    • Instruction Fuzzy Hash: 4721782260864185EB64DB26F45C37BB7A1F7C8B98F849225DA5E47B54EF3CC548CF10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateFactory
    • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
    • API String ID: 1145517477-257307503
    • Opcode ID: 32845b5ceee2c9c9111369cf511fee31bcf8c5e9523092c1b243209fcc5ace9d
    • Instruction ID: d4e6eb185b9f0e0d9ef0cb01671c6db3702fc38cb6c186dd9ec63cd0a36cdf29
    • Opcode Fuzzy Hash: 32845b5ceee2c9c9111369cf511fee31bcf8c5e9523092c1b243209fcc5ace9d
    • Instruction Fuzzy Hash: 2DD1E072714A8486DF10CF66E8542AE7762F784BE8F544722DE6E27BA8DF38C585C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Heap$CreateInformationVersion
    • String ID:
    • API String ID: 3563531100-0
    • Opcode ID: 90aacd7874f7576210f1b8e18ccfcd6701819cf72a36e26adf16026e4497063d
    • Instruction ID: e4487430f56595025de3f75e68d48044155b3625cbb861d7c238c55c089aa63e
    • Opcode Fuzzy Hash: 90aacd7874f7576210f1b8e18ccfcd6701819cf72a36e26adf16026e4497063d
    • Instruction Fuzzy Hash: 4FE0D834211A9182FB595715F80DB6E3711F7C8344F805018FA0B43F44EF3CC0468714

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$DisposeFreeFromImageLock$AllocBitmapDeleteGdiplusObjectShutdownUnlock
    • String ID:
    • API String ID: 562715702-0
    • Opcode ID: 1f20682f04d03fbf3385fc7b2c80d26b451ef2743fd3ada5c9c0ffae22fdbc8f
    • Instruction ID: aa42ab7b9e1b9e2b513ca5302404251525dfea6eefc8b3418df8460a176674a6
    • Opcode Fuzzy Hash: 1f20682f04d03fbf3385fc7b2c80d26b451ef2743fd3ada5c9c0ffae22fdbc8f
    • Instruction Fuzzy Hash: 9191F436704B418AFB24DBA1F85879E33B1F788BA8F404619CE5E57EA8DF38C1598750

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 589 2c4cc50-2c4cc80 call 2c4c570 592 2c4cc86-2c4cc96 GdipGetImageEncodersSize 589->592 593 2c4cd60 589->593 592->593 595 2c4cc9c-2c4cca7 592->595 594 2c4cd65-2c4cd80 call 2c54cd0 593->594 597 2c4cce3-2c4ccf0 595->597 598 2c4cca9-2c4ccb2 call 2c4c0e0 595->598 599 2c4ccf6-2c4cd02 call 2c552c0 597->599 600 2c4cf37-2c4cf41 call 2c41220 597->600 606 2c4ccb4-2c4ccbe 598->606 607 2c4cce0 598->607 612 2c4cd04-2c4cd06 599->612 613 2c4cd08-2c4cd12 599->613 610 2c4ccc0 606->610 611 2c4ccca-2c4ccde call 2c63da0 606->611 607->597 610->611 615 2c4cd15-2c4cd18 611->615 612->615 613->615 617 2c4cd37-2c4cd47 GdipGetImageEncoders 615->617 618 2c4cd1a-2c4cd1d 615->618 619 2c4cd81-2c4cd91 617->619 620 2c4cd49-2c4cd4c 617->620 621 2c4cd30-2c4cd35 618->621 622 2c4cd1f 618->622 625 2c4cd93 619->625 626 2c4cdda 619->626 620->593 624 2c4cd4e 620->624 621->594 623 2c4cd20-2c4cd2e call 2c55280 622->623 623->621 629 2c4cd50-2c4cd5e call 2c55280 624->629 627 2c4cda0-2c4cdb7 625->627 630 2c4cde1-2c4cdf4 626->630 631 2c4cdb9-2c4cdc4 627->631 632 2c4cdca-2c4cdcc 627->632 629->593 635 2c4cdf6-2c4ce01 630->635 636 2c4ce13-2c4ce15 630->636 631->632 637 2c4cdc6-2c4cdc8 631->637 638 2c4cdcf-2c4cdd1 632->638 635->636 640 2c4ce03-2c4ce05 635->640 641 2c4ce18-2c4ce1a 636->641 637->638 642 2c4ce07-2c4ce11 638->642 643 2c4cdd3-2c4cdd8 638->643 640->641 644 2c4ce1c-2c4ce1f 641->644 645 2c4ce3a-2c4ce48 641->645 642->630 643->626 643->627 644->593 648 2c4ce25-2c4ce33 call 2c55280 644->648 646 2c4ceba-2c4cee7 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 645->646 647 2c4ce4a-2c4ce94 GdipCreateBitmapFromScan0 GdipSaveImageToStream 645->647 649 2c4cf15-2c4cf1e GdipDisposeImage 646->649 651 2c4cee9-2c4cef2 GdipDisposeImage 646->651 647->649 650 2c4ce96-2c4ce9f GdipDisposeImage 647->650 658 2c4ce35 648->658 654 2c4cf30-2c4cf32 649->654 655 2c4cf20-2c4cf2e call 2c55280 649->655 650->593 656 2c4cea5-2c4ceb3 call 2c55280 650->656 651->593 657 2c4cef8 651->657 654->594 655->654 665 2c4ceb5 656->665 661 2c4cf00-2c4cf0e call 2c55280 657->661 658->593 667 2c4cf10 661->667 665->593 667->593
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Gdip$Image$free$Dispose$BitmapCreateEncodersFromSaveStream$Scan0Sizemalloc
    • String ID: &
    • API String ID: 1890951399-3042966939
    • Opcode ID: 1b113133b1d1c7f617ae231253ae617589de5df3b5f4aa67eb334f1dad3f7bec
    • Instruction ID: 22b8f0daee8bd10b65e2c4fc07b282112646a4a4ab2ce894e02b86a160d17ea5
    • Opcode Fuzzy Hash: 1b113133b1d1c7f617ae231253ae617589de5df3b5f4aa67eb334f1dad3f7bec
    • Instruction Fuzzy Hash: 05719232302A8196EF149F35D9147AA2765F784BD8F889637DE1A477A4EF38D345C340

    Control-flow Graph

    APIs
    • GetCurrentProcessId.KERNEL32 ref: 02C47FA5
    • wsprintfW.USER32 ref: 02C47FBC
      • Part of subcall function 02C47D90: GetCurrentProcessId.KERNEL32 ref: 02C47DAD
      • Part of subcall function 02C47D90: OpenProcess.KERNEL32 ref: 02C47DBD
      • Part of subcall function 02C47D90: OpenProcessToken.ADVAPI32 ref: 02C47DE5
      • Part of subcall function 02C47D90: CloseHandle.KERNEL32 ref: 02C47DF2
    • GetVersionExW.KERNEL32 ref: 02C47FEB
    • GetCurrentProcess.KERNEL32 ref: 02C48014
    • OpenProcessToken.ADVAPI32 ref: 02C48025
    • GetTokenInformation.ADVAPI32 ref: 02C4804F
    • GetLastError.KERNEL32 ref: 02C48059
    • LocalAlloc.KERNEL32 ref: 02C48073
    • GetTokenInformation.ADVAPI32 ref: 02C4809B
    • GetSidSubAuthorityCount.ADVAPI32 ref: 02C480A9
    • GetSidSubAuthority.ADVAPI32 ref: 02C480B8
    • LocalFree.KERNEL32 ref: 02C480C3
    • CloseHandle.KERNEL32 ref: 02C480D6
    • wsprintfW.USER32 ref: 02C48135
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
    • String ID: -N/$NO/$None/%s
    • API String ID: 4155081256-3095023699
    • Opcode ID: eabe9c37c142d0c42af826881d2ffa50fe86e3bf6b1343313f3b0a9839f108bd
    • Instruction ID: c63cf3c1e8bc528343da7a5177e253b37759364df28ab70b8b844e2a99d84034
    • Opcode Fuzzy Hash: eabe9c37c142d0c42af826881d2ffa50fe86e3bf6b1343313f3b0a9839f108bd
    • Instruction Fuzzy Hash: E151FC31218B85C6EB64DF21FC98BAE7371F789B88F441126DA4A47A58DF38D549CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 742 2c4c830-2c4c877 GdipGetImagePixelFormat 743 2c4c87e-2c4c89c 742->743 744 2c4c879 742->744 745 2c4c8b0-2c4c8b5 743->745 746 2c4c89e-2c4c8ac 743->746 744->743 747 2c4c8b7-2c4c8c8 745->747 748 2c4c8cc-2c4c8e0 GdipGetImageHeight 745->748 746->745 747->748 749 2c4c8e7-2c4c8fe GdipGetImageWidth 748->749 750 2c4c8e2 748->750 751 2c4c905-2c4c91c call 2c4c6d0 749->751 752 2c4c900 749->752 750->749 755 2c4caf0-2c4caf5 751->755 756 2c4c922-2c4c92a 751->756 752->751 757 2c4cc22-2c4cc4a call 2c54cd0 755->757 758 2c4c930-2c4c944 GdipGetImagePaletteSize 756->758 759 2c4ca6d-2c4ca78 756->759 761 2c4c946 758->761 762 2c4c94b-2c4c956 758->762 763 2c4cba1-2c4cbfe GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 759->763 764 2c4ca7e-2c4caaf GdipBitmapLockBits 759->764 761->762 766 2c4c958-2c4c962 call 2c4c0e0 762->766 767 2c4c98a-2c4c998 762->767 770 2c4cc04-2c4cc07 763->770 768 2c4cb05-2c4cb1e 764->768 769 2c4cab1-2c4cab9 764->769 766->767 790 2c4c964-2c4c96b 766->790 771 2c4c99e-2c4c9aa call 2c552c0 767->771 772 2c4cafa-2c4cb04 call 2c41220 767->772 773 2c4cb20-2c4cb33 call 2c567a8 768->773 774 2c4cb5f-2c4cb70 GdipBitmapUnlockBits 768->774 776 2c4cad0-2c4cad5 769->776 777 2c4cabb 769->777 778 2c4cc20 770->778 779 2c4cc09 770->779 794 2c4c9b1-2c4c9b7 771->794 795 2c4c9ac-2c4c9af 771->795 772->768 796 2c4cb35-2c4cb38 773->796 797 2c4cb49-2c4cb5d 773->797 774->770 780 2c4cb76-2c4cb7b 774->780 776->757 785 2c4cac0-2c4cace call 2c55280 777->785 778->757 786 2c4cc10-2c4cc1e call 2c55280 779->786 780->770 785->776 786->778 798 2c4c977-2c4c988 call 2c63da0 790->798 799 2c4c96d 790->799 801 2c4c9bb-2c4c9be 794->801 795->801 802 2c4cb96-2c4cba0 call 2c41220 796->802 803 2c4cb3a-2c4cb3d 796->803 797->773 797->774 798->801 799->798 805 2c4c9c0-2c4c9c3 801->805 806 2c4c9df-2c4c9f2 GdipGetImagePalette 801->806 802->763 808 2c4cb3f-2c4cb42 803->808 809 2c4cb8b-2c4cb95 call 2c41220 803->809 812 2c4c9d5-2c4c9da 805->812 813 2c4c9c5-2c4c9d3 call 2c55280 805->813 815 2c4c9f4 806->815 816 2c4c9f9-2c4ca02 806->816 808->809 817 2c4cb44-2c4cb47 808->817 809->802 812->757 813->812 815->816 820 2c4ca08-2c4ca0d 816->820 821 2c4cada-2c4cadd 816->821 817->797 822 2c4cb80-2c4cb8a call 2c41220 817->822 820->821 823 2c4ca13-2c4ca18 820->823 821->755 826 2c4cadf 821->826 822->809 828 2c4ca1a-2c4ca25 823->828 829 2c4ca5b-2c4ca69 call 2c4cf50 823->829 827 2c4cae0-2c4caee call 2c55280 826->827 827->755 832 2c4ca30-2c4ca59 828->832 829->759 832->829 832->832
    APIs
    • GdipGetImagePixelFormat.GDIPLUS ref: 02C4C86F
    • GdipGetImageHeight.GDIPLUS ref: 02C4C8D8
    • GdipGetImageWidth.GDIPLUS ref: 02C4C8F6
    • GdipGetImagePaletteSize.GDIPLUS ref: 02C4C93C
    • malloc.LIBCMT ref: 02C4C9A2
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • free.LIBCMT ref: 02C4C9CB
    • GdipGetImagePalette.GDIPLUS ref: 02C4C9EA
    • GdipBitmapLockBits.GDIPLUS ref: 02C4CAA7
    • free.LIBCMT ref: 02C4CAC6
    • GdipCreateBitmapFromScan0.GDIPLUS ref: 02C4CBBF
    • GdipGetImageGraphicsContext.GDIPLUS ref: 02C4CBD4
    • GdipDrawImageI.GDIPLUS ref: 02C4CBEC
    • GdipDeleteGraphics.GDIPLUS ref: 02C4CBF5
    • GdipDisposeImage.GDIPLUS ref: 02C4CBFE
    • free.LIBCMT ref: 02C4CAE6
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    • memcpy_s.LIBCMT ref: 02C4CB2C
    • GdipBitmapUnlockBits.GDIPLUS ref: 02C4CB68
    • free.LIBCMT ref: 02C4CC16
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Gdip$Image$free$Bitmap_errno$BitsGraphicsHeapPalette$AllocContextCreateDeleteDisposeDrawErrorFormatFreeFromHeightLastLockPixelScan0SizeUnlockWidth_callnewhmallocmemcpy_s
    • String ID:
    • API String ID: 1886978121-0
    • Opcode ID: 42f3f85edf21d4ffff2d38a0cd1d8951f1e28ef6d88c4ef60eeee2c527c753ee
    • Instruction ID: 68d27722fb6ad545c9af7539c8d24348ea2f930c845b351df14f9fb605470e99
    • Opcode Fuzzy Hash: 42f3f85edf21d4ffff2d38a0cd1d8951f1e28ef6d88c4ef60eeee2c527c753ee
    • Instruction Fuzzy Hash: ACB1BE72301A809ADB20CF26D848B9E37A5F788BD8F459527DE5A87B64DF38C345C744

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateMutex$Sleep$ConsoleErrorHandleLastModuleWindowlstrcmplstrlen
    • String ID: 2024.12.22$key$open
    • API String ID: 4141083079-4017660554
    • Opcode ID: 4a448574df46548b3933a1e0e783c702eebcdd2863c0193c8b969a62963df4fc
    • Instruction ID: 6314a240ff7cad442cc0e5d094e0b9314be5452bd39a9dea482017a706f306d5
    • Opcode Fuzzy Hash: 4a448574df46548b3933a1e0e783c702eebcdd2863c0193c8b969a62963df4fc
    • Instruction Fuzzy Hash: 35311D31614A82C2FB24AB25F85CBAE7361FB84B49F849526D94F43964DF3CC24DCB51
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Sleep$CloseCreateEventHandle_errno$ObjectSingleStartupWait_invalid_parameter_noinfomalloc
    • String ID: 6666$8.218.163.62
    • API String ID: 407272786-298227647
    • Opcode ID: 13c9adc974c42543c4138414809006d942cbbcd1fe96e939a7d0cf87f8cfa7a0
    • Instruction ID: 7231b3b37c19e2bbc70c54a1fd6e73eedb3610591661210b2eccabf5dad05798
    • Opcode Fuzzy Hash: 13c9adc974c42543c4138414809006d942cbbcd1fe96e939a7d0cf87f8cfa7a0
    • Instruction Fuzzy Hash: C6614C21A18A4295E710FB20E8441A9E360FF497A0FD04535E97E43BE9DF3CE549F7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: OpenProcessValue$CloseCodeDeleteExitSleep
    • String ID: IpDates_info$SOFTWARE
    • API String ID: 864241144-2243437601
    • Opcode ID: 7273320449914747eef314da4b35d0b3e2dae11081ca32cb48a94620bb4d36a9
    • Instruction ID: 9a6b81caa6e7f08867cf5f4f436e07a2e9a4fa7722baa200d8a664ef76231238
    • Opcode Fuzzy Hash: 7273320449914747eef314da4b35d0b3e2dae11081ca32cb48a94620bb4d36a9
    • Instruction Fuzzy Hash: FF318771B1CA0282EB50AB11F844569F3A5FF88794F800534D57E42AE8DF3CE449EB98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: String$CloseHandleProcess$FreeOpen$CurrentToken
    • String ID:
    • API String ID: 3697972778-0
    • Opcode ID: 250c813f0b5ac911f241f73868ced926d4be8b2829d6ef28bc566a87a8018372
    • Instruction ID: 43f6eab0ddb4925f4f65fe5bb7e0e85413eef59a9949bf1bc05c415af50cbf26
    • Opcode Fuzzy Hash: 250c813f0b5ac911f241f73868ced926d4be8b2829d6ef28bc566a87a8018372
    • Instruction Fuzzy Hash: D8418026205B8086EF24DF22E41476EA365FBC4F98F484629CE9E4BB54DF3CC949C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit$CommandInitializeLine__wsetargv_cinit
    • String ID:
    • API String ID: 2949660345-0
    • Opcode ID: bc546b9b31afb54ae0084185d84276419e05a16c241d08c8ffe122babf2c2063
    • Instruction ID: d71707a4bb3ffdf27923d4f80045a51a6b4522bc923edc26638b653523f4861c
    • Opcode Fuzzy Hash: bc546b9b31afb54ae0084185d84276419e05a16c241d08c8ffe122babf2c2063
    • Instruction Fuzzy Hash: 8D314D20E0C60396FB54776094462B9E291AF89348FC55035D57D462DFDE2CB848B6FD
    APIs
    • RegOpenKeyExW.ADVAPI32 ref: 02C478C9
    • RegQueryInfoKeyW.ADVAPI32 ref: 02C47924
    • RegEnumKeyExW.ADVAPI32 ref: 02C479B9
    • lstrlenW.KERNEL32 ref: 02C479C3
    • lstrlenW.KERNEL32 ref: 02C479D2
      • Part of subcall function 02C55F08: _errno.LIBCMT ref: 02C55F27
      • Part of subcall function 02C55F08: _invalid_parameter_noinfo.LIBCMT ref: 02C55F33
      • Part of subcall function 02C55F08: _errno.LIBCMT ref: 02C55F7D
    • RegCloseKey.ADVAPI32 ref: 02C47A1B
    • lstrlenW.KERNEL32 ref: 02C47A38
    Strings
    • Software\Tencent\Plugin\VAS, xrefs: 02C478AD
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen$_errno$CloseEnumInfoOpenQuery_invalid_parameter_noinfo
    • String ID: Software\Tencent\Plugin\VAS
    • API String ID: 47975445-3343197220
    • Opcode ID: 36ec62b793e39dcc94c07c2d0a1f741258fd71675ca2a9683c074fb8b423db42
    • Instruction ID: 2de507f8b95efb75efd50783ddc8c4ec3adc3ba75586b7db8a3beaeddcb76310
    • Opcode Fuzzy Hash: 36ec62b793e39dcc94c07c2d0a1f741258fd71675ca2a9683c074fb8b423db42
    • Instruction Fuzzy Hash: CE513D36614B9186E720CF25F89479FB3A5F788748F901126DA8D57E18DF38C289CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Window$CountForegroundInfoInputLastTextTickmallocwsprintf
    • String ID: %d min
    • API String ID: 4179731349-1947832151
    • Opcode ID: 40337b7360b93958c7ffefbf7603324078d7470535306a49e8a517b9f1626132
    • Instruction ID: 4ab693a0118955d4d5723498529b46d916083bb7d96202c33a0f7974c2c58d51
    • Opcode Fuzzy Hash: 40337b7360b93958c7ffefbf7603324078d7470535306a49e8a517b9f1626132
    • Instruction Fuzzy Hash: E041AF727046909ADB28EF26E49879FBBA1F785B88F444029DE4E07B58DF3CC645CB04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocCurrentFreeThread
    • String ID:
    • API String ID: 1155560630-0
    • Opcode ID: 4b852a1b5dd8efe1026821f14150178db2e8c6b99ec0c6da190b714437e6e122
    • Instruction ID: f7f98412b715cf2f31871e68f0c7e089468514aed2b3a307a924c2adea323aa1
    • Opcode Fuzzy Hash: 4b852a1b5dd8efe1026821f14150178db2e8c6b99ec0c6da190b714437e6e122
    • Instruction Fuzzy Hash: 82717F32718A8197D75CAB25E140769F3A0FB48784F908134DB7E87788DF38E4A9E754
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Close$OpenQueryValuelstrcmp
    • String ID:
    • API String ID: 4288439342-0
    • Opcode ID: 43d7abf421c986796ffab67def199f110ce2357268e7baf3c27bcbaffcd6d8c5
    • Instruction ID: e386a12214e8bc301b50c717d425310c629cad9b50395c0cdaed6ee8837352a3
    • Opcode Fuzzy Hash: 43d7abf421c986796ffab67def199f110ce2357268e7baf3c27bcbaffcd6d8c5
    • Instruction Fuzzy Hash: C021F031318A8086EB609B25FC88B5B7360FB85B98F545225AE9E43B98DF38C545CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 3283625137-0
    • Opcode ID: ef76c9431adcd85a319d1e57cb9e2ef9ae5cf1fbd286b1b05233d4a8e7f6675d
    • Instruction ID: 2ef2d8a909c518783cfe1ed61fd6f5d7b895b3a5d0946951ca5257266cd569bb
    • Opcode Fuzzy Hash: ef76c9431adcd85a319d1e57cb9e2ef9ae5cf1fbd286b1b05233d4a8e7f6675d
    • Instruction Fuzzy Hash: 4521933130479086EB14EBA6E94075EB3A5FB84BD4F844625EF6903B95CF3CD195CB08
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 3283625137-0
    • Opcode ID: 3cde405814183ac50174b4c7b06ee0a655b453fe3172371e7738c2e9b2a32393
    • Instruction ID: 5652ffae701dbf665c86039f6aa1f8cc687acd9dbf66f7882a8f8853b33150e5
    • Opcode Fuzzy Hash: 3cde405814183ac50174b4c7b06ee0a655b453fe3172371e7738c2e9b2a32393
    • Instruction Fuzzy Hash: 5C21C721A0878191EB04BB65A544269F290BF88B94F844235EE7D037DECF3CE059A798
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$recvselect
    • String ID:
    • API String ID: 4102763267-0
    • Opcode ID: 9990d17f50331093fb9b0363c6e75c664667ad3c976c3c73e9e25bfe87bb2aa3
    • Instruction ID: c750b0de2e33cc0fcb9d0d7cbe054d04985a16bf9f343b52ab36ff3a055f1877
    • Opcode Fuzzy Hash: 9990d17f50331093fb9b0363c6e75c664667ad3c976c3c73e9e25bfe87bb2aa3
    • Instruction Fuzzy Hash: AD31A571A0C68181E7646B25E40437DF290EF88B88F854135DA7D4BACDCF3CD008A769
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: OpenQueryValue
    • String ID: Console$IpDatespecial
    • API String ID: 4153817207-1840232981
    • Opcode ID: f597642ce5486d2b0d97fa684612b1f2a97d83d6342d12bdc6a07c867f32ff83
    • Instruction ID: 38d2ea1c1b176a3667678235a98f10f47043cc2750cfad7c28e62bbc6e895ea0
    • Opcode Fuzzy Hash: f597642ce5486d2b0d97fa684612b1f2a97d83d6342d12bdc6a07c867f32ff83
    • Instruction Fuzzy Hash: 16218E33718AA099E7218B61F844B9E7774F78879CF844126EE9913A58DF38C25ACB00
    APIs
    • _callnewh.LIBCMT ref: 00007FF7F8DF9136
    • malloc.LIBCMT ref: 00007FF7F8DF9142
      • Part of subcall function 00007FF7F8DF9070: _FF_MSGBANNER.LIBCMT ref: 00007FF7F8DF90A0
      • Part of subcall function 00007FF7F8DF9070: HeapAlloc.KERNEL32(?,?,0001939100000000,00007FF7F8DFC050,?,?,ceil,00007FF7F8DFD951,?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DF90C5
      • Part of subcall function 00007FF7F8DF9070: _callnewh.LIBCMT ref: 00007FF7F8DF90DE
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90E9
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90F4
    • std::exception::exception.LIBCMT ref: 00007FF7F8DF91AF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
    • String ID: bad allocation
    • API String ID: 2837191506-2104205924
    • Opcode ID: 4f08dc12cc9b3052129dc1c476ad1ada57a0f8fd3b1b96a9833c9c367f9ae114
    • Instruction ID: 40856d39fdb91f5e45c8b6bc512ecd28b1668116268e8f4c0756d8088b139449
    • Opcode Fuzzy Hash: 4f08dc12cc9b3052129dc1c476ad1ada57a0f8fd3b1b96a9833c9c367f9ae114
    • Instruction Fuzzy Hash: 08010061F08A0790EF14BB10A8444B4E360AF48354FC41431E9BE467E9EE3CE149F7A8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleProcess$FileImageNameOpen
    • String ID:
    • API String ID: 93767460-0
    • Opcode ID: f4c9a00bd5335a512c6e2cdfdcb9c4e881643e77e15c2ea394c83688fc739c2e
    • Instruction ID: e04ca4180f64c35907188de245296b9b9f9491b796b3bd762bd5910c8af0678f
    • Opcode Fuzzy Hash: f4c9a00bd5335a512c6e2cdfdcb9c4e881643e77e15c2ea394c83688fc739c2e
    • Instruction Fuzzy Hash: 90011E61318B9182FF34DB26F89C76B6291BB89BD8F8454288E4E87B44EF3DC145CB10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Thread$CurrentErrorExitLast_freefls
    • String ID:
    • API String ID: 217443660-0
    • Opcode ID: c1032e5ba32211df7021af190faab52d392a270f38cd16aa57ea7f747e353cbe
    • Instruction ID: e21a123fffa3d408a722a3b22baf346c50d54c92a5292d1fda80772351faf0bc
    • Opcode Fuzzy Hash: c1032e5ba32211df7021af190faab52d392a270f38cd16aa57ea7f747e353cbe
    • Instruction Fuzzy Hash: 6A018160E09B0681EB007B71940927CE390AF5DB88F940830C93D473CAEE3CA448B3F8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CancelEventclosesocketsetsockopt
    • String ID:
    • API String ID: 852421847-0
    • Opcode ID: 03eef7d3bc33077443603d47114998edeb02d6415146c2d3186012465a948f41
    • Instruction ID: a78a2ea9538fb4e6cebac172ad15aebfe766489f16b6ee1370455cede7c2f0e7
    • Opcode Fuzzy Hash: 03eef7d3bc33077443603d47114998edeb02d6415146c2d3186012465a948f41
    • Instruction Fuzzy Hash: 65F03C36201B8183E7148F25E55875EB331F785B64F640329DBBD07AA4CF39C0658740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CancelEventclosesocketsetsockopt
    • String ID:
    • API String ID: 852421847-0
    • Opcode ID: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
    • Instruction ID: b64a1c14b3cadeb2d5fbf8966022272a6df8269e7391967b21685711881daa16
    • Opcode Fuzzy Hash: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
    • Instruction Fuzzy Hash: 85F04632604A8183E7149F25E85432AF331FB89BA0F604735CBBD07AE4CF39D0698B44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ObjectSingleWait$Sleep
    • String ID:
    • API String ID: 2961732021-0
    • Opcode ID: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
    • Instruction ID: fb6518377ff59d4dcbfdc82806ce1cd01ec18006214317196d6d6b9ffcf2e054
    • Opcode Fuzzy Hash: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
    • Instruction Fuzzy Hash: A0F08232704D4586F740AF75DC04328B360FB8AB24F640B31CA3E462D4CF388445D3A4
    APIs
    • RegQueryInfoKeyW.ADVAPI32 ref: 02C4FCB6
    • RegEnumValueW.ADVAPI32 ref: 02C4FD67
      • Part of subcall function 02C55378: malloc.LIBCMT ref: 02C55392
      • Part of subcall function 02C55378: _callnewh.LIBCMT ref: 02C55386
      • Part of subcall function 02C55378: std::exception::exception.LIBCMT ref: 02C553FF
    • RegCloseKey.ADVAPI32 ref: 02C4FF30
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseEnumInfoQueryValue_callnewhmallocstd::exception::exception
    • String ID:
    • API String ID: 1242514309-0
    • Opcode ID: 3305b858c53ab821ca1a14390b6984ca58f21078f84b97f883c0325d42e4eb17
    • Instruction ID: b820f8b5800fedff4009c8b4bfb59587eb1c8b297df4429ba79eb8d26345203f
    • Opcode Fuzzy Hash: 3305b858c53ab821ca1a14390b6984ca58f21078f84b97f883c0325d42e4eb17
    • Instruction Fuzzy Hash: 01818C32301B508AEB10CF65E884B9D73E8F788B98F51822AEE5D87B64EF34C551C744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: 772ceebf875e37336e87943166f2de9f2810a96974fdecb1bd8079b0e36f7ae3
    • Instruction ID: 8ed9e700f83e6c15afd99b5cc434ec4fa31a76eb250dca9160d0447b383244f8
    • Opcode Fuzzy Hash: 772ceebf875e37336e87943166f2de9f2810a96974fdecb1bd8079b0e36f7ae3
    • Instruction Fuzzy Hash: 0061A532A0465286DB18AB29D44CA6EF3A4FF4C7C0F420135DA6D477D8DF38E449E794
    APIs
    • EnterCriticalSection.KERNEL32 ref: 02C4C590
    • GdiplusStartup.GDIPLUS ref: 02C4C5CC
    • LeaveCriticalSection.KERNEL32 ref: 02C4C5E6
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterGdiplusLeaveStartup
    • String ID:
    • API String ID: 389129658-0
    • Opcode ID: 95c4991dab0195ebe368ffd66680bcf302dcdb8c8965a393e09ff6184bfe9b5d
    • Instruction ID: 259627cd0abdd625e46d7507609bdbc6a8c7acb24cbc01bcc76e7f01b292be6e
    • Opcode Fuzzy Hash: 95c4991dab0195ebe368ffd66680bcf302dcdb8c8965a393e09ff6184bfe9b5d
    • Instruction Fuzzy Hash: FB011936608B82C2FB249F11F88879EB3B5F7A1754F84110AE68A43A64DF7CC159CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Heap$CreateInformationVersion
    • String ID:
    • API String ID: 3563531100-0
    • Opcode ID: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
    • Instruction ID: f8e789210f7a4378c5affb65caef39dfae3c58a9cd136b3cd4362e5dcd383362
    • Opcode Fuzzy Hash: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
    • Instruction Fuzzy Hash: CCE06534F19A5282FB457710A809775E260FF98355FC04434E92F027D8DF3CD485A6E8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AllocLibraryLoadVirtual
    • String ID:
    • API String ID: 3550616410-0
    • Opcode ID: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
    • Instruction ID: a5043f71722adb4e56d79d1b5f8a10d3b6fe671748cfacc8a7a17af30c6acd4c
    • Opcode Fuzzy Hash: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
    • Instruction Fuzzy Hash: A5B1B631614E0A8FCB689FA9C8C4675B3E0FB54315B05427DEA8AC7256DF78E892C7C1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: String$AllocFree
    • String ID:
    • API String ID: 344208780-0
    • Opcode ID: 2ff8072f682cb467b12351a1f9e4afe1b1f9cbb5b4c9ea14b380adfe7e6cb5a0
    • Instruction ID: ad5085fd50d39b1936a7b34e33b1c55e120a24c19cc6a7e69c56304fa459d9d6
    • Opcode Fuzzy Hash: 2ff8072f682cb467b12351a1f9e4afe1b1f9cbb5b4c9ea14b380adfe7e6cb5a0
    • Instruction Fuzzy Hash: C9219531202B5182EF199F25D11476AA264AFC5BA8F2C4629CF690B798EF7CC5518700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: send
    • String ID:
    • API String ID: 2809346765-0
    • Opcode ID: 2e59fa7294a7467a9ddcbc0dceddb505d2c61d6133225b8cfaa6b415a71a6c04
    • Instruction ID: 6a39be0dbea0d9109769f9d60819a67665bf98c40ad3573ed4131fa2c027a38b
    • Opcode Fuzzy Hash: 2e59fa7294a7467a9ddcbc0dceddb505d2c61d6133225b8cfaa6b415a71a6c04
    • Instruction Fuzzy Hash: 68110822784BD041D3209BA6BC4872F7A55F7C9BD8F242166EF5A93F54EFB8C1828704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: send
    • String ID:
    • API String ID: 2809346765-0
    • Opcode ID: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
    • Instruction ID: f41bbbdb6b268767c2dc0b876d915a0da560fd97b6252b150ee308d60f203f57
    • Opcode Fuzzy Hash: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
    • Instruction Fuzzy Hash: D221D422A08A9240E3646B16E85137AF650FF8CBD4F851131DF3D87BD9EEBCD446A348
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateHeapfree
    • String ID:
    • API String ID: 2345683253-0
    • Opcode ID: f3c853349a5c59fd3449079867ad891792ce2dd8b9137124cb1d366ba339df00
    • Instruction ID: 3039bd34787fc9b617b2b406c23a6fd0aa885d781df2a5faca1fb6a4d1840c2d
    • Opcode Fuzzy Hash: f3c853349a5c59fd3449079867ad891792ce2dd8b9137124cb1d366ba339df00
    • Instruction Fuzzy Hash: CF111BB25217608AEB54CF69E48031D77F8F788F48F25511AEB4997B18CB78C492CB84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateHeapfree
    • String ID:
    • API String ID: 2345683253-0
    • Opcode ID: d06350443261b5c44dc0382cd6166cd32f98e0a7bcc8923f0c5a309339592e20
    • Instruction ID: f9442018347a61d2dc4719f860d55fd96af13d8d9e9327c41b6ddcfda4d1090c
    • Opcode Fuzzy Hash: d06350443261b5c44dc0382cd6166cd32f98e0a7bcc8923f0c5a309339592e20
    • Instruction Fuzzy Hash: FE119EB292576086E740DF24E480219B7F8FB48F48F64403AEB6957798CF78D482DB88
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: SleepTimetime
    • String ID:
    • API String ID: 346578373-0
    • Opcode ID: a0bf3c937420c0917f34046eef8d55b82e3cbf61d4d324ed7221063299da0014
    • Instruction ID: aa92e0f732966ba41fb040104e8f30f883fea044cbd712aee4400a8d09667eac
    • Opcode Fuzzy Hash: a0bf3c937420c0917f34046eef8d55b82e3cbf61d4d324ed7221063299da0014
    • Instruction Fuzzy Hash: AC01A232718684C7E7288B74E28833D7361F7C4B89F145265DB5B03A94CFB8C1A5C745
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: SleepTimetime
    • String ID:
    • API String ID: 346578373-0
    • Opcode ID: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
    • Instruction ID: 4f8d83e790dbe0505d4e8c9c37960858946940d1694da8c2e449d45ec669defb
    • Opcode Fuzzy Hash: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
    • Instruction Fuzzy Hash: 9601B522B1864187E7685B24D18833CE660FF48B94F444234C77E07AD4CF7CD4A8D798
    APIs
      • Part of subcall function 02C5DF0C: GetLastError.KERNEL32 ref: 02C5DF16
      • Part of subcall function 02C5DF0C: FlsGetValue.KERNEL32 ref: 02C5DF24
      • Part of subcall function 02C5DF0C: FlsSetValue.KERNEL32 ref: 02C5DF50
      • Part of subcall function 02C5DF0C: GetCurrentThreadId.KERNEL32 ref: 02C5DF64
      • Part of subcall function 02C5DF0C: SetLastError.KERNEL32 ref: 02C5DF7C
    • ExitThread.KERNEL32 ref: 02C556B8
    • _getptd.LIBCMT ref: 02C556C4
      • Part of subcall function 02C5E0E8: FlsGetValue.KERNEL32 ref: 02C5E101
      • Part of subcall function 02C5E0E8: FlsSetValue.KERNEL32 ref: 02C5E112
      • Part of subcall function 02C5E0E8: _freefls.LIBCMT ref: 02C5E11B
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Value$ErrorLastThread$CurrentExit_freefls_getptd
    • String ID:
    • API String ID: 3588098115-0
    • Opcode ID: 69fd6f60cbd72f61ca7718c2e2a29e064edf9474930f3cd69f06ff0a27feda29
    • Instruction ID: 852f1b7712578fe4de5cbc400faf793876fe0d69b99410f2488701e23a6c08e0
    • Opcode Fuzzy Hash: 69fd6f60cbd72f61ca7718c2e2a29e064edf9474930f3cd69f06ff0a27feda29
    • Instruction Fuzzy Hash: BFE0EC10F0239442DE1CB7B1589972C03A2ABD9B44F5858788E0B57741EE39C8D99B08
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateObjectSingleThreadWait
    • String ID:
    • API String ID: 1891408510-0
    • Opcode ID: 91d2d110985bb54daf9c0b435a0f1d873197dfe1a6e7d7fc0f20f16f28882229
    • Instruction ID: 652736ddb5858705cc52b3d441dc603472992ea94c1757d1ef7a4568d50f74ae
    • Opcode Fuzzy Hash: 91d2d110985bb54daf9c0b435a0f1d873197dfe1a6e7d7fc0f20f16f28882229
    • Instruction Fuzzy Hash: 15E01271D14E5081FB609B65BC0D7A92391F794354FA44229945E86760EF7C81858604
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 26e2137525513526dd013d54ad7f142b8e6e46a3c1df15383bd1b51481be757a
    • Instruction ID: e6c12b10c22b05d92e0c9452536b565eecbb04bf32591194b63a2955a5901111
    • Opcode Fuzzy Hash: 26e2137525513526dd013d54ad7f142b8e6e46a3c1df15383bd1b51481be757a
    • Instruction Fuzzy Hash: 2E413832B04A8586DB09EB29E410569F395FF88BC8F448538EE2E83798DF38C545E790
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 530910900c37fe9613c3ff3dda4de058dcfccbb59fe36364dc77c55757d465c3
    • Instruction ID: f3b0ef5fa7facc1e92d1d3d46b90a3c913b95796b6fe7315934c2f78fd0e1512
    • Opcode Fuzzy Hash: 530910900c37fe9613c3ff3dda4de058dcfccbb59fe36364dc77c55757d465c3
    • Instruction Fuzzy Hash: B5219932714A5087D755CF2AF54471E73A1F789B80F588525DB5A93B04EF74D8E2CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: 95b57b51fc333e6316162f6326f5110e0a83f6deb2dcaf3171337f97a5765aa6
    • Instruction ID: 3a9cea7acb787d46da92e8fe3567acac98b81a8e6c489bf8a975296f6f5615d0
    • Opcode Fuzzy Hash: 95b57b51fc333e6316162f6326f5110e0a83f6deb2dcaf3171337f97a5765aa6
    • Instruction Fuzzy Hash: 9F21FB32B14A4187DB45DB69E140219F3A0FB4CB80F544531EB6ED3748EF38D8D19784
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID:
    • API String ID: 2087232378-0
    • Opcode ID: e37b62da0ecbe8d6c4feb3876bb8c88a6cb38d412b61bd74b990c88d492ffce2
    • Instruction ID: e2016a09ce3c21ba644840193f908035d6102fd1c23beb47e64d3d8b27f6d906
    • Opcode Fuzzy Hash: e37b62da0ecbe8d6c4feb3876bb8c88a6cb38d412b61bd74b990c88d492ffce2
    • Instruction Fuzzy Hash: 2B11A731724B8486D759CF36F54471AF3A5EB84BC4F189125DA8A93B18EF38C9D1CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Startup
    • String ID:
    • API String ID: 724789610-0
    • Opcode ID: 69ce0e59409c3ed63e01fee79cb91035653ccaefa39d6bbe4741f0a49fc59aaf
    • Instruction ID: b8bb1764d0555347eb0258f71e1e84848773130226cbd782ba7ee11e30160afa
    • Opcode Fuzzy Hash: 69ce0e59409c3ed63e01fee79cb91035653ccaefa39d6bbe4741f0a49fc59aaf
    • Instruction Fuzzy Hash: 26F03A35A14A86DAEB00EF24D8550A8F3A4FB4C304FC48431E9AE47799DE3CE1149B54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExitThread_amsg_exit_getptd
    • String ID:
    • API String ID: 449628364-0
    • Opcode ID: 556d5509b120e02cdcca8f06fb680f1e7bbffed6d54eb6d90fa9cde67232f795
    • Instruction ID: 0f047080506480a1a018ab91a26821c5d1389aae57a865d87505731140c5d942
    • Opcode Fuzzy Hash: 556d5509b120e02cdcca8f06fb680f1e7bbffed6d54eb6d90fa9cde67232f795
    • Instruction Fuzzy Hash: B8C01211F4714182DF087371846B6BC9251DFD9704F849070E13D433C7CD1D545EA258
    APIs
      • Part of subcall function 00007FF7F8DFB9B0: GetLastError.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9BA
      • Part of subcall function 00007FF7F8DFB9B0: FlsGetValue.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9C8
      • Part of subcall function 00007FF7F8DFB9B0: FlsSetValue.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9F4
      • Part of subcall function 00007FF7F8DFB9B0: GetCurrentThreadId.KERNEL32 ref: 00007FF7F8DFBA08
      • Part of subcall function 00007FF7F8DFB9B0: SetLastError.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFBA20
    • ExitThread.KERNEL32 ref: 00007FF7F8DF9428
      • Part of subcall function 00007FF7F8DFBB8C: FlsGetValue.KERNEL32(?,?,?,00007FF7F8DF9426), ref: 00007FF7F8DFBBA5
      • Part of subcall function 00007FF7F8DFBB8C: FlsSetValue.KERNEL32(?,?,?,00007FF7F8DF9426), ref: 00007FF7F8DFBBB6
      • Part of subcall function 00007FF7F8DFBB8C: _freefls.LIBCMT ref: 00007FF7F8DFBBBF
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Value$ErrorLastThread$CurrentExit_freefls
    • String ID:
    • API String ID: 1216290073-0
    • Opcode ID: c93bf5a72a887f659e3f866e1ba6ff3216b61a395110430233b074b26d48111d
    • Instruction ID: 1ccdd86d67293db53b8c50f7db7705c98286406b9ad6a213ddae3181ccf88c8a
    • Opcode Fuzzy Hash: c93bf5a72a887f659e3f866e1ba6ff3216b61a395110430233b074b26d48111d
    • Instruction Fuzzy Hash: 3BC00250F1A60642EF1877B12959078D2501F5D701F885838997E063DAED3CA44976A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process$AddressLibraryLoadProc$AllocCreateCurrentDirectoryFileMemoryModuleNameOpenSystemVirtualWrite
    • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
    • API String ID: 675209239-4110464286
    • Opcode ID: 0a9a7cb759e9cd70e4e7ad241d6db3e1b1dac7647f357b7e36e456aaf75e7cd7
    • Instruction ID: efea0fda83e05a4912fd08c3eeb5a7986b7dcb6ef67b6ccf225eff7954523107
    • Opcode Fuzzy Hash: 0a9a7cb759e9cd70e4e7ad241d6db3e1b1dac7647f357b7e36e456aaf75e7cd7
    • Instruction Fuzzy Hash: 08913B31214B9186FB24DF62F818B9E77A5F789B88F804119DE4A07B58DF7DC249CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlenwsprintf$ClipboardGlobal$CountTick$CloseDataLockOpenSizeSleepStateUnlock
    • String ID: [$%s%s$%s%s$%s%s$)$)$5$5$9$[esc]$f
    • API String ID: 4137050888-2084089848
    • Opcode ID: 1b461a56441360ce845689485ed66bb0008adf4a0547f8c3c9596193dca8de7b
    • Instruction ID: bd0fa51ef6c8093b44c1a50bc94e3f95302d9fd5f39941aa0e42d2a9fee44ccf
    • Opcode Fuzzy Hash: 1b461a56441360ce845689485ed66bb0008adf4a0547f8c3c9596193dca8de7b
    • Instruction Fuzzy Hash: 6091BD31200B9196FB14CF21EC4CBAE33A9F784B88F548029DE4A57B64DF78C685CB85
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: 933f7ccd4e57a0c3640cd29298bfcbe6b8f7dd673e4b2ab9a2227a01ddb3188f
    • Instruction ID: e05b40b0eb2c3cab6e31735b28c21813af9cf8ceaff3fdea0311bc90c684b685
    • Opcode Fuzzy Hash: 933f7ccd4e57a0c3640cd29298bfcbe6b8f7dd673e4b2ab9a2227a01ddb3188f
    • Instruction Fuzzy Hash: 0C02D132614AC186EB208F25E88C77EB761F7C4B98F55412ADE8A47B58DF3DC14ACB11
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: 059fcb8d0d384e491ef6770d9f73524f45f969136b4973030bd1143b1e84cbf4
    • Instruction ID: 0f937c6f2906f0d8086753d0e88d45bbd258bfbb65a0e4197c34c0a86766c69b
    • Opcode Fuzzy Hash: 059fcb8d0d384e491ef6770d9f73524f45f969136b4973030bd1143b1e84cbf4
    • Instruction Fuzzy Hash: 5112F462A0864286EB20AF25D444379E3A1FFC8754F940135DA7E4B7D8DF3CE449E7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: d243f7bfa6fd055a53a23daff3e65f4d6fa7b73664807df99c45da9877ccf527
    • Instruction ID: ce4daeba76f8ad3cc6968a131a3490cee12cbecd366da999bb7005bc9fae9910
    • Opcode Fuzzy Hash: d243f7bfa6fd055a53a23daff3e65f4d6fa7b73664807df99c45da9877ccf527
    • Instruction Fuzzy Hash: 2552F662D0C66285FB24AB15A44027DEAA0BF497C4F944035DA7D476DCCF3CE868F7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: ec179a5fd378d13b2d58a736491d49f451d9c3920d36331e28fa716487c53895
    • Instruction ID: 352b92e6a7dffc8ca350ee2135834c05e669515515a3d9a87a6062c36b1b4cdf
    • Opcode Fuzzy Hash: ec179a5fd378d13b2d58a736491d49f451d9c3920d36331e28fa716487c53895
    • Instruction Fuzzy Hash: 5A421572618AA086EB2D8F29D54436E6B61F7C779CF24101EDF4A47E64DB38C6C1CB09
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: 777b2bbc50e84923bb68a82086348877efee093c21b5f3dd8466455b5af6995b
    • Instruction ID: 95c632886a1aa090647f6a81f1645b7f43225c82730dfa4cfa0eb00fa174ca97
    • Opcode Fuzzy Hash: 777b2bbc50e84923bb68a82086348877efee093c21b5f3dd8466455b5af6995b
    • Instruction Fuzzy Hash: 5A422572218BB086EB25CB29D54436E6B71FBC5788F185007DE4747AA8DB79C7C2CB48
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
    • String ID: $@
    • API String ID: 1084558760-1077428164
    • Opcode ID: 658b0638e96a2018847d66b84efea279705a0a6da686782ae5e0afd207c87506
    • Instruction ID: 132ccf5b5cab6b989436577801e528955e672b92ecd61a503b8c27ac8a391598
    • Opcode Fuzzy Hash: 658b0638e96a2018847d66b84efea279705a0a6da686782ae5e0afd207c87506
    • Instruction Fuzzy Hash: 0252F762E0D65286FB24AB14954037EE6A0BF49748F940035DA7D476DCCF3DE848F7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
    • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
    • API String ID: 2977986460-1099148085
    • Opcode ID: 3bed2e3fed1dd97c3597bc5c297f86b790980d851acd740cd57b361686804748
    • Instruction ID: 2b4476638d6cc315e7533a0a3ffb5c9036752fd725a5d749d5d3aa17dadd72d5
    • Opcode Fuzzy Hash: 3bed2e3fed1dd97c3597bc5c297f86b790980d851acd740cd57b361686804748
    • Instruction Fuzzy Hash: 6B417122209A9182FA249B52F958B6FB3B1F789BE5F445215DE4A07B64DF3CC146CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Locale$Info$Valid$CodeDefaultPageUser_amsg_exit_getptd_itow_s
    • String ID: ACP$Norwegian-Nynorsk$OCP
    • API String ID: 1236750932-4064345498
    • Opcode ID: 1f16e3efabc551431a5c0578b677a8b35f1afe1a9ab028db14e8eca5c82f04ed
    • Instruction ID: fe37881df1917ff48ec365da920c51b57b3ae93b2d3b87ef1d86e64d59459dce
    • Opcode Fuzzy Hash: 1f16e3efabc551431a5c0578b677a8b35f1afe1a9ab028db14e8eca5c82f04ed
    • Instruction Fuzzy Hash: 8A71AE7230478186EB259F22E48C7BD7769FB84B88F284026CE4E47A98DF7CC645CB11
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeStateTickWaitlstrcat
    • String ID: <$\DisplaySessionContainers.log
    • API String ID: 1095970075-1170057892
    • Opcode ID: a7707feeb2605cd531d5f7e39eeb4ae4399d5209c77fcb40601b151f21c5fa34
    • Instruction ID: 5fdf3ce613260fd59d3c8c564ce1c7f77135015ec2fb1287aa6211a85bd933da
    • Opcode Fuzzy Hash: a7707feeb2605cd531d5f7e39eeb4ae4399d5209c77fcb40601b151f21c5fa34
    • Instruction Fuzzy Hash: 8E512776204A8586FB108F66F85CB5E3765FB88B89F948029DE4E47B25CF7DD089CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
    • String ID: $"%1$%s\shell\open\command$WinSta0\Default$h
    • API String ID: 1783372451-2159495357
    • Opcode ID: 753f1e88c2c9bcdca436a99e464efae067fe74ee41da2aa91f75f24b88240b9b
    • Instruction ID: faa2874844b147baedd5aeb34f2047cb1fe9b1aa6b435b899210a2161352825d
    • Opcode Fuzzy Hash: 753f1e88c2c9bcdca436a99e464efae067fe74ee41da2aa91f75f24b88240b9b
    • Instruction Fuzzy Hash: D4517172314A9595FB20DF65E854BEE7365FB88788F804019CE0E47E68EF78C249CB14
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno_invalid_parameter_noinfo
    • String ID: U
    • API String ID: 3902385426-4171548499
    • Opcode ID: c9aa7ff1a95c4116b5dadac855f6185198e8c2debe563feb1bdbf6b2915f54c6
    • Instruction ID: a5f5b088f9ec21756a687b4f1f32a1022fd79c8c9f5d2760e25ec0a81ea87d76
    • Opcode Fuzzy Hash: c9aa7ff1a95c4116b5dadac855f6185198e8c2debe563feb1bdbf6b2915f54c6
    • Instruction Fuzzy Hash: 1B220731118A598BD729EF68C8857BAB7E1FB85704F94069DECC7C3291DB34E442CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DecodePointerwrite_multi_char$_errno_invalid_parameter_noinfo$_getptdfreewrite_char
    • String ID:
    • API String ID: 3562693915-0
    • Opcode ID: e017b06b56cf3657e822e1d9cdd52de123d41ff819c9629cd0d88fe18efbce1b
    • Instruction ID: d06f051bc6d291d8642c4dbac7c7a709922de6311af726a51dbe37765d7d4661
    • Opcode Fuzzy Hash: e017b06b56cf3657e822e1d9cdd52de123d41ff819c9629cd0d88fe18efbce1b
    • Instruction Fuzzy Hash: FF4202766086808ADB248B66D4C837E7BB1F7C179AF1C4126DF4E87B94DBB9C641CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Close$OpenQueryValuelstrcpy
    • String ID: %08X
    • API String ID: 2032971926-3773563069
    • Opcode ID: 0207c94b67bd13682df5198da5d4066036a53627cf85588037e8996df98b4a62
    • Instruction ID: 05d0b7c78e4f28cb0c666dff399c2ea3d7a136a2069cd52284896bee63bc3cc2
    • Opcode Fuzzy Hash: 0207c94b67bd13682df5198da5d4066036a53627cf85588037e8996df98b4a62
    • Instruction Fuzzy Hash: 6C513F72218A8092EB60CF16F48875BB361FBD5794F90512AEA9E87E68DF38C145CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
    • String ID: %s%s$@$Windows\System32\svchost.exe$h
    • API String ID: 4033188109-2160973000
    • Opcode ID: f34bcb2dd40bef71e100a131e5ce0c990cbd285b2e4561fe4d7e6fc0a56b66df
    • Instruction ID: 938576669cc8797bfa815aac75f60ce95714f950bf030c45e1bfc9329e66a9c6
    • Opcode Fuzzy Hash: f34bcb2dd40bef71e100a131e5ce0c990cbd285b2e4561fe4d7e6fc0a56b66df
    • Instruction Fuzzy Hash: F3416B72204BC186EB20CF62E854B9FB7A5F788788F445019DB8E57A68DF7DC259CB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
    • String ID: %s%s$@$Windows\System32\tracerpt.exe$h
    • API String ID: 4033188109-528786837
    • Opcode ID: ccbe77caa5910820af2e6a65459cec20809b89b451be36ee65506754dcdfb72f
    • Instruction ID: 805fe2acf89786bb2edbb4e0d8fb91d85721e2228f507646e0a52b80c1f29d41
    • Opcode Fuzzy Hash: ccbe77caa5910820af2e6a65459cec20809b89b451be36ee65506754dcdfb72f
    • Instruction Fuzzy Hash: DE419232608A8285E720DF11F8407AAF365FF88B84F844035DAAD47A99DF3CD518DB54
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process$HandleOpenToken$AddressAdjustCloseCurrentLookupModulePrivilegePrivilegesProcValue
    • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
    • API String ID: 2787840106-1577477132
    • Opcode ID: 006c88d0e4742fc9033daaec659e694211f69195633ac62cbb13f472629f2bb1
    • Instruction ID: f6b35964fb141e2339972424ecf430663a67af64918529af751547747249468f
    • Opcode Fuzzy Hash: 006c88d0e4742fc9033daaec659e694211f69195633ac62cbb13f472629f2bb1
    • Instruction Fuzzy Hash: 9C213E72219A4582FB14DB61F81C79E77A0FBC9B58F801119DA4E47B14EF7CC18ACB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CreateEvent$CountCriticalInitializeSectionSpinTimetime
    • String ID: <$<
    • API String ID: 4111701721-213342407
    • Opcode ID: 048dc3425349f8fc4623e606ca67483624ffdc734d22f1d365165c3f50b062b1
    • Instruction ID: a8ad8148a5d0fbacb81837a6405d1d11e031afd76108a170731348066be83a62
    • Opcode Fuzzy Hash: 048dc3425349f8fc4623e606ca67483624ffdc734d22f1d365165c3f50b062b1
    • Instruction Fuzzy Hash: 6E817B72212B9186E7589F30E85879E37A9F344F4CF18423EDE598BB98CF788191CB54
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $ceil
    • API String ID: 2183313154-2708072404
    • Opcode ID: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
    • Instruction ID: 082ab25898ac3aa3717d27b0311da1325dfa80c9745edf15a470f4d1830a93ec
    • Opcode Fuzzy Hash: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
    • Instruction Fuzzy Hash: D651E821B0864241FB28FB2564166BAE251EF8D788FC40531EE7D42BC9CF3CE109B698
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DecodePointerwrite_multi_char$_errno$_getptd_invalid_parameter_noinfofreewrite_char
    • String ID:
    • API String ID: 1806013980-0
    • Opcode ID: 1552cd673f4c9009c00e4e5aebb7c2d1653934e03051cbe30d545ed572ffd0fa
    • Instruction ID: 59bcbf3be55cd8a5602d9d9a0d2be5298247a839e0fda44ac720e67b5e3a5178
    • Opcode Fuzzy Hash: 1552cd673f4c9009c00e4e5aebb7c2d1653934e03051cbe30d545ed572ffd0fa
    • Instruction Fuzzy Hash: 3E4214B2608BA086EB248F65D44036E77B1F7C1798F541016DF4B97B98DB78C6C1CB48
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: File_set_error_mode$HandleModuleNameWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 1085760375-4022980321
    • Opcode ID: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
    • Instruction ID: 7a33043928d038ea8c728bfe03ff58daa414a507fa09c1d629bb19d7fe688c10
    • Opcode Fuzzy Hash: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
    • Instruction Fuzzy Hash: CB51F3353047A086EB24DB26B828BAF6356FBC57C4F944116DE5A43B54DF3CC385CA08
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1457502553-0
    • Opcode ID: bf35303e10df82c9ff8321bc2ee6641708b0343ee9c83fc063de617ffaa70a58
    • Instruction ID: 385a623344ebd0380d16618e15ce9d5a837cc153f463b215e30daf07167adb47
    • Opcode Fuzzy Hash: bf35303e10df82c9ff8321bc2ee6641708b0343ee9c83fc063de617ffaa70a58
    • Instruction Fuzzy Hash: CFA1C531724A094BDB6DAF38C8D93B57AD6FB54305B8485BFEC06CA6A5EF74C4818B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1457502553-0
    • Opcode ID: fc98137501184263b1711a368e79b6b7fedf990296f419f9690ea9b2a4686320
    • Instruction ID: f05503d5ecde0a668b8b2f0b1548cfe0cc7e5e11cf9547c68608387d68b19bdf
    • Opcode Fuzzy Hash: fc98137501184263b1711a368e79b6b7fedf990296f419f9690ea9b2a4686320
    • Instruction Fuzzy Hash: 3781E4B27007598BDB289F75C8557A963A6EB947C8F448136DF0A8BB48EB39D181CB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
    • String ID: SeShutdownPrivilege
    • API String ID: 3435690185-3733053543
    • Opcode ID: 3b408c9696417f386299ba55a60d1e887952e7de7df739ea596fa54433349fd8
    • Instruction ID: b1cd5f861efc0d87b3f1b4891d10f3942150b8070b6a5c0cd679a801f2b8cc6d
    • Opcode Fuzzy Hash: 3b408c9696417f386299ba55a60d1e887952e7de7df739ea596fa54433349fd8
    • Instruction Fuzzy Hash: 75114F72628A4082F7509F25F85D75E77A0FBC8B95F805419EA8F97A24DF3CC195CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
    • String ID: gfffffff
    • API String ID: 1282097019-1523873471
    • Opcode ID: 2ccce6238921ff669830667409cdcc1f0cb7341e5ebed707410b45c5fc83ee90
    • Instruction ID: f8e308bd2f287ef1ca9ad28ed622702bfac36c069cf77f8142378fc51c32c5f8
    • Opcode Fuzzy Hash: 2ccce6238921ff669830667409cdcc1f0cb7341e5ebed707410b45c5fc83ee90
    • Instruction Fuzzy Hash: 5AA142637047C48ADB01CB2AC6883BD7BA5E751BE8F04C622CF5A0B799EB39D165C311
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
    • String ID: gfffffff
    • API String ID: 1282097019-1523873471
    • Opcode ID: c07b627f99c2cd4ae9dd9b17e96f21b7b9fb9e47b31fd93882c95997571751ba
    • Instruction ID: 96b99a24b9d3bfb6519982869f8c7d05a6a3a2d4fcf2ba6917e1591684b5e912
    • Opcode Fuzzy Hash: c07b627f99c2cd4ae9dd9b17e96f21b7b9fb9e47b31fd93882c95997571751ba
    • Instruction Fuzzy Hash: C2B17563F0838646EB029B3595443ADEFE5AB11794F488932CF7E077D6DA3CA414E3A4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID: ceil
    • API String ID: 1239891234-3069211559
    • Opcode ID: 3144257c3ae2fa2d6dbd42b967809008da2bff6455cce039acfe86bdf2b0df6d
    • Instruction ID: 92cabb05573b07975ad4d96cedabfe6ce0bc70fc3a161d1ce7adcac2ff214c36
    • Opcode Fuzzy Hash: 3144257c3ae2fa2d6dbd42b967809008da2bff6455cce039acfe86bdf2b0df6d
    • Instruction Fuzzy Hash: 7E318332608F8286DB24DB25E8406AEF3A0FB88758F900135EABD47B99DF38D545DB54
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: MemoryProcessVirtualWrite$AllocCreateFreeObjectRemoteSingleThreadWait
    • String ID: @
    • API String ID: 1392168757-2766056989
    • Opcode ID: ebdf221f38e794e2455333eaf63dd99797fa0bae23e01971042895992485c932
    • Instruction ID: 821fec044f362f7bed7beea6b815e8be3a28b538d4e492857decb319a585f4c3
    • Opcode Fuzzy Hash: ebdf221f38e794e2455333eaf63dd99797fa0bae23e01971042895992485c932
    • Instruction Fuzzy Hash: 0A312932208B8486EB60CB26F918B5AB7A4F789BD4F545229EACD43F58DF3CC111CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
    • String ID: SeDebugPrivilege
    • API String ID: 3398352648-2896544425
    • Opcode ID: 4520cdda6bbee7e720759b10c361dc6be193f20f51fac45c03cbca138d1582c9
    • Instruction ID: d91180d087df36c1dbbcc4691afb7ba6c8b4ba695340ca355b3e732698fb509c
    • Opcode Fuzzy Hash: 4520cdda6bbee7e720759b10c361dc6be193f20f51fac45c03cbca138d1582c9
    • Instruction Fuzzy Hash: EA011B72218B4682FB108F25F848B5E77B0F788B98F801019EA8F43A24DF7CC159CB40
    APIs
    • RtlCaptureContext.KERNEL32 ref: 02C5B7BF
    • RtlLookupFunctionEntry.KERNEL32 ref: 02C5B7DE
    • RtlVirtualUnwind.KERNEL32 ref: 02C5B82A
    • IsDebuggerPresent.KERNEL32 ref: 02C5B89C
    • SetUnhandledExceptionFilter.KERNEL32 ref: 02C5B8B4
    • UnhandledExceptionFilter.KERNEL32 ref: 02C5B8C1
    • GetCurrentProcess.KERNEL32 ref: 02C5B8DA
    • TerminateProcess.KERNEL32 ref: 02C5B8E8
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
    • String ID:
    • API String ID: 3778485334-0
    • Opcode ID: 1c94f059e661cec249e69166cae7fc2ba1f8093385c11fe141dccac600b505b7
    • Instruction ID: d79d7fe8cc5779df0851d4a1ff21d8bfd264e2d53b40695013e12e4d61d8d818
    • Opcode Fuzzy Hash: 1c94f059e661cec249e69166cae7fc2ba1f8093385c11fe141dccac600b505b7
    • Instruction Fuzzy Hash: 09311535109B8586FB64DF51F888B5E77A4FB85794F50802ADA8E43B68EF7CC594CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
    • String ID:
    • API String ID: 3778485334-0
    • Opcode ID: a174535eb0d5241deb48ece9e46a2be905d6ec3f467502f47f0e199c436921ae
    • Instruction ID: 541ed207c9e271295a393dd127e2b6261475bc5266488dba328e6d5ac24ffbd4
    • Opcode Fuzzy Hash: a174535eb0d5241deb48ece9e46a2be905d6ec3f467502f47f0e199c436921ae
    • Instruction Fuzzy Hash: 5E31FC35A08F4695EB50AB11F84436AF3A4FF48754F900435E9AE427E9DF7CE044E7A8
    APIs
    • _lock.LIBCMT ref: 02B0FA90
    • _get_daylight.LIBCMT ref: 02B0FAA6
      • Part of subcall function 02B10801: _errno.LIBCMT ref: 02B1080A
      • Part of subcall function 02B10801: _invalid_parameter_noinfo.LIBCMT ref: 02B10815
    • _get_daylight.LIBCMT ref: 02B0FABB
      • Part of subcall function 02B107A1: _errno.LIBCMT ref: 02B107AA
      • Part of subcall function 02B107A1: _invalid_parameter_noinfo.LIBCMT ref: 02B107B5
    • _get_daylight.LIBCMT ref: 02B0FAD0
      • Part of subcall function 02B107D1: _errno.LIBCMT ref: 02B107DA
      • Part of subcall function 02B107D1: _invalid_parameter_noinfo.LIBCMT ref: 02B107E5
    • ___lc_codepage_func.LIBCMT ref: 02B0FADD
      • Part of subcall function 02B0A241: _getptd.LIBCMT ref: 02B0A245
      • Part of subcall function 02B170F1: __wtomb_environ.LIBCMT ref: 02B17121
    • free.LIBCMT ref: 02B0FB4E
      • Part of subcall function 02B04D51: _errno.LIBCMT ref: 02B04D71
    • free.LIBCMT ref: 02B0FBB7
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_get_daylight_invalid_parameter_noinfo$free$___lc_codepage_func__wtomb_environ_getptd_lock
    • String ID:
    • API String ID: 4268574505-0
    • Opcode ID: 7159bc568df38b9c3179c3a6b8ecde503eabb8b4a7846a162cf2957cd589cd5c
    • Instruction ID: bc6453b8c167a81e3b0ec084be84bf0c82d0c50a09556d98e9427a6e8d14f906
    • Opcode Fuzzy Hash: 7159bc568df38b9c3179c3a6b8ecde503eabb8b4a7846a162cf2957cd589cd5c
    • Instruction Fuzzy Hash: C5C1C5307187444FD73AEF28D89137ABBD6FB89714F5456AE98CBC3691DF3094028A86
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocalefree$ErrorLastSleep
    • String ID:
    • API String ID: 3746651342-0
    • Opcode ID: f411498c33e338e04b103db1a04ef947ba4a4d6889c3b4acdbdfe8f2a9a6c589
    • Instruction ID: 306a11e595276f7cdce4ccdc4954e6fabd62c6f96669557dae22c90b357ccb57
    • Opcode Fuzzy Hash: f411498c33e338e04b103db1a04ef947ba4a4d6889c3b4acdbdfe8f2a9a6c589
    • Instruction Fuzzy Hash: 96412A2271176942E7349B23A914B3B62D5BBC8BCCF405125CE4947F49EF3DC645CB49
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Event$ClearCloseOpen
    • String ID: Application$Security$System
    • API String ID: 1391105993-2169399579
    • Opcode ID: 3bc1dfbc75c3ebd05fd2da803e87ea6cab878e66fd4d64df736414c5c99f1579
    • Instruction ID: 3a2ef120ed91aacea7fe57314111757fcba6e362f9e1c52d4d80a94f5c97cf85
    • Opcode Fuzzy Hash: 3bc1dfbc75c3ebd05fd2da803e87ea6cab878e66fd4d64df736414c5c99f1579
    • Instruction Fuzzy Hash: 6DF0FF3660AB40C5EB25DB25F84879973A8FB48759F45913ACD5E03B24EE38C155D740
    APIs
    • RtlCaptureContext.KERNEL32 ref: 02C5C231
    • RtlLookupFunctionEntry.KERNEL32 ref: 02C5C249
    • RtlVirtualUnwind.KERNEL32 ref: 02C5C283
    • IsDebuggerPresent.KERNEL32 ref: 02C5C2B9
    • SetUnhandledExceptionFilter.KERNEL32 ref: 02C5C2C3
    • UnhandledExceptionFilter.KERNEL32 ref: 02C5C2CE
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
    • String ID:
    • API String ID: 1239891234-0
    • Opcode ID: 3d258a40fe85b90a637c04ac03ec31110b46b64e3441f59e6290187bd834b7bf
    • Instruction ID: dd5c1f78a91a63a0df8ea5349821b8574de09e94aec749d16f5fa0b7f0ae349a
    • Opcode Fuzzy Hash: 3d258a40fe85b90a637c04ac03ec31110b46b64e3441f59e6290187bd834b7bf
    • Instruction Fuzzy Hash: 50313E32214F8186DB60CF65E8447AE73A5F7897A8F50022AEE9D47B58DF38C695CB04
    APIs
    • GetCurrentProcess.KERNEL32 ref: 02C48E13
    • OpenProcessToken.ADVAPI32 ref: 02C48E26
    • LookupPrivilegeValueW.ADVAPI32 ref: 02C48E55
    • AdjustTokenPrivileges.ADVAPI32 ref: 02C48E9A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
    • String ID: SeDebugPrivilege
    • API String ID: 2349140579-2896544425
    • Opcode ID: e89a9577fea48bf07b96b5dd8fdb992d40661bb12393655a7267710922112fa6
    • Instruction ID: b032fd7d4c3896377900c4980cd8d2f0cb041e54a8f5913e38c381a5dec7bbba
    • Opcode Fuzzy Hash: e89a9577fea48bf07b96b5dd8fdb992d40661bb12393655a7267710922112fa6
    • Instruction Fuzzy Hash: 8E111C76219B8182EB109F65F84978EB3A1F7C9B48F84101AEA8E47B18DF7DC159CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: 315d6375471e1a4f99404568f3a68aecd704ec3ded472f731a93e9d2a0cb6b08
    • Instruction ID: 0549a4c73453957a4043e326179febb6d1a082d37f6060bfa32330dce7cbb9f7
    • Opcode Fuzzy Hash: 315d6375471e1a4f99404568f3a68aecd704ec3ded472f731a93e9d2a0cb6b08
    • Instruction Fuzzy Hash: 2A91EF72310AD497CB19DF2AD154B2E77A6FB84B84B148529DE0A87B44EF34D5A1CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocFree$Timetime
    • String ID:
    • API String ID: 3637049079-0
    • Opcode ID: 84916634be90c530f7462dae8c686f5c956e195b309b681075306a52318ba857
    • Instruction ID: df2006b8fa10cb9387bb1cada17e2835c2fdf72413bee4ccb771b4da5670d3dd
    • Opcode Fuzzy Hash: 84916634be90c530f7462dae8c686f5c956e195b309b681075306a52318ba857
    • Instruction Fuzzy Hash: 9891F372310A949BCB1DCF2AD184B6E73A5F794BC4F848529DE0A87714EF34D9A1C780
    APIs
    • _getptd.LIBCMT ref: 02C65D77
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    • GetLocaleInfoA.KERNEL32 ref: 02C65DAC
    • GetLocaleInfoA.KERNEL32 ref: 02C65E04
    • GetLocaleInfoA.KERNEL32 ref: 02C65EF8
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocale$_amsg_exit_getptd
    • String ID:
    • API String ID: 3133215516-0
    • Opcode ID: f3123c2221976c618b7d76a248a557ec73608dd870584710d301b4c347307875
    • Instruction ID: 7bf1c826c4e23aaa6f29c365b116415ad51a41bbaf60e783c6365cefa95b5dd2
    • Opcode Fuzzy Hash: f3123c2221976c618b7d76a248a557ec73608dd870584710d301b4c347307875
    • Instruction Fuzzy Hash: 87618D72300AC1EBDB198B61DA9C7EDB3A1F7C8389F90412ADB1987644CB39E165CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocale$ByteCharMultiWidefree
    • String ID:
    • API String ID: 40707599-0
    • Opcode ID: 9d849a486a771a2ba975f60ce01952f084c2181aa9eeb1ca35fe4748fd4a6f39
    • Instruction ID: ba61ac81d5c51426258ccfe4ff08ebcd4c20157a07eeb1b27a795ae51b083a1d
    • Opcode Fuzzy Hash: 9d849a486a771a2ba975f60ce01952f084c2181aa9eeb1ca35fe4748fd4a6f39
    • Instruction Fuzzy Hash: DC318532600B8086DB108F26D888779B796F784BECF484A15EF5E47F94DB38C545CB10
    APIs
    • _getptd.LIBCMT ref: 02C5B0F5
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
      • Part of subcall function 02C5AE80: _getptd.LIBCMT ref: 02C5AEBA
      • Part of subcall function 02C5A7E0: malloc.LIBCMT ref: 02C5A80B
      • Part of subcall function 02C5A7E0: Sleep.KERNEL32 ref: 02C5A81E
    • free.LIBCMT ref: 02C5B352
    • free.LIBCMT ref: 02C5B389
    • free.LIBCMT ref: 02C5B396
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_getptd$Sleep_amsg_exitmalloc
    • String ID:
    • API String ID: 1310838139-0
    • Opcode ID: 82d67bd4074a8292135078b0dbf5279acc9a43100bda11809bbff80ac0b4c86f
    • Instruction ID: 062de8af8a7bbb92f588aed06e268487f18ef754585f6282fed044484cd27134
    • Opcode Fuzzy Hash: 82d67bd4074a8292135078b0dbf5279acc9a43100bda11809bbff80ac0b4c86f
    • Instruction Fuzzy Hash: 32910E32305B949ADB24DF26E58479EBBA1F788788F504126EF4E47B18EF38D581CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 0-2761157908
    • Opcode ID: e04492fe7783e9350fb6ad516c2b891bc40bfb42d811b819843ac43adcea1734
    • Instruction ID: e32da79011ef7945428703f649c953d98e09ffd3d48bce78e636a3717dac811a
    • Opcode Fuzzy Hash: e04492fe7783e9350fb6ad516c2b891bc40bfb42d811b819843ac43adcea1734
    • Instruction Fuzzy Hash: C562F877F183528BF7149FB48000BBDB7B1BB54348F804835DE2A57AD8DA38A915D7A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
    • API String ID: 0-2761157908
    • Opcode ID: 88125a201e65d8ed1bd1aa500e04f75a90837a246ad31d7ce44a8951280eefc8
    • Instruction ID: dd73a85ace16031b35fe249eb28d22b082f5d63c271f7035f53886f9aed63b97
    • Opcode Fuzzy Hash: 88125a201e65d8ed1bd1aa500e04f75a90837a246ad31d7ce44a8951280eefc8
    • Instruction Fuzzy Hash: 2652D077B246918FE724CFB5C098BBD37B2B79474CB40901ADE86A7A48E7348B15CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: a727305f7ab2d231e16c0c1e18c561513dfc79dc93774605cde997b43438ff15
    • Instruction ID: c6d50ed6b8d6eeebe2af0b73bc9811bbd044c4cbc8f89bc7a40c1e7c1ce083e4
    • Opcode Fuzzy Hash: a727305f7ab2d231e16c0c1e18c561513dfc79dc93774605cde997b43438ff15
    • Instruction Fuzzy Hash: 2C812971764D0A4FD70CAE2C8CAA2B436C6E7D831575896BFE847CF7A6E934D4828640
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 5302ddf32cfdaea319d3eae1ccb86372f1c86f96e15f9b218755445e13fbde08
    • Instruction ID: 83fc23048673dd5cb85552af54a4e50ba15497324f53df914199b33a9afa92b6
    • Opcode Fuzzy Hash: 5302ddf32cfdaea319d3eae1ccb86372f1c86f96e15f9b218755445e13fbde08
    • Instruction Fuzzy Hash: 20612BB2B1164A4BCF1C8F29D8557786256F7D8788F48D136EA0A8F794FB3CE6018740
    APIs
    • _fileno.LIBCMT ref: 02C6368A
      • Part of subcall function 02C62988: _errno.LIBCMT ref: 02C62991
      • Part of subcall function 02C62988: _invalid_parameter_noinfo.LIBCMT ref: 02C6299C
    • ReadFile.KERNEL32 ref: 02C63777
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: FileRead_errno_fileno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1416837532-0
    • Opcode ID: 309e42a65739554cb7027ffa9ae403e92d91995be6d779599bdefef1943cc8b0
    • Instruction ID: aeb3117b64582f2a11d3ecbacf9414613b015b6d9b897b32bc35e4ad500eb60e
    • Opcode Fuzzy Hash: 309e42a65739554cb7027ffa9ae403e92d91995be6d779599bdefef1943cc8b0
    • Instruction Fuzzy Hash: FD71E222705BC49AEB21CF25D5CC3B96BA1FB84FD8F48559ADE4A07B94DB39C182C700
    APIs
    • _getptd.LIBCMT ref: 02C66042
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    • GetLocaleInfoA.KERNEL32 ref: 02C66077
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocale_amsg_exit_getptd
    • String ID:
    • API String ID: 488165793-0
    • Opcode ID: 7a4bdbe237ab676890a3ead7a57c4d4f21b5585354efe19da6d086acf39470f5
    • Instruction ID: 6ee05e9805728315eda3412a3e35c0e198adb5569df9f8ab701aef4c8fff31d6
    • Opcode Fuzzy Hash: 7a4bdbe237ab676890a3ead7a57c4d4f21b5585354efe19da6d086acf39470f5
    • Instruction Fuzzy Hash: 33219432704AC197EB289B25E9997E9B3A5F7C8749F504126C71A87744DF3CD164CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: malloc
    • String ID: $gfff$gfff
    • API String ID: 2803490479-4202476792
    • Opcode ID: 257e01863ca11b1cadb907d1c4591d5c9f1f35a1bc80c96a1e8e6b6bf0ab3bac
    • Instruction ID: a34387c47cafccd26a0046582bf526bd1937711dfb515033c016fa9c92e960d1
    • Opcode Fuzzy Hash: 257e01863ca11b1cadb907d1c4591d5c9f1f35a1bc80c96a1e8e6b6bf0ab3bac
    • Instruction Fuzzy Hash: 3AD1B470A14B088FDB59EF78D48936DB7F2FF59305F50422AA54AE7251EF389842CB81
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: ae4538f1a2572c5f67e6bc6f8f9159affb98521cd537506b2088318c8aa4d645
    • Instruction ID: e53342e60cfc76ea99c5ac0eb7ce36c30e14389796d71f4ce69e8f47f0129196
    • Opcode Fuzzy Hash: ae4538f1a2572c5f67e6bc6f8f9159affb98521cd537506b2088318c8aa4d645
    • Instruction Fuzzy Hash: B722EF77B146458AEB288F6AD0D8BFC3762B79474CF84001ADE46B7B95D7398E46C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: 83054cf6376330cdffa8c0059fbe92ae39825d7729f5d374ebb6e6e75b54dafc
    • Instruction ID: 4bf210d02c0b31c4b74f9a3e23ff0629bf0a246981caac518c77fc5a92edc1b7
    • Opcode Fuzzy Hash: 83054cf6376330cdffa8c0059fbe92ae39825d7729f5d374ebb6e6e75b54dafc
    • Instruction Fuzzy Hash: 9232C872E0C2468AF7249F6488407BCE7A2BB10348FD44436CE7B776C5CA3DA945E799
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _get_daylight
    • String ID:
    • API String ID: 4143689357-0
    • Opcode ID: 65a60c61c288ee5ec1fa32ff6f7ce43a8cb756956cff9c9d544f6ad1e4491dfb
    • Instruction ID: 5172556f3bb5c4ff67451543397f9649933165f9f7dd631a823489ed1b992d2f
    • Opcode Fuzzy Hash: 65a60c61c288ee5ec1fa32ff6f7ce43a8cb756956cff9c9d544f6ad1e4491dfb
    • Instruction Fuzzy Hash: 8A917471B1460A4FC70CEE28DC926B577DAF399304B18C57EEC87CB695EA30E5428A81
    APIs
    • _set_error_mode.LIBCMT ref: 02B0B9F2
    • _set_error_mode.LIBCMT ref: 02B0BA03
      • Part of subcall function 02B059D9: _errno.LIBCMT ref: 02B059F8
      • Part of subcall function 02B059D9: _invalid_parameter_noinfo.LIBCMT ref: 02B05A04
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _set_error_mode$_errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1239817535-0
    • Opcode ID: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
    • Instruction ID: 7734e532db980d8d21edb9080666160c2ad84facbfbb2e528783c06168326a88
    • Opcode Fuzzy Hash: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
    • Instruction Fuzzy Hash: 0C51F631718A0C4BD72EFF28A89526A77D6FB98308B5086AED49BC31D5DF34C5068B46
    APIs
    • _get_daylight.LIBCMT ref: 02C60686
      • Part of subcall function 02C60D00: _errno.LIBCMT ref: 02C60D09
      • Part of subcall function 02C60D00: _invalid_parameter_noinfo.LIBCMT ref: 02C60D14
    • _get_daylight.LIBCMT ref: 02C6070C
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _get_daylight$_errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 3559991230-0
    • Opcode ID: 52ea9ba5fbf5ede55e2a5c23ec7a03d404610338de9f7afb62735d1d5f3e1368
    • Instruction ID: 924339f7b5183eae3345b2c32b9808fbe6ca00f1199ed93cbb39c31a50804c03
    • Opcode Fuzzy Hash: 52ea9ba5fbf5ede55e2a5c23ec7a03d404610338de9f7afb62735d1d5f3e1368
    • Instruction Fuzzy Hash: 6E813672B146544BD31CCF29ED99BB86756F3D8344F449136EE069BB94EB38E600CB40
    APIs
    • _getptd.LIBCMT ref: 02C65BFF
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    • GetLocaleInfoA.KERNEL32 ref: 02C65C34
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocale_amsg_exit_getptd
    • String ID:
    • API String ID: 488165793-0
    • Opcode ID: a79cb05d7a59cd07edb9214c990442f87c4db8d832ef21515e078df8ae412a83
    • Instruction ID: 4ba6ddbda5fc13f40fdc8d37a28808259720220cca06122d184a972983ee07c9
    • Opcode Fuzzy Hash: a79cb05d7a59cd07edb9214c990442f87c4db8d832ef21515e078df8ae412a83
    • Instruction Fuzzy Hash: 1511D072300B8196DB28CF25E8897EE73A2F7CCB88F944126DA5E87714DB38D565CB00
    APIs
      • Part of subcall function 02C48BE0: GetModuleFileNameW.KERNEL32 ref: 02C48C0B
      • Part of subcall function 02C48BE0: GetCommandLineW.KERNEL32 ref: 02C48C11
      • Part of subcall function 02C48BE0: GetStartupInfoW.KERNEL32 ref: 02C48C1F
      • Part of subcall function 02C48BE0: CreateProcessW.KERNEL32 ref: 02C48C62
      • Part of subcall function 02C48BE0: ExitProcess.KERNEL32 ref: 02C48C6B
    • ExitProcess.KERNEL32 ref: 02C4E09F
      • Part of subcall function 02C492E0: GetCurrentProcess.KERNEL32 ref: 02C492F7
      • Part of subcall function 02C492E0: OpenProcessToken.ADVAPI32 ref: 02C4930A
      • Part of subcall function 02C492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02C49335
      • Part of subcall function 02C492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02C49358
      • Part of subcall function 02C492E0: GetLastError.KERNEL32 ref: 02C4935E
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C4936D
    • ExitWindowsEx.USER32 ref: 02C4E0B5
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C49388
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process$Exit$CloseHandleToken$AdjustCommandCreateCurrentErrorFileInfoLastLineLookupModuleNameOpenPrivilegePrivilegesStartupValueWindows
    • String ID:
    • API String ID: 2667809516-0
    • Opcode ID: b3d21a28ab8203c73efd544b6153422eeffcacae9f052cfca13134f61e2c620e
    • Instruction ID: baba384a30a3336bacf189697b18464cdce5586a38743119cb0233d3f51755b6
    • Opcode Fuzzy Hash: b3d21a28ab8203c73efd544b6153422eeffcacae9f052cfca13134f61e2c620e
    • Instruction Fuzzy Hash: F1E04F7620844085E729A735B9597AF6211BB407A4F04812B8E5B02D84CE38C0D6C610
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: @$h
    • API String ID: 0-1029331998
    • Opcode ID: 358b050d685c7cb6894111cd8e9f28b6b6c6eb8fd1bfa1ed20978f7fec48c2c2
    • Instruction ID: 388006eccee906edaf683299eb1b09f4e83d8f98dc1e8058333ba3a5cf9309f2
    • Opcode Fuzzy Hash: 358b050d685c7cb6894111cd8e9f28b6b6c6eb8fd1bfa1ed20978f7fec48c2c2
    • Instruction Fuzzy Hash: B4B19970618B488FEB69EF68D8993AA77E5FB98305F10052EA54BC3150DF3CD546CB82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: <$<
    • API String ID: 0-213342407
    • Opcode ID: dd92d63dcdd426f59a9e2fa5ae2e36dc6ecd9943a307a728b4c21ce2e3eda32d
    • Instruction ID: b4450ee39c0c7f96db51f8099ab1f1852006a5e470ca553d4605cb5b5772752a
    • Opcode Fuzzy Hash: dd92d63dcdd426f59a9e2fa5ae2e36dc6ecd9943a307a728b4c21ce2e3eda32d
    • Instruction Fuzzy Hash: B89118B05547098FDBA8DF28D4D43953BE5FB08704F1842BEAD0ECE29ADF7885458BA0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: $h
    • API String ID: 0-1972213566
    • Opcode ID: 139f1a407b2d328bfd50579990b57c49ae2f375fd998e8cadf9efc8e2fa61e9f
    • Instruction ID: fc613c58d32890faa99598d04e40c5e35270e6c4da8311ba9ec454c38bf4a4d2
    • Opcode Fuzzy Hash: 139f1a407b2d328bfd50579990b57c49ae2f375fd998e8cadf9efc8e2fa61e9f
    • Instruction Fuzzy Hash: 2061D731514A4D8FEB69FF58C8946EEB7A5FBA8304F40422AE54BD3590DF38D506CB82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: @$h
    • API String ID: 0-1029331998
    • Opcode ID: 73e096c04b7ac91e4f4ddcf25b2638513d8ffedd270eb0e705266d52b718efac
    • Instruction ID: 0238604a7ec890bf33e85d4c495f6d1d2aeb44aaf7a1efa4863c47a641f20dde
    • Opcode Fuzzy Hash: 73e096c04b7ac91e4f4ddcf25b2638513d8ffedd270eb0e705266d52b718efac
    • Instruction Fuzzy Hash: FE519E70518B898FDB64EF58DC857ABB7E1FB98305F10462EA58AC3250DF78E505CB82
    APIs
      • Part of subcall function 02B04E49: malloc.LIBCMT ref: 02B04E63
      • Part of subcall function 02B05DC5: _errno.LIBCMT ref: 02B05DE3
      • Part of subcall function 02B05DC5: _invalid_parameter_noinfo.LIBCMT ref: 02B05DEF
      • Part of subcall function 02B05DC5: _errno.LIBCMT ref: 02B05E31
    • _localtime64.LIBCMT ref: 02AF6720
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo_localtime64malloc
    • String ID:
    • API String ID: 1702167547-0
    • Opcode ID: c5b4f4277aaa9297e0fe623575a3fb09da6160c7b2addc55117edda21951fe1f
    • Instruction ID: 16bc452ad31086c53073be7e5a1004c79dd3766be754e64e02963de4eeb1ed68
    • Opcode Fuzzy Hash: c5b4f4277aaa9297e0fe623575a3fb09da6160c7b2addc55117edda21951fe1f
    • Instruction Fuzzy Hash: FF028431614A088FDB69EF64DC89AEAB7E5FB58300F50462AE45BC3260DF34E645CF81
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: [RO] %ld bytes
    • API String ID: 0-772938740
    • Opcode ID: 0bc9ff0f179f0640927e28c222b33d2ac1d82dab54c563a82b986612fe2dcdf6
    • Instruction ID: 2180ff51e4fa3cef1629106baeba2264633614bec3bde3a5fe0b62199e8c20bf
    • Opcode Fuzzy Hash: 0bc9ff0f179f0640927e28c222b33d2ac1d82dab54c563a82b986612fe2dcdf6
    • Instruction Fuzzy Hash: FE428C736092C48BC329CF29A44079EBFA0F3A5B48F488129DBC587B45DB78E995CB51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: [RO] %ld bytes
    • API String ID: 0-772938740
    • Opcode ID: 1ed3bb2f404239d74be1f07793ca469e9cb85950aa033daddafdfd33a72f81d3
    • Instruction ID: 06d8637b4a35f7e44341b407cbcec5a2ba6a9271e59067e78922ca7d0cfa0041
    • Opcode Fuzzy Hash: 1ed3bb2f404239d74be1f07793ca469e9cb85950aa033daddafdfd33a72f81d3
    • Instruction Fuzzy Hash: A052D2336092C58FC329CF28E44069DBBA0F759B44F448039DBD987B89DB78E959DB60
    APIs
    • _getptd.LIBCMT ref: 02C5AEBA
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
      • Part of subcall function 02C5BA30: _errno.LIBCMT ref: 02C5BA48
      • Part of subcall function 02C5BA30: _invalid_parameter_noinfo.LIBCMT ref: 02C5BA54
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 1050512615-0
    • Opcode ID: fedb899bdb91596af6e6ee0e969ea8dc5925a75702ece9bdec94cea29fba6568
    • Instruction ID: 24f3d2a3e779761be92d866ccbf3660d929bc4e1bc8451b4411e6ece0fb77d53
    • Opcode Fuzzy Hash: fedb899bdb91596af6e6ee0e969ea8dc5925a75702ece9bdec94cea29fba6568
    • Instruction Fuzzy Hash: 4F51E8B23146A146EF24DB22A55076BAB56FBC4BC8F448521EF4A47B08EF39C185CB48
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 57db738d57153fc7c429c22cf91e7162c30465e9021a82ee78624aa2695d2ded
    • Instruction ID: 2daf68b92c741509236e6bd7b20a75d0855b59971e79bf4d8511412e50cc1bfb
    • Opcode Fuzzy Hash: 57db738d57153fc7c429c22cf91e7162c30465e9021a82ee78624aa2695d2ded
    • Instruction Fuzzy Hash: FC01B132214A8186E7244B6AE6CC3B93761F3C5BC8FA84021DF8A4B389CB24C682C744
    APIs
    • EnumSystemLocalesA.KERNEL32 ref: 02C661A0
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: a806821e78272caffabb9aa5d16819259c944b66b3d383c3c5fc35bed0f95a7c
    • Instruction ID: fea4d0f2510be2b7a9fbc35d987e184c6bc3dc4926d7b14afc306e6b593d2c20
    • Opcode Fuzzy Hash: a806821e78272caffabb9aa5d16819259c944b66b3d383c3c5fc35bed0f95a7c
    • Instruction Fuzzy Hash: 40015672A007048BEB198F31D89D37D3795E784B4DF684415CE4906296CBBCC6E9D781
    APIs
    • EnumSystemLocalesA.KERNEL32 ref: 02C6621D
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: 877d5119e145bca4dbe67ff3c00607a04366f90a80b08fa67d988f9d8e585d44
    • Instruction ID: 43de9d1fe2ab08a2e4a05232c340211ee55360d7ed7947ee010da43cfb6e3caf
    • Opcode Fuzzy Hash: 877d5119e145bca4dbe67ff3c00607a04366f90a80b08fa67d988f9d8e585d44
    • Instruction Fuzzy Hash: 66F0BBF2B0464447F7188B35D49D3BA3796EBD4B49F388011CB4942385C77CC2E58681
    APIs
      • Part of subcall function 02C492E0: GetCurrentProcess.KERNEL32 ref: 02C492F7
      • Part of subcall function 02C492E0: OpenProcessToken.ADVAPI32 ref: 02C4930A
      • Part of subcall function 02C492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02C49335
      • Part of subcall function 02C492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02C49358
      • Part of subcall function 02C492E0: GetLastError.KERNEL32 ref: 02C4935E
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C4936D
    • ExitWindowsEx.USER32 ref: 02C4E0D6
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C49388
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
    • String ID:
    • API String ID: 681424410-0
    • Opcode ID: c5437afb9a504350283759be5a2e2ba688f67b11f6b02529b8aed3acffafb6b3
    • Instruction ID: 96b985778e16bd9377c1fbfa53a42d39ed32edf6a23cea1aac9c9270326800f5
    • Opcode Fuzzy Hash: c5437afb9a504350283759be5a2e2ba688f67b11f6b02529b8aed3acffafb6b3
    • Instruction Fuzzy Hash: FED05E37248450C5F776AB66F806BAFB611BB947B4F4481378EAE03981CE38C0DACB04
    APIs
      • Part of subcall function 02C492E0: GetCurrentProcess.KERNEL32 ref: 02C492F7
      • Part of subcall function 02C492E0: OpenProcessToken.ADVAPI32 ref: 02C4930A
      • Part of subcall function 02C492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02C49335
      • Part of subcall function 02C492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02C49358
      • Part of subcall function 02C492E0: GetLastError.KERNEL32 ref: 02C4935E
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C4936D
    • ExitWindowsEx.USER32 ref: 02C4E0F7
      • Part of subcall function 02C492E0: CloseHandle.KERNEL32 ref: 02C49388
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
    • String ID:
    • API String ID: 681424410-0
    • Opcode ID: 7695e8de455b47fc7c4015bd84d56b1e415436a0ef6b3387a5f0b89aca7faf0b
    • Instruction ID: 5b773c27964da7725445270127a2f2b8b853ab6d043b6f385fea10d714d68c7d
    • Opcode Fuzzy Hash: 7695e8de455b47fc7c4015bd84d56b1e415436a0ef6b3387a5f0b89aca7faf0b
    • Instruction Fuzzy Hash: E9D05E37248454C5F776AB25F805BAFB211BB947B4F4581378EAE03981CE38C0DADB04
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: 0u
    • API String ID: 0-3203441087
    • Opcode ID: 4f7a807c7884c06512dd7a6c626225b68cdc165c41f7ec5e4356e260b87f41df
    • Instruction ID: 7a5de61e4dff4d56ac9b86e5cb3e3d000f41290030337cfda7d43c4c0d266c51
    • Opcode Fuzzy Hash: 4f7a807c7884c06512dd7a6c626225b68cdc165c41f7ec5e4356e260b87f41df
    • Instruction Fuzzy Hash: FB91727051CB448FD764DF68D48576BB7E1FB99704F20492EE58AC3250DB34E446CB86
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 9a8ff2a500159e3ed63b44506368299f85c51e85dfafb5f360626af238714718
    • Instruction ID: dabeb2ae2b5c7a4829a279be4f9c1ff32a0bd830a472893973efb52b6ee61de1
    • Opcode Fuzzy Hash: 9a8ff2a500159e3ed63b44506368299f85c51e85dfafb5f360626af238714718
    • Instruction Fuzzy Hash: 54B09211F26412C1D708BB21AC810A0D2A06F6C321FC00830C02E801A0DE2C91EFA754
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: <
    • API String ID: 0-4251816714
    • Opcode ID: 077f69fdd06265c26d877f1f5843b9613f2a9da1eade7d2aef4c89599cd222c9
    • Instruction ID: ae48a6f4e7f5abece32440707838f1bdc3350917f1565cb68002ef429e5c2d2b
    • Opcode Fuzzy Hash: 077f69fdd06265c26d877f1f5843b9613f2a9da1eade7d2aef4c89599cd222c9
    • Instruction Fuzzy Hash: D7519730314A088FE749DF28E889B9677E5FB95304F40816EE44BC76A0DF39E445CB42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID: _.,
    • API String ID: 0-2709443920
    • Opcode ID: 20ea197299b378448de38120ea43e05a2a59677407c39c99d419746b8418e36c
    • Instruction ID: c510ba945ca1e9c4a0905e669ceb2501b640028356c707c6d0c6f1ead5702546
    • Opcode Fuzzy Hash: 20ea197299b378448de38120ea43e05a2a59677407c39c99d419746b8418e36c
    • Instruction Fuzzy Hash: 3F412332244BA54AEB38DE73D915B6A3713E3C4788F488716DF8982A45DF79C2C1CB48
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 577dbf38f9836090b25adf45b9ef5395d5e3ed3af2fa4e457b5ccb6cbb212996
    • Instruction ID: 2c5d7a45fbdcc41f651c72465d66b61dcaf9f4633707ca529046a81c86bfbc2f
    • Opcode Fuzzy Hash: 577dbf38f9836090b25adf45b9ef5395d5e3ed3af2fa4e457b5ccb6cbb212996
    • Instruction Fuzzy Hash: 84529F302187858FD769CF5C84816A5BBE0FB59300F54896DEDCACB742DB74E846CB92
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3d0b285a1c183d9ed15233d5e90f35ef3308b6f5fd0085757d0cf32db775e372
    • Instruction ID: b3a2a1e4f931b53d79908b5f0b8e86ec3c8a12d890d84c594f8d6f833ed919f5
    • Opcode Fuzzy Hash: 3d0b285a1c183d9ed15233d5e90f35ef3308b6f5fd0085757d0cf32db775e372
    • Instruction Fuzzy Hash: 5522D577B785504BD71CCB19E892FA977A2F394308749A52CEA17D3F44DA3DEA06CA00
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$malloc
    • String ID:
    • API String ID: 610097836-0
    • Opcode ID: d8c1d2824fdf26bac285bba075242ff27231a96c61992707bff1d5ac2219e7e9
    • Instruction ID: 0593a5c9cd8008484dca36999109043df21c2a31084ffeb89e09aef9780e48c9
    • Opcode Fuzzy Hash: d8c1d2824fdf26bac285bba075242ff27231a96c61992707bff1d5ac2219e7e9
    • Instruction Fuzzy Hash: 28F16530518B488FE71AEF28E8856AA7BF5FB99305F40466ED44BC71A0DF389545CF82
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6fa0175b8b6f08b8c9ecdc74782b28c8b32354c9a2c83be618f6627b7f47bdf9
    • Instruction ID: 43797936eb020a8d7b5a864c2079ad01825ceddf94ae501876f9b0053c5a9dfc
    • Opcode Fuzzy Hash: 6fa0175b8b6f08b8c9ecdc74782b28c8b32354c9a2c83be618f6627b7f47bdf9
    • Instruction Fuzzy Hash: 9CB1BE30618E498BDF8DEF6CC495A75B3E1FB8530171046A9EA5AC7645DF38E892CBC0
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 169c863b51fcf6167b5fe823ea54d9709b69dcd928fd84d454ce5827a6fee8e2
    • Instruction ID: 5b87eee75c0fd736fd64ccc71aa8b6896e2079370be022689e8fa69dcb267980
    • Opcode Fuzzy Hash: 169c863b51fcf6167b5fe823ea54d9709b69dcd928fd84d454ce5827a6fee8e2
    • Instruction Fuzzy Hash: 13B1F030A18E098FCB9DDF6CC485679B3E2FB85301B54862DE95AC7655DF34E892CB80
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
    • Instruction ID: 08a020f96be3dd78c2cd753cfd82b1210d7eab1685b39435852a105965a0b126
    • Opcode Fuzzy Hash: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
    • Instruction Fuzzy Hash: 9EA1B030518A488FDB69EF68D885AADBBF1FF98304F10426EE54AD7165DF34D902CB81
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 20ea197299b378448de38120ea43e05a2a59677407c39c99d419746b8418e36c
    • Instruction ID: 61f9c48088fe6488606df62f96d8280666d51ea09e8ac7daa2204b939f4df078
    • Opcode Fuzzy Hash: 20ea197299b378448de38120ea43e05a2a59677407c39c99d419746b8418e36c
    • Instruction Fuzzy Hash: C641D631228B484FEB2AEEB8889537AB7D6FB54304F454DAD8597C31D1EF28D5414A41
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction ID: 10c7a0c8e9403e8482e92735103ded62817db3bab5a1dfd4fb9f1c3786d7218c
    • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction Fuzzy Hash: 6551D573B152A18BD7288F19E49CF6C3A99F798385B51E03ADB5297F00D775CA50CB00
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction ID: fc3be0e00e7a9cac966036909026ddfd3bc393c6601f2ef95efd68fafdd16a7a
    • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
    • Instruction Fuzzy Hash: 96510572B183A68BE7589F08E404F68BA95F794341F91D438DB3787F90DA79DC508B84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno
    • String ID:
    • API String ID: 2288870239-0
    • Opcode ID: 9aa16b22ebdf764a21f270bcfe908f430863055a3e440207fba421ff0d466c6d
    • Instruction ID: d64d29c2e7b817b65e3cd3d8f308d0f44fd0046824d0fbc9d778fcc31ae25f1f
    • Opcode Fuzzy Hash: 9aa16b22ebdf764a21f270bcfe908f430863055a3e440207fba421ff0d466c6d
    • Instruction Fuzzy Hash: 6AA154306A15098FD69EEB6CC8E47AC3773BF48300F8442B58A6DCA9F6CE519C45CB95
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 0020f19ff185dbff27dcfb762236250369b3a71a9d3eaf30a14737fe5e34001e
    • Instruction ID: 2e78ebba4fa29ef17a92fbf1b5cda1b030bc4adf8b255b8f949ddc6997671d7e
    • Opcode Fuzzy Hash: 0020f19ff185dbff27dcfb762236250369b3a71a9d3eaf30a14737fe5e34001e
    • Instruction Fuzzy Hash: 6981582225265489DB85FFF1CCA42AE2322EBC4FC4FC44132CE4D5B525CE31D9859BD6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
    • Instruction ID: 6044b3a48d590223308b588bb558741123ef71218747c8e178390e7ee4522bd0
    • Opcode Fuzzy Hash: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
    • Instruction Fuzzy Hash: CDA16621A2654191E751BB31C4A9BFD9330AF88B88FC44133D97D4A1EFCE15D48AE7E8
    APIs
      • Part of subcall function 02C55378: malloc.LIBCMT ref: 02C55392
    • RegOpenKeyExW.ADVAPI32 ref: 02C4E232
    • RegDeleteValueW.ADVAPI32 ref: 02C4E243
    • RegSetValueExW.ADVAPI32 ref: 02C4E26E
    • RegCloseKey.ADVAPI32 ref: 02C4E2D4
    • lstrlenW.KERNEL32 ref: 02C4E367
    • lstrlenW.KERNEL32 ref: 02C4E377
    • lstrlenW.KERNEL32 ref: 02C4E45D
    • lstrlenW.KERNEL32 ref: 02C4E46D
      • Part of subcall function 02C55378: _callnewh.LIBCMT ref: 02C55386
      • Part of subcall function 02C55378: std::exception::exception.LIBCMT ref: 02C553FF
      • Part of subcall function 02C55560: _errno.LIBCMT ref: 02C5557F
      • Part of subcall function 02C55560: _invalid_parameter_noinfo.LIBCMT ref: 02C5558B
    • lstrlenW.KERNEL32 ref: 02C4E54D
    • lstrlenW.KERNEL32 ref: 02C4E55D
    • RegCloseKey.ADVAPI32 ref: 02C4E60C
    • Sleep.KERNEL32 ref: 02C4E617
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen$CloseValue$DeleteOpenSleep_callnewh_errno_invalid_parameter_noinfomallocstd::exception::exception
    • String ID: 127.0.0.1$6666$6666$8.218.163.62$8.218.163.62$Console$IpDate$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
    • API String ID: 2396878867-2138182752
    • Opcode ID: 0ba1c50f3f6f8bd47f20042370db24bb557a2b144f417de9e289bd57393602ee
    • Instruction ID: b591e7bedf3fe46411f47c400466196223d5fad395af98cfd28c4dc1c7c798e6
    • Opcode Fuzzy Hash: 0ba1c50f3f6f8bd47f20042370db24bb557a2b144f417de9e289bd57393602ee
    • Instruction Fuzzy Hash: 51B1F271705A9581FB24EF65E548BAE2772F788BC9F819016CE0E17B50EF78C28AD740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL$ceil
    • API String ID: 2643518689-1731902841
    • Opcode ID: 3235768cab9551c74b9773b86dd77190edcad43fb14d3d9bf66f7ba374c6ba15
    • Instruction ID: e465a5083244651e4053ec4a048d8b9c255b18c8aa8a1f9db2fbcd3b3250eebe
    • Opcode Fuzzy Hash: 3235768cab9551c74b9773b86dd77190edcad43fb14d3d9bf66f7ba374c6ba15
    • Instruction Fuzzy Hash: 5651E720B1AB1291FB54BB51AC14174E3A16F49B91FC40835DC7E827E8EE3CE449B6E8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
    • API String ID: 2643518689-564504941
    • Opcode ID: 9b477d339a0cbf5d1fb3b709f53cc0189430c5bdffb326d61e63b17971d6259a
    • Instruction ID: fac487cc689e1084a56c74b3a25c8b999d7001615ff2dbe8e3484ba61ec25e8f
    • Opcode Fuzzy Hash: 9b477d339a0cbf5d1fb3b709f53cc0189430c5bdffb326d61e63b17971d6259a
    • Instruction Fuzzy Hash: 00513320216B5581FE25DB52B89CB2C63A4AB88FD5F999029CC1F47B24EF7DC685C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 83821fb44c2082aa68f38fc84eff16adcc4682b38c585996f4bedfbd64328b7c
    • Instruction ID: 36d89fda513429ac9b6c4c1cb0f6c1719b2ecd72d15e78b1236c19fd10a93cc1
    • Opcode Fuzzy Hash: 83821fb44c2082aa68f38fc84eff16adcc4682b38c585996f4bedfbd64328b7c
    • Instruction Fuzzy Hash: A61259623046C08AEB129F69D8CC3BCBBA2F785B5CF589A05CE5A07791DB39C549C705
    APIs
      • Part of subcall function 02C57488: RtlLookupFunctionEntry.KERNEL32 ref: 02C574FC
    • __GetUnwindTryBlock.LIBCMT ref: 02C59778
    • __SetUnwindTryBlock.LIBCMT ref: 02C5979F
      • Part of subcall function 02C5733C: RaiseException.KERNEL32 ref: 02C573B7
    • __GetUnwindTryBlock.LIBCMT ref: 02C597A9
    • _getptd.LIBCMT ref: 02C597FF
    • _getptd.LIBCMT ref: 02C59812
    • _getptd.LIBCMT ref: 02C5981E
    • _SetThrowImageBase.LIBCMT ref: 02C59832
    • _getptd.LIBCMT ref: 02C59882
    • _getptd.LIBCMT ref: 02C59895
    • _getptd.LIBCMT ref: 02C598A1
    • type_info::operator==.LIBCMT ref: 02C59908
    • std::exception::exception.LIBCMT ref: 02C59941
    • _getptd.LIBCMT ref: 02C59B74
    • std::exception::exception.LIBCMT ref: 02C59BED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
    • String ID: bad exception$csm$csm$csm
    • API String ID: 1639654010-820278400
    • Opcode ID: d9cf7963ac656a204547f84c84e07c0a39f698d544cc56fb1fb8ee67f789732f
    • Instruction ID: 14233ac413ef66fef295b3ec7704723f50171e416bf264b54699b8c3f982edf5
    • Opcode Fuzzy Hash: d9cf7963ac656a204547f84c84e07c0a39f698d544cc56fb1fb8ee67f789732f
    • Instruction Fuzzy Hash: A4D1E232600B60CADF24DF66D4843AE77A2FB84BC8F444665DE4A57B04CB38C2D5DB99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
    • String ID: bad exception$csm$csm$csm
    • API String ID: 1639654010-820278400
    • Opcode ID: fbe037284dd962ea214ae2f94636b38ee292e4416248e112e6b35bf23fd221be
    • Instruction ID: 274f59fd5bed66920c621bd22ca656592aeb25ae4a0a1dd5027c473040a4ce25
    • Opcode Fuzzy Hash: fbe037284dd962ea214ae2f94636b38ee292e4416248e112e6b35bf23fd221be
    • Instruction Fuzzy Hash: A8E1E332A0864286EB20BB6591402BDF7A0FF15788F844935DE7E17BC5CF38E455E3A9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BlockUnwind$BaseImageThrowstd::exception::exceptiontype_info::operator==
    • String ID: csm$csm$csm
    • API String ID: 597370258-393685449
    • Opcode ID: 22467ef495f7b2ae5b0c470f627a871a789aef46cd6af6b457b8833c2192b874
    • Instruction ID: 1e7f7f9f51b7c3891b5196bc912715083a296f501131eaa9a7021b4adf7dc4b1
    • Opcode Fuzzy Hash: 22467ef495f7b2ae5b0c470f627a871a789aef46cd6af6b457b8833c2192b874
    • Instruction Fuzzy Hash: 7EE1D930618F098FCB59AFA8C4C56ADBBE1FB58715F5442ADD84AC3292DF34E441CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: !analyze -v$%s-%04d%02d%02d-%02d%02d%02d.dmp$DbgHelp.dll$MiniDumpWriteDump
    • API String ID: 145871493-3774911088
    • Opcode ID: 480089490ec144e7b2b2c8ce8f4cc6496139fd37b894703ea7d60b2fbab28df8
    • Instruction ID: 01edb2393f6cef09d28fd2cb875ba814f6770ec778f24f14938dad07ed648588
    • Opcode Fuzzy Hash: 480089490ec144e7b2b2c8ce8f4cc6496139fd37b894703ea7d60b2fbab28df8
    • Instruction Fuzzy Hash: 23416036618B9186E760AB11F84426EF3A0FF89755F800635DABE43B98DF3CD018EB54
    APIs
    • GetLocalTime.KERNEL32 ref: 02C4D568
    • wsprintfW.USER32 ref: 02C4D5B0
      • Part of subcall function 02C49830: lstrlenW.KERNEL32 ref: 02C49862
      • Part of subcall function 02C49830: lstrlenW.KERNEL32 ref: 02C4987C
      • Part of subcall function 02C49830: lstrlenW.KERNEL32 ref: 02C49888
    • lstrlenW.KERNEL32 ref: 02C4D61B
    • lstrlenW.KERNEL32 ref: 02C4D62E
    • CreateEventA.KERNEL32 ref: 02C4D79E
    • RegOpenKeyExW.ADVAPI32 ref: 02C4D808
    • CloseHandle.KERNEL32 ref: 02C4D850
    • Sleep.KERNEL32 ref: 02C4D86E
    • CloseHandle.KERNEL32 ref: 02C4D897
    • CloseHandle.KERNEL32 ref: 02C4D8B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen$CloseHandle$CreateEventLocalOpenSleepTimewsprintf
    • String ID: %4d.%2d.%2d-%2d:%2d:%2d$Console\1$o1:$p1:$t1:
    • API String ID: 441366266-1614091359
    • Opcode ID: 2c5e8d8077fca6d9efecd33f24c60deca68b6aa5d3bb0323bb46866befe63c5a
    • Instruction ID: e546ae04b8b17c26a85731ff188237deb48f96773150e936b80f3f24ac02b372
    • Opcode Fuzzy Hash: 2c5e8d8077fca6d9efecd33f24c60deca68b6aa5d3bb0323bb46866befe63c5a
    • Instruction Fuzzy Hash: CA918E72204B9186EB24AF26E944BAE77B5F785B84F405519DE8F07B68DF38C245CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: VisibleWindow
    • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
    • API String ID: 1208467747-3439171801
    • Opcode ID: 9b8c77d6ced09ec049599edcb5e11aaf6237f5b26d3217c734fc7b2da4660954
    • Instruction ID: 53e4ee92971de7833b3dfc5e7ef54a7d9c50c48412df5b121549d3931f2fe1be
    • Opcode Fuzzy Hash: 9b8c77d6ced09ec049599edcb5e11aaf6237f5b26d3217c734fc7b2da4660954
    • Instruction Fuzzy Hash: 4F51703430675281FE69EB37F98472953629F8A7D4F88A4749C0E1B318EF7CC6849B04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID:
    • API String ID: 1452528299-0
    • Opcode ID: 77dedc7f358742ff0399e8efbd8c3910799c15a7c59c220d042ca75b07eb62eb
    • Instruction ID: 422e13a55b4ce26cf7437d3868e92c5b3d7c610b8028bf721eab8545491a0578
    • Opcode Fuzzy Hash: 77dedc7f358742ff0399e8efbd8c3910799c15a7c59c220d042ca75b07eb62eb
    • Instruction Fuzzy Hash: 86B1C532311A608AEB14CF26E95876D33A5FB88BC8F484529CE4E87F44EF79D595C704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlensetsockopt$CreateEventIoctlgethostbynamesocket
    • String ID:
    • API String ID: 2536029566-0
    • Opcode ID: cf50b05f241690f5b75512f02c6d7ffb42373bcd321a6766e23d8fdfdd69b64a
    • Instruction ID: a16a3e404cdf182f0a1e4246f2674faf08c1a79eecdddc6f79b62d84e19cd2ff
    • Opcode Fuzzy Hash: cf50b05f241690f5b75512f02c6d7ffb42373bcd321a6766e23d8fdfdd69b64a
    • Instruction Fuzzy Hash: 1F514376218B5186E724CF65F44875EB7A5F788BA8F100219EE9A43FA8DF7CC145CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWidelstrlensetsockopt$CreateEventIoctlgethostbynamesocket
    • String ID:
    • API String ID: 2536029566-0
    • Opcode ID: dd1851911fdd76a705326ba549579fe627525648a2b6dfceec2b157348278301
    • Instruction ID: fc72f550ba4120ed8f44cddb57b25b55297fe1abbac108754e19092562bb6897
    • Opcode Fuzzy Hash: dd1851911fdd76a705326ba549579fe627525648a2b6dfceec2b157348278301
    • Instruction Fuzzy Hash: F8515132618B5186E7109F65F84026AF7A5FB88BA4F500635EABE43BD8CF3CD049DB54
    APIs
    • __free_lconv_mon.LIBCMT ref: 02C5F180
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C654CA
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C654DC
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C654EE
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65500
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65512
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65524
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65536
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65548
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C6555A
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C6556C
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65581
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C65596
      • Part of subcall function 02C654AC: free.LIBCMT ref: 02C655AB
    • free.LIBCMT ref: 02C5F174
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    • free.LIBCMT ref: 02C5F196
    • __free_lconv_num.LIBCMT ref: 02C5F1A2
    • free.LIBCMT ref: 02C5F1AE
    • free.LIBCMT ref: 02C5F1BA
    • free.LIBCMT ref: 02C5F1DE
    • free.LIBCMT ref: 02C5F1F2
    • free.LIBCMT ref: 02C5F201
    • free.LIBCMT ref: 02C5F20D
    • free.LIBCMT ref: 02C5F23A
    • free.LIBCMT ref: 02C5F262
    • free.LIBCMT ref: 02C5F27C
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast__free_lconv_mon__free_lconv_num_errno
    • String ID:
    • API String ID: 518839503-0
    • Opcode ID: 793502283a8cb49350656c0ec5e5d9694461158cf1e27e4be6b183f55cf5cd15
    • Instruction ID: 910f90020ea8b5cba34499a7f169140fae10864f8c8127f5cfa840c82f5954b3
    • Opcode Fuzzy Hash: 793502283a8cb49350656c0ec5e5d9694461158cf1e27e4be6b183f55cf5cd15
    • Instruction Fuzzy Hash: 43314D366026A488DF69DFA1CC503BD2321EBC5B98F880439CE0D4BA54CF38C1C1C799
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast__free_lconv_mon__free_lconv_num_errno
    • String ID:
    • API String ID: 518839503-0
    • Opcode ID: 578f8deb9b1b94d1822c3a308d3ccdd43089e4846e4b09c0fbd9a79327202c1b
    • Instruction ID: 56e01ce191928652e272e21cfb5066fb29982059d362c74029f1390f05b2305a
    • Opcode Fuzzy Hash: 578f8deb9b1b94d1822c3a308d3ccdd43089e4846e4b09c0fbd9a79327202c1b
    • Instruction Fuzzy Hash: A5413532E1A98284EF65BF21C4547B8E360AF48B84F940431DA3D062DDCF6CA485F7B8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _fileno$_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 482796045-0
    • Opcode ID: 870200666e5cc4ec4f42544dfeab9d8f82b4b13906aec3573b67f937372f4743
    • Instruction ID: a12afd6c989267c4ee61be722fbddbdcf7130f6a47782ad6e84ba97d17280677
    • Opcode Fuzzy Hash: 870200666e5cc4ec4f42544dfeab9d8f82b4b13906aec3573b67f937372f4743
    • Instruction Fuzzy Hash: 7C510B34228F4D4B8758AF6C84D127977D6FF86314BE807ADD5AAC32D0D72895528782
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _fileno$_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 482796045-0
    • Opcode ID: c48717b30ae9b74f7ac66b91d84a3b4c92b1bb28475cd271dfa275c582b4941c
    • Instruction ID: 6797ed5e0e28e3acd71f666ec8e48e0276b82c43072c924fdefdfe872d5fe643
    • Opcode Fuzzy Hash: c48717b30ae9b74f7ac66b91d84a3b4c92b1bb28475cd271dfa275c582b4941c
    • Instruction Fuzzy Hash: 3051172221468585CB289F3A99D827DA352FBC2BECB584B02EF7A477D4CF2CC556C711
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo
    • String ID: csm
    • API String ID: 4181383844-1018135373
    • Opcode ID: 51c0dc7a84f5612c5cc78820bb2f6ad6632db51e04bb7ee6f91fee8f6b9fc100
    • Instruction ID: 10d6117d1a9055d7c1135c3dd601d0230a3ccd35e4effd798f5f802edb221407
    • Opcode Fuzzy Hash: 51c0dc7a84f5612c5cc78820bb2f6ad6632db51e04bb7ee6f91fee8f6b9fc100
    • Instruction Fuzzy Hash: C7418EB0518B098FC7B5EF6CC485B7ABBE1FB58311F5105AED08DC3692DB31A5428B86
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo_amsg_exit
    • String ID: csm
    • API String ID: 2825728721-1018135373
    • Opcode ID: 28f5b8f5928c2bab68e4158101839e7a7904bf0c9a5fe69cd0b7fe63bdef1c08
    • Instruction ID: 1c37af8b9323734ef61ed7bbcf1f669701c391f341a5b005b5ba4fb6a7fd5215
    • Opcode Fuzzy Hash: 28f5b8f5928c2bab68e4158101839e7a7904bf0c9a5fe69cd0b7fe63bdef1c08
    • Instruction Fuzzy Hash: 23412E36204BA1D6CA309B16E44036BB7A5F788B94F044265EF9E07B54DF39C1E5DB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CreateFrameInfo_amsg_exit
    • String ID: csm
    • API String ID: 2825728721-1018135373
    • Opcode ID: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
    • Instruction ID: 9b9ef352d9c8f0d450b5bb9a3e5e933e14c0a2466aec6160f3c81632816c23a1
    • Opcode Fuzzy Hash: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
    • Instruction Fuzzy Hash: 8041603690978282DB70EB12A4403AAF3A4FB48794F944535DEBE07BC5DF38D095EB54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
    • String ID:
    • API String ID: 101574016-0
    • Opcode ID: c7ab4824c20248cd77d5d216f2600469411963f07d5dc115475ca10161a63df4
    • Instruction ID: 002e5edd9b38a8baa0b2f9d73da0aeaf0e1096a84255f7d90eea79230949a3d8
    • Opcode Fuzzy Hash: c7ab4824c20248cd77d5d216f2600469411963f07d5dc115475ca10161a63df4
    • Instruction Fuzzy Hash: F2910625302B5086EF25EB26AD8C33E7795FB81BD8F588625CE5A4B754EF38C146D700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalErrorLastSection$EnterLeave
    • String ID:
    • API String ID: 2124651672-0
    • Opcode ID: 4efe19a53c5f1bbbb6770299ba61f7da19085229a5c567b4a8f2ec6ecf7074f0
    • Instruction ID: 0a37a0c376a1375d885d495c493da582dc949060a3d4db692772766856fa3e5b
    • Opcode Fuzzy Hash: 4efe19a53c5f1bbbb6770299ba61f7da19085229a5c567b4a8f2ec6ecf7074f0
    • Instruction Fuzzy Hash: 8C41D2322042848BE754AF35E84CB2F77A9FB89B91F45512ADA1B83B90DF38D484CB45
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalErrorLastSection$EnterLeave
    • String ID:
    • API String ID: 2124651672-0
    • Opcode ID: 69df40eebe7a994a8abce202a6738ebc00c29fcc82c09fe2143204c8f9b5c241
    • Instruction ID: 612c112f2f75d5c9a7211d040635ab27e2f42c3e9e67991d1824897a9213f82b
    • Opcode Fuzzy Hash: 69df40eebe7a994a8abce202a6738ebc00c29fcc82c09fe2143204c8f9b5c241
    • Instruction Fuzzy Hash: D041A632A0829586E754AF20D80866AF368FF49751F904535D63F832D5DF3CE448E798
    APIs
    • EnterCriticalSection.KERNEL32 ref: 02C463C4
    • WSASetLastError.WS2_32 ref: 02C463D6
    • LeaveCriticalSection.KERNEL32 ref: 02C463E0
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: 90b2d3d72562b85b932b95850fd759897480d03085588f29b6ae233e826b8c72
    • Instruction ID: c9a2dcb69fc34ee3d4eb5928f7ee3279fa7cf8a9e339c1aa0502f3dbcdfb44e7
    • Opcode Fuzzy Hash: 90b2d3d72562b85b932b95850fd759897480d03085588f29b6ae233e826b8c72
    • Instruction Fuzzy Hash: CC31902131464082EA149F26F90C72F7319F786BA5F546135CE2B87BA9DF29C495C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: ce80470fa4deb6d6172187dcf98ae3ac5c2e22c2398dc0b25eb93d0e69b03d15
    • Instruction ID: e9bd53622e641f2e1d103e23d7dcbd2dafa87dcfe3442c15a2d5cee87f9d8ce3
    • Opcode Fuzzy Hash: ce80470fa4deb6d6172187dcf98ae3ac5c2e22c2398dc0b25eb93d0e69b03d15
    • Instruction Fuzzy Hash: C0315220B0865282F7147B15B81523AE255EF8AF91F945631D93F43BD9CF3CE489B3A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseValue$CreateDeleteOpenlstrlen
    • String ID: AppEvents$Network
    • API String ID: 3197061591-3733486940
    • Opcode ID: df353acfe061e84203d7ac4a4d8559ebe72ca993a1af8a6bb5186c314d41c4c8
    • Instruction ID: f0168b34761cfb954f039e6cbdffe44e9e3ed7e9af0973dfb09dc175e661659e
    • Opcode Fuzzy Hash: df353acfe061e84203d7ac4a4d8559ebe72ca993a1af8a6bb5186c314d41c4c8
    • Instruction Fuzzy Hash: 0C115976318A8082EB109B12F84CB5EB3A1F794BE5F444125EE9A47F68CFBCC149CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorInfoLast
    • String ID:
    • API String ID: 189849726-0
    • Opcode ID: b3486acb5be8b198c16fe08b771984a76368ce0ba2e95de7802cfff15c464e33
    • Instruction ID: 649757d56dc0bb2a91218a3ab255122a3d37a06a1e2fc91fcd0b6c7d1ebde014
    • Opcode Fuzzy Hash: b3486acb5be8b198c16fe08b771984a76368ce0ba2e95de7802cfff15c464e33
    • Instruction Fuzzy Hash: B9B1F2323057E08ADB15CF66E4547AE77A5F788B88F84822ADF8987754EF39C181CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWide$Info
    • String ID:
    • API String ID: 1775632426-0
    • Opcode ID: 2d90b2b54ccd2e60352f476bd800f3d2100da5d7e85102e0396c8d6fc970bf6c
    • Instruction ID: 699d74440b92672e1f4ecfb8c3fda69d34f9840387fdaed15f9ace83e0d98aae
    • Opcode Fuzzy Hash: 2d90b2b54ccd2e60352f476bd800f3d2100da5d7e85102e0396c8d6fc970bf6c
    • Instruction Fuzzy Hash: E9910772706BC05ADB318F25988877A7B93F785BE8F484715DE6957784DB38C688C310
    APIs
    • MultiByteToWideChar.KERNEL32 ref: 02C59ECA
    • malloc.LIBCMT ref: 02C59F33
    • MultiByteToWideChar.KERNEL32 ref: 02C59F67
    • LCMapStringW.KERNEL32 ref: 02C59F8E
    • LCMapStringW.KERNEL32 ref: 02C59FD6
    • malloc.LIBCMT ref: 02C5A033
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • LCMapStringW.KERNEL32 ref: 02C5A068
    • WideCharToMultiByte.KERNEL32 ref: 02C5A0A8
    • free.LIBCMT ref: 02C5A0BC
    • free.LIBCMT ref: 02C5A0CD
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
    • String ID:
    • API String ID: 1080698880-0
    • Opcode ID: 212a4c3b0deda1fbab8d7a46e28323f5a226f924b4e173925b22eeaff756e0a3
    • Instruction ID: 3716079dbe42fe7e9fdaf4f44694f4c651d95d2c4b09706a1cc702e77736026c
    • Opcode Fuzzy Hash: 212a4c3b0deda1fbab8d7a46e28323f5a226f924b4e173925b22eeaff756e0a3
    • Instruction Fuzzy Hash: 5E71F7323147908ADB248F26D84475977A5FBC8BE8F444729EE5E47B94DB39C280C748
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
    • String ID:
    • API String ID: 1080698880-0
    • Opcode ID: 8864ca2f36b3b28a6e37dacfbbe885c608440c4a788fc07bea0ef3c91e2c5cf3
    • Instruction ID: c52f28983bac98480dda496d48eac7271beee4032ca1b8e84b5b6bc1b3276447
    • Opcode Fuzzy Hash: 8864ca2f36b3b28a6e37dacfbbe885c608440c4a788fc07bea0ef3c91e2c5cf3
    • Instruction Fuzzy Hash: E881D532B0878246EF24AF259440569E7A1FF48BA4F840A35DE7E53BD9DF3CD4009798
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 2295021086-0
    • Opcode ID: 1d646d828de0aace6474db1b56eecb5c83fbf8c445fe68ef6d6efd0ca843a860
    • Instruction ID: ee2fc4be55448a3be1874783d46cdf5ef8cd3ea5c12a3610d364bbb506030e47
    • Opcode Fuzzy Hash: 1d646d828de0aace6474db1b56eecb5c83fbf8c445fe68ef6d6efd0ca843a860
    • Instruction Fuzzy Hash: 3641FB72601F909AEB219F26C4C83BC7A66F7807ACF344625CE591BB94DB3CC181C755
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 2295021086-0
    • Opcode ID: bd3480430a4880f8b9bfe9aab1841d67a6c611096bbe8aa784dae63e06954dd0
    • Instruction ID: dbd3b66ff9e8b28e4376566015355152daef6f26f72c9e3813312fac93b989f1
    • Opcode Fuzzy Hash: bd3480430a4880f8b9bfe9aab1841d67a6c611096bbe8aa784dae63e06954dd0
    • Instruction Fuzzy Hash: B451EA22E0868259FB61BF65C4443BCF6A0AF4C758F948131DA7D06ACDCF3C9449B7A8
    APIs
    • GetStartupInfoW.KERNEL32 ref: 02C61C91
      • Part of subcall function 02C5A860: Sleep.KERNEL32 ref: 02C5A8A5
    • GetFileType.KERNEL32 ref: 02C61DFC
    • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 02C61E3A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
    • String ID: @
    • API String ID: 3473179607-2766056989
    • Opcode ID: ab5030fe6963260d57b7d113dea0ca27346005c31587775712d3cdfdcbca818d
    • Instruction ID: 6eb8207d88fd917e44108c433d6da262ac39cc01285f3a094e91a6bd368a3c55
    • Opcode Fuzzy Hash: ab5030fe6963260d57b7d113dea0ca27346005c31587775712d3cdfdcbca818d
    • Instruction Fuzzy Hash: D0817A62200B8486EB148F25D88C72D77A5FB85B79F588329CA7E437E4EBB8C159D314
    APIs
    • _lock.LIBCMT ref: 00007FF7F8DFA119
      • Part of subcall function 00007FF7F8DFD9D8: _amsg_exit.LIBCMT ref: 00007FF7F8DFDA02
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF7F8DFA2DD,?,?,00000000,00007FF7F8DFDA07,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DFA14C
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF7F8DFA2DD,?,?,00000000,00007FF7F8DFDA07,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DFA16A
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF7F8DFA2DD,?,?,00000000,00007FF7F8DFDA07,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DFA1AA
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF7F8DFA2DD,?,?,00000000,00007FF7F8DFDA07,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DFA1C4
    • DecodePointer.KERNEL32(?,?,00000000,?,?,ceil,00000000,00007FF7F8DFA2DD,?,?,00000000,00007FF7F8DFDA07,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DFA1D4
    • ExitProcess.KERNEL32 ref: 00007FF7F8DFA260
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DecodePointer$ExitProcess_amsg_exit_lock
    • String ID: ceil
    • API String ID: 3411037476-3069211559
    • Opcode ID: 9a183ae1f03644b8a62f51de8d9c4146bcd30d60da9bb7abc91cae87c8d0ceca
    • Instruction ID: 9a9eb49043f91c09e52b575f2fbab3330455fd932cb08c6bfe7196577b3f7b90
    • Opcode Fuzzy Hash: 9a183ae1f03644b8a62f51de8d9c4146bcd30d60da9bb7abc91cae87c8d0ceca
    • Instruction Fuzzy Hash: 6E417021A1AA5281E754BB01EC40139E294FF88798FC41035ED7E47BD9DF3CE459E7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AddressProc$HandleModule
    • String ID: ZwQueryInformationProcess$ZwQueryObject$ZwQuerySystemInformation$ntdll.dll
    • API String ID: 667068680-3590752221
    • Opcode ID: 7eda7db14e39e4496a90eac640427b40b534a2017adf1ab763c42458caa272a6
    • Instruction ID: 6319fdb0983819fa2917ee8730c68f59b8c3f22d505ff3447f107419fc3f052e
    • Opcode Fuzzy Hash: 7eda7db14e39e4496a90eac640427b40b534a2017adf1ab763c42458caa272a6
    • Instruction Fuzzy Hash: 8E11D660686B4581FF149B11F86CB5D23E0FB48794F89902AC84A46361EFBD86D9CB80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 848fe9144c0ebe6d5704ff2d6dfc4fbfde9db1d0d9278778837188ee504204a3
    • Instruction ID: 1ce50761a9042fcbd30d1fadb7f6858e0b18100c921e09a4c4891ee05f631fbf
    • Opcode Fuzzy Hash: 848fe9144c0ebe6d5704ff2d6dfc4fbfde9db1d0d9278778837188ee504204a3
    • Instruction Fuzzy Hash: 4C31E2302186054FD31A6F6C9C82239BBD1FB46320B9616E9D453872E2EF75AD429FD2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
    • String ID:
    • API String ID: 3019579578-0
    • Opcode ID: 9243fe9860c2d7fa6fe3e49f17d1100e496bc96adbcf19a71ea8e46669bffbd9
    • Instruction ID: eaf6e9198fb56e7b3467df495a795bdc69692eb370607785e17be06e4afd195a
    • Opcode Fuzzy Hash: 9243fe9860c2d7fa6fe3e49f17d1100e496bc96adbcf19a71ea8e46669bffbd9
    • Instruction Fuzzy Hash: C6414C722046808BEB309F26E44432FB765F789B58F640119DB9A83F68DF7CE695CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
    • String ID:
    • API String ID: 3019579578-0
    • Opcode ID: 1cc5bff3dd2912bbf840fa48739d8834fcdebc8cdae61fe5ead118e36bb8da40
    • Instruction ID: 1e7d96eb800a56fff2ac95c4b4d0daf6f5c290153cff650792606f617bfb77ea
    • Opcode Fuzzy Hash: 1cc5bff3dd2912bbf840fa48739d8834fcdebc8cdae61fe5ead118e36bb8da40
    • Instruction Fuzzy Hash: 77412122A0864187E770AB21E44013EF3A5FB98750F944535D7BE43AD9CF3CF489A798
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2315031519-0
    • Opcode ID: 5f53cfc1179e25de2a7bc686976dccc490792cdf04e3233ada5533c2cb284a6f
    • Instruction ID: e74eaa1ef48f74f8846ad6f1f1b4d24fa4ccd2df05c4ca93493b0b259521f290
    • Opcode Fuzzy Hash: 5f53cfc1179e25de2a7bc686976dccc490792cdf04e3233ada5533c2cb284a6f
    • Instruction Fuzzy Hash: B221FB723106D089D702AF65ACC873DB692EB80BA8F864915DE250B7D0CF79C489DB15
    APIs
    • SetLastError.KERNEL32 ref: 02C460EA
    • TryEnterCriticalSection.KERNEL32 ref: 02C4610B
    • TryEnterCriticalSection.KERNEL32 ref: 02C4611D
    • SetLastError.KERNEL32 ref: 02C46136
    • LeaveCriticalSection.KERNEL32 ref: 02C46140
    • LeaveCriticalSection.KERNEL32 ref: 02C4614A
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: 48dac4b21eb6e7b5e3d8e5b91d253a18b64a32894f61ad1e43b8c3cea6ed7d97
    • Instruction ID: a597ed52bb9f1f3c7a23143935af27fa14e5e45dd24c4fac74d0b4d8fa0a2ba1
    • Opcode Fuzzy Hash: 48dac4b21eb6e7b5e3d8e5b91d253a18b64a32894f61ad1e43b8c3cea6ed7d97
    • Instruction Fuzzy Hash: 1E314F32A14640C7EB50DF39E84876E37A9FB85F4CF640025DA0B86A69DF39C98AC700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterErrorLastLeave
    • String ID:
    • API String ID: 4082018349-0
    • Opcode ID: 3a839ef8a6bf8d7d73b88de66420fd037dbe664b26c5089cd47badf1e2dfdb2a
    • Instruction ID: 210965376eda8d265dca7c492cfe8b4af41f7a15ca7f0032bf8a4ef3596ac979
    • Opcode Fuzzy Hash: 3a839ef8a6bf8d7d73b88de66420fd037dbe664b26c5089cd47badf1e2dfdb2a
    • Instruction Fuzzy Hash: 78317231A18502C6E750AF24E84416DF7A4FF49B48F904431DA3E866E9DF3DE84AE7A4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: File$CloseCreateHandleWritelstrlenwsprintf
    • String ID: %s %s
    • API String ID: 2369136734-2939940506
    • Opcode ID: 5ea41a88a58f2c7f305451d4300e81fe3f17e369e3a8f1804c932f848bbce38b
    • Instruction ID: 4e9154372e2e49658d62b26f8dcd0f957b8619973a670c7bdc357c8d1956fce0
    • Opcode Fuzzy Hash: 5ea41a88a58f2c7f305451d4300e81fe3f17e369e3a8f1804c932f848bbce38b
    • Instruction Fuzzy Hash: 83317C3220898596FB30CF21F858B9BB361F7C47A8F8451199A5E47EA8DF7CC649CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: 185926cb2a2ef340d032c909d3dd190048f826ac508436160d532d0de34cde17
    • Instruction ID: f9d6c52836014d4944b05e2a8ce9fe110887c2567a2054b4d9b56f03d0349b86
    • Opcode Fuzzy Hash: 185926cb2a2ef340d032c909d3dd190048f826ac508436160d532d0de34cde17
    • Instruction Fuzzy Hash: D551C230910A0A8FDB269F58C8847AE7BA5FF45329FA446EDD85AC7191DF34C481CB92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: 90d7559ce3c1ba1b893ff1d7ffa023aeba0d0dc54084b470172c972e3218c3c4
    • Instruction ID: 969042abdec33a281d582d268e0608749298a91ee0470efc38c0c53a8fadf5ff
    • Opcode Fuzzy Hash: 90d7559ce3c1ba1b893ff1d7ffa023aeba0d0dc54084b470172c972e3218c3c4
    • Instruction Fuzzy Hash: 52410430614A5A4FDB18DF28D49232877E1FB4A318BA80799DD99C3591D724D482CBC2
    APIs
      • Part of subcall function 02C44C70: EnterCriticalSection.KERNEL32 ref: 02C44C9E
      • Part of subcall function 02C44C70: LeaveCriticalSection.KERNEL32 ref: 02C44CF2
    • send.WS2_32 ref: 02C44AC3
    • EnterCriticalSection.KERNEL32 ref: 02C44AD7
    • LeaveCriticalSection.KERNEL32 ref: 02C44AEB
    • HeapFree.KERNEL32 ref: 02C44B67
    • WSAGetLastError.WS2_32 ref: 02C44BB4
    • EnterCriticalSection.KERNEL32 ref: 02C44BC8
    • LeaveCriticalSection.KERNEL32 ref: 02C44C16
    • HeapFree.KERNEL32 ref: 02C44C54
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
    • String ID:
    • API String ID: 1701177279-0
    • Opcode ID: b90c38a7879365d68958e5b8cc995af9841d5b1ff57e083cd5719233021dd6a7
    • Instruction ID: 6dd69ca6714eff0c87afc167d032513ccfb29df263effaeccd9426badc3f2168
    • Opcode Fuzzy Hash: b90c38a7879365d68958e5b8cc995af9841d5b1ff57e083cd5719233021dd6a7
    • Instruction Fuzzy Hash: C3518D36204B808AE778CF26E4547AE77A1F788B98F644029CB4A47F54DF38D6A5C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
    • String ID:
    • API String ID: 1701177279-0
    • Opcode ID: c1be7f863ec74c84b7929cd5dfa0ec5487756cd30b1768cbd88e9af37da90106
    • Instruction ID: ae1dd436ee01482fa2b775f7688a5a585150fd7caa09ae57a85051cbdfa438ed
    • Opcode Fuzzy Hash: c1be7f863ec74c84b7929cd5dfa0ec5487756cd30b1768cbd88e9af37da90106
    • Instruction Fuzzy Hash: 33518032608A4186E764EF26D4403ADF3A1FF48B84F805035DB2E47B98DF38E599E394
    APIs
    • CreateWaitableTimerW.KERNEL32 ref: 02C43F72
      • Part of subcall function 02C41370: free.LIBCMT ref: 02C41390
      • Part of subcall function 02C41370: malloc.LIBCMT ref: 02C413BC
    • setsockopt.WS2_32 ref: 02C4400D
    • setsockopt.WS2_32 ref: 02C44037
    • ResetEvent.KERNEL32 ref: 02C44085
    • SetLastError.KERNEL32 ref: 02C440B0
    • GetLastError.KERNEL32 ref: 02C440C8
      • Part of subcall function 02C44D20: GetCurrentThreadId.KERNEL32 ref: 02C44D2D
    • SetLastError.KERNEL32 ref: 02C440DA
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$CreateCurrentEventResetThreadTimerWaitablefreemalloc
    • String ID:
    • API String ID: 3356772049-0
    • Opcode ID: 0c4811832e00cbba20dc30ab256636ffacc8145d99394b55781261f507fde945
    • Instruction ID: 782f7993c8039685c38c0cae2a2f30815dfa443d2752eb585270f1470b5580da
    • Opcode Fuzzy Hash: 0c4811832e00cbba20dc30ab256636ffacc8145d99394b55781261f507fde945
    • Instruction Fuzzy Hash: 04415872204B809BE714CF2AE94875E77A1F788788F244129DB8987B90CF7ED169CF40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2959964966-0
    • Opcode ID: ddf155117954088a0bb4e70bdf1f4365ac3464c973803e0f49b68c972f192fe3
    • Instruction ID: 67177008a52eb363ba2b1448761419d1d425d0c5db628896316136824b491626
    • Opcode Fuzzy Hash: ddf155117954088a0bb4e70bdf1f4365ac3464c973803e0f49b68c972f192fe3
    • Instruction Fuzzy Hash: 59312B3261464186DB248F3AD6CC37C37A0F7C5798F244615DFA987B90CB38C5A2DB46
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Event$CloseCurrentSleepThreadTimeclosesocketsendshutdowntime
    • String ID:
    • API String ID: 929257074-0
    • Opcode ID: 6c1e56b6404b1df93eb3e627f74c895b445532c7761a8052013e281b186b1800
    • Instruction ID: cb10b5d7d4387ba55fc6b1702df666d854ae52022f73c96a5ba0916155b2732b
    • Opcode Fuzzy Hash: 6c1e56b6404b1df93eb3e627f74c895b445532c7761a8052013e281b186b1800
    • Instruction Fuzzy Hash: 8F31823261065087E7259F35F84872E7372F794FE9F981225EA6A4BA98CF34C885CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Event$CloseCurrentSleepThreadTimeclosesocketsendshutdowntime
    • String ID:
    • API String ID: 929257074-0
    • Opcode ID: e6689e71db0ff1669b26d14558efafb386105a6056d856fa6fa8066e84783edc
    • Instruction ID: a1f27d17d222e102ac8c2827a3ebff01eae65736a559b63d5c2c121ac190aa4f
    • Opcode Fuzzy Hash: e6689e71db0ff1669b26d14558efafb386105a6056d856fa6fa8066e84783edc
    • Instruction Fuzzy Hash: 5B314D32A14A5686E710AF25E84012CF372FF88F65F944231DA7E466D8CF3CD849E7A4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Message$Peek$CloseDispatchErrorEventHandleLastMultipleObjectsTranslateWait
    • String ID:
    • API String ID: 1713936993-0
    • Opcode ID: d3b14ee8f2ed008a71182c7c102088909806aed2bf3454968681f8c368bda903
    • Instruction ID: ad954e182a867e67365b5d445f141253b5d852a84308e7b5224dcb98a56ced65
    • Opcode Fuzzy Hash: d3b14ee8f2ed008a71182c7c102088909806aed2bf3454968681f8c368bda903
    • Instruction Fuzzy Hash: DD216D36610A4183F7208F34E45CB2E73A1FBD4B48FA45629EB5A869B4DF39C549CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Event$HeapReset$CreateCriticalDestroyEnterFreeSection
    • String ID:
    • API String ID: 1658878062-0
    • Opcode ID: b8e90da5e81a1c5bd4b7ea335600b5e9df7185687b6b9f4d8d1a246453650ad8
    • Instruction ID: aeae14fadf4f7b8edf6ad2594a63a27ed9170a8c9344f94717c706de83ab05b5
    • Opcode Fuzzy Hash: b8e90da5e81a1c5bd4b7ea335600b5e9df7185687b6b9f4d8d1a246453650ad8
    • Instruction Fuzzy Hash: 5131F932604A91E2E748EB21D9402ADF364FF48B80F904536DB7E43695CF38A5B9E794
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Message$Peek$CloseDispatchErrorEventHandleLastMultipleObjectsTranslateWait
    • String ID:
    • API String ID: 1713936993-0
    • Opcode ID: 446e21ef8d1e23cb48fe62aa3044cfdae947c01fbde446d7c73040613798d1b3
    • Instruction ID: f31a6746855c1beb494e4427a58f9819f6c27ba461ce647b3ce390eafebfe1be
    • Opcode Fuzzy Hash: 446e21ef8d1e23cb48fe62aa3044cfdae947c01fbde446d7c73040613798d1b3
    • Instruction Fuzzy Hash: 4A21C531B1495282F750AF34E854B39F2A0FF88704F905535DA7E425E8DF3CD849E698
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 02C62BFB
      • Part of subcall function 02C5C13C: _set_error_mode.LIBCMT ref: 02C5C145
      • Part of subcall function 02C5C13C: _set_error_mode.LIBCMT ref: 02C5C154
      • Part of subcall function 02C5BEDC: _set_error_mode.LIBCMT ref: 02C5BF21
      • Part of subcall function 02C5BEDC: _set_error_mode.LIBCMT ref: 02C5BF32
      • Part of subcall function 02C5BEDC: GetModuleFileNameW.KERNEL32 ref: 02C5BF94
      • Part of subcall function 02C5BB48: ExitProcess.KERNEL32 ref: 02C5BB57
      • Part of subcall function 02C5A7E0: malloc.LIBCMT ref: 02C5A80B
      • Part of subcall function 02C5A7E0: Sleep.KERNEL32 ref: 02C5A81E
    • _errno.LIBCMT ref: 02C62C3D
    • _lock.LIBCMT ref: 02C62C51
    • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 02C62C67
    • free.LIBCMT ref: 02C62C74
    • _errno.LIBCMT ref: 02C62C79
    • LeaveCriticalSection.KERNEL32 ref: 02C62C9C
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
    • String ID:
    • API String ID: 113790786-0
    • Opcode ID: 33667054d2d382180aecc97be551a92e30174e25f3312452b72f7abc52412f6f
    • Instruction ID: fa5184404295c2d8f62c76f16f60dcb68e05379bfbe4249bbc9f051dd4d5861c
    • Opcode Fuzzy Hash: 33667054d2d382180aecc97be551a92e30174e25f3312452b72f7abc52412f6f
    • Instruction Fuzzy Hash: A5217C31615A9096F725AB61E89C73E6367FB857C4F444528CE4B4BB84CF7CC880DB16
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 00007FF7F8DFD917
      • Part of subcall function 00007FF7F8DFA56C: _set_error_mode.LIBCMT ref: 00007FF7F8DFA575
      • Part of subcall function 00007FF7F8DFA56C: _set_error_mode.LIBCMT ref: 00007FF7F8DFA584
      • Part of subcall function 00007FF7F8DFA30C: _set_error_mode.LIBCMT ref: 00007FF7F8DFA351
      • Part of subcall function 00007FF7F8DFA30C: _set_error_mode.LIBCMT ref: 00007FF7F8DFA362
      • Part of subcall function 00007FF7F8DFA30C: GetModuleFileNameW.KERNEL32 ref: 00007FF7F8DFA3C4
      • Part of subcall function 00007FF7F8DF9F5C: ExitProcess.KERNEL32 ref: 00007FF7F8DF9F6B
      • Part of subcall function 00007FF7F8DFC020: malloc.LIBCMT ref: 00007FF7F8DFC04B
      • Part of subcall function 00007FF7F8DFC020: Sleep.KERNEL32(?,?,ceil,00007FF7F8DFD951,?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951,?,?,00000000,00007FF7F8DFBA08), ref: 00007FF7F8DFC05E
    • _errno.LIBCMT ref: 00007FF7F8DFD959
    • _lock.LIBCMT ref: 00007FF7F8DFD96D
    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951,?,?,00000000,00007FF7F8DFBA08,?,?,?,00007FF7F8DF938D), ref: 00007FF7F8DFD983
    • free.LIBCMT ref: 00007FF7F8DFD990
    • _errno.LIBCMT ref: 00007FF7F8DFD995
    • LeaveCriticalSection.KERNEL32(?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951,?,?,00000000,00007FF7F8DFBA08,?,?,?,00007FF7F8DF938D), ref: 00007FF7F8DFD9B8
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
    • String ID:
    • API String ID: 113790786-0
    • Opcode ID: 1cf7f058a8983c64bfdf0fb23590526f2e0664be90d8ed4957796866281ab8dc
    • Instruction ID: 0026f92163886604212553210f6062e19e6a876d6189917a5fc2090abe0dc7d2
    • Opcode Fuzzy Hash: 1cf7f058a8983c64bfdf0fb23590526f2e0664be90d8ed4957796866281ab8dc
    • Instruction Fuzzy Hash: AB214121E1D64281F754BB90A40477EE260AF88758F844434E5BE866CECF3CE448B7E9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: b5fb49aade42dab13695008c08efaa2d362d7f19c4323bfb84cd0e511f7debe0
    • Instruction ID: bf5d35686146695de2fca20bc9eeb8ef9c9740b77e8bab9c829571745fc97c15
    • Opcode Fuzzy Hash: b5fb49aade42dab13695008c08efaa2d362d7f19c4323bfb84cd0e511f7debe0
    • Instruction Fuzzy Hash: 31C1D330618B488FC71ADF28D4947A9BBE1FB59304F5046AEE59AC72D2DF35D881CB81
    APIs
    • free.LIBCMT ref: 02C42576
    • malloc.LIBCMT ref: 02C4265D
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$AllocHeap_callnewhfreemalloc
    • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
    • API String ID: 3198430600-868042568
    • Opcode ID: 750ebd41106a62b2082671337faf29e5c6b948eda958e7ceff3e7b47e59073a6
    • Instruction ID: fa0b99a7b4a44f2b2d8625b59ee243fe94623d8614d098d6d1773612d4f2b57b
    • Opcode Fuzzy Hash: 750ebd41106a62b2082671337faf29e5c6b948eda958e7ceff3e7b47e59073a6
    • Instruction Fuzzy Hash: 09D1AF72A046808BD734CF29E451B6FBBA1F784B88F188015EF9A83B54DF78D581CB52
    APIs
    • free.LIBCMT ref: 00007FF7F8DF25A6
    • malloc.LIBCMT ref: 00007FF7F8DF268D
      • Part of subcall function 00007FF7F8DF9070: _FF_MSGBANNER.LIBCMT ref: 00007FF7F8DF90A0
      • Part of subcall function 00007FF7F8DF9070: HeapAlloc.KERNEL32(?,?,0001939100000000,00007FF7F8DFC050,?,?,ceil,00007FF7F8DFD951,?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DF90C5
      • Part of subcall function 00007FF7F8DF9070: _callnewh.LIBCMT ref: 00007FF7F8DF90DE
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90E9
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$AllocHeap_callnewhfreemalloc
    • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
    • API String ID: 3198430600-868042568
    • Opcode ID: dda5b54ef822ff448da02969afc54e1d0890a7d0193f906d4744a84604512da3
    • Instruction ID: 83256429ec3996357a0fc28d70d137da1a193816e809c13ddea4da69db365b59
    • Opcode Fuzzy Hash: dda5b54ef822ff448da02969afc54e1d0890a7d0193f906d4744a84604512da3
    • Instruction Fuzzy Hash: 26E1BA72A086824AE7749B25E41066AFBA1FF48744F944031DBBD437C9DF3CE845EBA4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 2545b9cca8e253d8dc5762f349c41804750cab19d6113a61705cd40064087c66
    • Instruction ID: 4a555bb186704567a04891cbaabe318ea61b4f52810b1e602733e438e11fe601
    • Opcode Fuzzy Hash: 2545b9cca8e253d8dc5762f349c41804750cab19d6113a61705cd40064087c66
    • Instruction Fuzzy Hash: 66C14032704B5189DB20DF62E484AEE77A5F799788F804926DE8D87B14EF78C246CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
    • String ID:
    • API String ID: 3473179607-0
    • Opcode ID: eff7a9d518b47b5a0bc449bc8e70df270870fd33741806fcd9b591f6a57ce8e5
    • Instruction ID: ea69d1bce20c6f3604a067958b8492dfad2419468d73f04a63205da82e19290a
    • Opcode Fuzzy Hash: eff7a9d518b47b5a0bc449bc8e70df270870fd33741806fcd9b591f6a57ce8e5
    • Instruction Fuzzy Hash: 6081B222A09A8685EB14AF14D444328F360EF09B78F944334DA7E873D4DF3CE459E3A8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
    • String ID:
    • API String ID: 3058130114-0
    • Opcode ID: beb139878c52618ef897b8691ffbca13a1492810dcd6d59fbe55f6b96b8c9a26
    • Instruction ID: 6a8c93679b09f8678b249f9d716d308e0061743d8afe01c815574714e8f6a3ae
    • Opcode Fuzzy Hash: beb139878c52618ef897b8691ffbca13a1492810dcd6d59fbe55f6b96b8c9a26
    • Instruction Fuzzy Hash: 7E517E32200B8086EB389F35E85476E33A5F788B98F685626DF5A87B98DF35C540C710
    APIs
    • _fileno.LIBCMT ref: 02B180EC
      • Part of subcall function 02B12459: _errno.LIBCMT ref: 02B12462
      • Part of subcall function 02B12459: _invalid_parameter_noinfo.LIBCMT ref: 02B1246D
    • _errno.LIBCMT ref: 02B180FC
    • _errno.LIBCMT ref: 02B1811A
    • _isatty.LIBCMT ref: 02B1817B
    • _getbuf.LIBCMT ref: 02B18187
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-3916222277
    • Opcode ID: 9cfdfbc458954deeb4a0b404a564ae95b52451a34d067603e47cbed6cac4525b
    • Instruction ID: 037c74d29e1def5e8f42638bb6f1ab1cfd291219ab8025aa78a49e7605550b1e
    • Opcode Fuzzy Hash: 9cfdfbc458954deeb4a0b404a564ae95b52451a34d067603e47cbed6cac4525b
    • Instruction Fuzzy Hash: 2D411331114A088FEB19EF2CC8C236A77E1FB49314BA846D9D856CB295D774C8A2CBC1
    APIs
      • Part of subcall function 02C55378: malloc.LIBCMT ref: 02C55392
      • Part of subcall function 02C55378: _callnewh.LIBCMT ref: 02C55386
      • Part of subcall function 02C55378: std::exception::exception.LIBCMT ref: 02C553FF
    • RegCreateKeyW.ADVAPI32 ref: 02C4DD64
    • RegDeleteValueW.ADVAPI32 ref: 02C4DDA8
    • RegSetValueExW.ADVAPI32 ref: 02C4DDC8
    • RegCloseKey.ADVAPI32 ref: 02C4DDDF
    • CloseHandle.KERNEL32 ref: 02C4E673
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseValue$CreateDeleteHandle_callnewhmallocstd::exception::exception
    • String ID: Console\1
    • API String ID: 2917754286-1035756066
    • Opcode ID: 2219b0c576fd3e4d0e08784fb7636a5387038700b04224bb1bd2999f53d07214
    • Instruction ID: f351130ce9af246e3b131741d9024cd65d1a135b94cb9d66f1097bdf088729a9
    • Opcode Fuzzy Hash: 2219b0c576fd3e4d0e08784fb7636a5387038700b04224bb1bd2999f53d07214
    • Instruction Fuzzy Hash: 13519C36305B9086EB58DF22F858BAE73A9F789B94F4101299E4E47B54DF38C190CB49
    APIs
    • _fileno.LIBCMT ref: 02C6861B
      • Part of subcall function 02C62988: _errno.LIBCMT ref: 02C62991
      • Part of subcall function 02C62988: _invalid_parameter_noinfo.LIBCMT ref: 02C6299C
    • _errno.LIBCMT ref: 02C6862B
    • _errno.LIBCMT ref: 02C68649
    • _isatty.LIBCMT ref: 02C686AA
    • _getbuf.LIBCMT ref: 02C686B6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-3916222277
    • Opcode ID: e332a1d343aa96d4712a9f575034e96bbd1a86f49911222e96935b0e9a9d528d
    • Instruction ID: f2a02f9fa93e7da4dabe6e95ac9027f7f8c6748f3be44ff6269e55dd5aac41f8
    • Opcode Fuzzy Hash: e332a1d343aa96d4712a9f575034e96bbd1a86f49911222e96935b0e9a9d528d
    • Instruction Fuzzy Hash: 6A41D272600B4086DB289F29D4C933D77A1EBC4FA8F144325DB69473D8EB79C599CB81
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: 6f8e169bf0c238c0896c732fd30432087507e8190a6d38f4576da17dd70d7c1e
    • Instruction ID: aeec9fab672e0b9a0c04191ed2dd69b158fa81df7f02f1b906c165eaeee7a0f1
    • Opcode Fuzzy Hash: 6f8e169bf0c238c0896c732fd30432087507e8190a6d38f4576da17dd70d7c1e
    • Instruction Fuzzy Hash: B6312530614E494F976ADB2C8CC4335FA92FB8933476847EDD52AC31E5CF34A8429781
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: 0171350d7c42b833be816d31522f34c7348a87f46c9bfcf9d0117abcfaf58286
    • Instruction ID: 230e52eb59d29c851232edd9b7aca40150e3845e874eed569edc0d2ab68f8b24
    • Opcode Fuzzy Hash: 0171350d7c42b833be816d31522f34c7348a87f46c9bfcf9d0117abcfaf58286
    • Instruction Fuzzy Hash: 8C21F130210E490EDB2AAB288CD4379BA91EB8533975407EDC82AC61E1DF78B442D685
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DecodePointer$ExitProcess_amsg_exit_lock
    • String ID:
    • API String ID: 3411037476-0
    • Opcode ID: 996cd0f5924440a7e34d656a764d071a0c653d38d32bb3c9cf5966984726c4a8
    • Instruction ID: eaad4379fc4c2c0200dd5ed6a4555afe0b1094b223f4aaba98970e5cd98a3900
    • Opcode Fuzzy Hash: 996cd0f5924440a7e34d656a764d071a0c653d38d32bb3c9cf5966984726c4a8
    • Instruction Fuzzy Hash: 6C319E31216B6182E714DF12F88871DBAA5F788BC8F145029EE8E43B28EF78C895C705
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast$setsockopt$CreateCurrentEventResetThreadTimerWaitablefreemalloc
    • String ID:
    • API String ID: 3356772049-0
    • Opcode ID: 73a169a4cf32f37848a49fcc32154ae59d27d63d7761706b7a505c6040b8b509
    • Instruction ID: 4d1f477ea56542a97c68b6cff422934d3289c653fa06f03bb09fd960bc65252a
    • Opcode Fuzzy Hash: 73a169a4cf32f37848a49fcc32154ae59d27d63d7761706b7a505c6040b8b509
    • Instruction Fuzzy Hash: 68419D32A08A4287E710AF15E904369F7A0FF48748F504035DBAD47BD4CF7EE069AB98
    APIs
      • Part of subcall function 02C5BA94: HeapCreate.KERNEL32 ref: 02C5BAAA
      • Part of subcall function 02C5BA94: GetVersion.KERNEL32 ref: 02C5BABC
      • Part of subcall function 02C5BA94: HeapSetInformation.KERNEL32 ref: 02C5BADA
    • _RTC_Initialize.LIBCMT ref: 02C570BE
    • GetCommandLineA.KERNEL32 ref: 02C570C3
      • Part of subcall function 02C623B0: GetEnvironmentStringsW.KERNEL32 ref: 02C623C9
      • Part of subcall function 02C623B0: WideCharToMultiByte.KERNEL32 ref: 02C62420
      • Part of subcall function 02C623B0: WideCharToMultiByte.KERNEL32 ref: 02C6245B
      • Part of subcall function 02C623B0: free.LIBCMT ref: 02C62468
      • Part of subcall function 02C623B0: FreeEnvironmentStringsW.KERNEL32 ref: 02C62473
      • Part of subcall function 02C61C70: GetStartupInfoW.KERNEL32 ref: 02C61C91
    • __setargv.LIBCMT ref: 02C570EC
    • _cinit.LIBCMT ref: 02C57100
      • Part of subcall function 02C5DE2C: FlsFree.KERNEL32 ref: 02C5DE3B
      • Part of subcall function 02C5DE2C: DeleteCriticalSection.KERNEL32 ref: 02C62B67
      • Part of subcall function 02C5DE2C: free.LIBCMT ref: 02C62B70
      • Part of subcall function 02C5DE2C: DeleteCriticalSection.KERNEL32 ref: 02C62B97
      • Part of subcall function 02C61F44: free.LIBCMT ref: 02C61F95
      • Part of subcall function 02C5A860: Sleep.KERNEL32 ref: 02C5A8A5
    • FlsSetValue.KERNEL32 ref: 02C5719A
    • GetCurrentThreadId.KERNEL32 ref: 02C571AE
    • free.LIBCMT ref: 02C571BD
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValueVersion__setargv_cinit_errno
    • String ID:
    • API String ID: 125979975-0
    • Opcode ID: 1b780d2af2d2b08c57e81dbe5f9cf27f7226efad3fa970d95da47f5686e96d3e
    • Instruction ID: aeb347f5d99fe3d88d5002f29964268b400bdd4ee49447156ead0f92aa23d35b
    • Opcode Fuzzy Hash: 1b780d2af2d2b08c57e81dbe5f9cf27f7226efad3fa970d95da47f5686e96d3e
    • Instruction Fuzzy Hash: B531C13020062389FF287B725D4873FA1979FD0799F148179CC1A85288FF78C1C9AA6E
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: b5d223d6e4ffccfbcd201f7a0761cd938b5c4eca7635fc9e2c5005e5e5a0520b
    • Instruction ID: 8cade2cd1d613bd534436d61505cb28323abbbebf3d79c2ef459e82793bc880f
    • Opcode Fuzzy Hash: b5d223d6e4ffccfbcd201f7a0761cd938b5c4eca7635fc9e2c5005e5e5a0520b
    • Instruction Fuzzy Hash: D1213A70218B044FE3296F58DCC277D77C2FB45321F9602C9D406872E6EBA85C418FA2
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: c2676e3cf64facfb2aa860a723b5514dfb9e7683b0f68bc71060f84faa0d350e
    • Instruction ID: 44cb770c59d2cfd5736e19077e2a0906cc8f31cbb22f92291e8e79e830f7a78a
    • Opcode Fuzzy Hash: c2676e3cf64facfb2aa860a723b5514dfb9e7683b0f68bc71060f84faa0d350e
    • Instruction Fuzzy Hash: 4C2129316087044FE31A6F58ECC677D7BC1EB45320F9202DDD846872E1DBA85C828BA2
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: af564db91ba97d0b77235dee38384f54ac06b36b1a5ed8721de6b5247343fed1
    • Instruction ID: eb64a57a2d21c4cbd45841bc36131ff24fc377962995d80f97f4a1641af3a324
    • Opcode Fuzzy Hash: af564db91ba97d0b77235dee38384f54ac06b36b1a5ed8721de6b5247343fed1
    • Instruction Fuzzy Hash: 84214BA2200BD145DF198B399C4433CA252ABD5BA4F945612CE398B3D4DF7CC9C9C308
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AttributesCreateErrorFileLastProcesslstrlen
    • String ID: WinSta0\Default$h
    • API String ID: 591566999-1620045033
    • Opcode ID: 32a352b419bde3d174141e61f84ad47ef660ce78bc64c5ffb13d4ce8ad96e1b3
    • Instruction ID: 2f97d4c989afe0bd057825e5375ba5748a0e5fe6eaef19ba6fc84f654dbc96bd
    • Opcode Fuzzy Hash: 32a352b419bde3d174141e61f84ad47ef660ce78bc64c5ffb13d4ce8ad96e1b3
    • Instruction Fuzzy Hash: 2F31A031604A8186DB709B25F90436EA3A2EB887E4F444235DE6A87F98EF3CC1958B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno
    • String ID: @
    • API String ID: 3947385824-2766056989
    • Opcode ID: a29fee2f15fe2de611211933ed3ced769d455d1257d9a970644a691804d751dc
    • Instruction ID: 9dba7ebe7e4e83957018f59eb95247b7cbb12ee338eaa99f5c9720cb6ea40c1f
    • Opcode Fuzzy Hash: a29fee2f15fe2de611211933ed3ced769d455d1257d9a970644a691804d751dc
    • Instruction Fuzzy Hash: 70214862200A5541DF199B79DC9433CA251ABC0BB8F655722CE3E872E4DF3CC1CAC709
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 960bcc47fac011a08067f3ad3f34acb8a7cf011e8191a2933aabe902673afc03
    • Instruction ID: e5d294afef902cf820e2b5111f170d10eba1565025c0d2e754d87182aa2156a7
    • Opcode Fuzzy Hash: 960bcc47fac011a08067f3ad3f34acb8a7cf011e8191a2933aabe902673afc03
    • Instruction Fuzzy Hash: B8119031518B488FDBA2AF5884817293FE1FB5D315F218ADAE499C72A1D370D881CFC6
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 6f4c3c135e9c5e38bb5c812a90604d286b4a055adc1bb04f68a66392661a6eb9
    • Instruction ID: 2694548468e5ee7d41c612106891ba7b09c9d3a16dfcb5130aad5f29127573ab
    • Opcode Fuzzy Hash: 6f4c3c135e9c5e38bb5c812a90604d286b4a055adc1bb04f68a66392661a6eb9
    • Instruction Fuzzy Hash: A1119D30508A188FEB61BB5C848172937E0FB68364F9048DAD949C72A9E77498C1CB82
    APIs
    • std::exception::exception.LIBCMT ref: 02C4A274
    • std::exception::exception.LIBCMT ref: 02C4A2C0
    • std::exception::exception.LIBCMT ref: 02C4A308
      • Part of subcall function 02C5733C: RaiseException.KERNEL32 ref: 02C573B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: std::exception::exception$ExceptionRaise
    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
    • API String ID: 127205192-1866435925
    • Opcode ID: d53289f82b987d99488ffd486f5e8e9424002f469d181d04e2350c7ea1fe77c1
    • Instruction ID: e485f81edd9cf9380882d9afd89f6cc0b4417f6e61df45fc69ce5e2970278df6
    • Opcode Fuzzy Hash: d53289f82b987d99488ffd486f5e8e9424002f469d181d04e2350c7ea1fe77c1
    • Instruction Fuzzy Hash: 3F31F532A01B2599EB14DBA0E8947DD33B5F744348FA4092ADE5E57A28EF70C25AC780
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: 7d441f806a54c2e3723683bbf3a3878f772776a14d6aadf4dddf8fd5452c1492
    • Instruction ID: b59859dc66567812ffe9d6b66add7326659d936146ea53e1baf27a05a4556693
    • Opcode Fuzzy Hash: 7d441f806a54c2e3723683bbf3a3878f772776a14d6aadf4dddf8fd5452c1492
    • Instruction Fuzzy Hash: 9D112671209A404FD3197F64D8D172DBAD2FF45325FA20AECD05A872E1EFB888408F52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 18e84dbfee4e45401bde94adaa049da0b512f4016e2074da3143f09c66c3302d
    • Instruction ID: 45b0395880b7686bd7301e2f8596cc2b6ac8ce9b855e52d6ecad3c96f0f1eb6e
    • Opcode Fuzzy Hash: 18e84dbfee4e45401bde94adaa049da0b512f4016e2074da3143f09c66c3302d
    • Instruction Fuzzy Hash: A511D3723106D046D7066F25DC8C73DBA52AB81FA6F8A4245DE250B7D0CF78C881DB29
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 5a090e99aeee2951a657be0a8c4efb463e857be8daee4d60eaed3aa4b73c4070
    • Instruction ID: 036fdbe7eedff73ebe94e28be705e21401fb86de5017159de56c6ea6d67dc44e
    • Opcode Fuzzy Hash: 5a090e99aeee2951a657be0a8c4efb463e857be8daee4d60eaed3aa4b73c4070
    • Instruction Fuzzy Hash: B3212222E1854241F7517BA598493BDE5516FC8769F8A4135EA3C0B3CACE7CA444B3F8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: f4454937c5e5bbaa0e9d0a0c22758e5a6eeff2523f96aab8d469512271315ee2
    • Instruction ID: 5598e59bf876ef87e6534c18f66620812ca3c242837aa8c87596ffd93d0ee003
    • Opcode Fuzzy Hash: f4454937c5e5bbaa0e9d0a0c22758e5a6eeff2523f96aab8d469512271315ee2
    • Instruction Fuzzy Hash: 5221C132B1854241FB457B6698052BDE5515FC8BB9F8A4335EA3D0B3DACE3CA444B3B8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: 86a5edae899ae3c1e95562a3141e97825a2d4e34b8035855c9b3c82b72936b35
    • Instruction ID: 24a653b759be57305971f2e1f9454c9345a9d2d7f905d3d8f3f717920f45d837
    • Opcode Fuzzy Hash: 86a5edae899ae3c1e95562a3141e97825a2d4e34b8035855c9b3c82b72936b35
    • Instruction Fuzzy Hash: 7411B4623106D045D6066F969D9833D7652AB80FB6F4A4749CE390B3D1CB7DC882EB28
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$BuffersErrorFileFlushLast__doserrno
    • String ID:
    • API String ID: 1845094721-0
    • Opcode ID: 6cb1097625330db8c14f65dc00d311e544f89a42f5e59361ee9e46fa344e60e4
    • Instruction ID: 5caaf3ca2141d2a75cbb0c4a441fb28071a169a815c734caee0c90b2c19aada2
    • Opcode Fuzzy Hash: 6cb1097625330db8c14f65dc00d311e544f89a42f5e59361ee9e46fa344e60e4
    • Instruction Fuzzy Hash: 7D1108717047C046DB066F69ADCC73D6652ABC0F91F494669DE160B7D1DF78C481CB18
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$BuffersErrorFileFlushLast__doserrno
    • String ID:
    • API String ID: 1845094721-0
    • Opcode ID: 17d30c8fc9599290ce3f70905f1a86dc7465141df05744b8eccb52f7b4e97e35
    • Instruction ID: 440be1e7543a8d49cac48928c10b46eaa80181156f8f6c94a6e34822449a6bbf
    • Opcode Fuzzy Hash: 17d30c8fc9599290ce3f70905f1a86dc7465141df05744b8eccb52f7b4e97e35
    • Instruction Fuzzy Hash: 8C21C521F0864285FB117FA5988427DE550AF80754F954538D63F0E2E6CE7CA844E3B8
    APIs
    • GetForegroundWindow.USER32 ref: 02C51EEF
    • GetWindowTextW.USER32 ref: 02C51F0C
    • lstrlenW.KERNEL32 ref: 02C51F46
    • GetLocalTime.KERNEL32 ref: 02C51F55
    • wsprintfW.USER32 ref: 02C51FA5
      • Part of subcall function 02C51E00: WaitForSingleObject.KERNEL32 ref: 02C51E17
      • Part of subcall function 02C51E00: CreateFileW.KERNEL32 ref: 02C51E49
      • Part of subcall function 02C51E00: SetFilePointer.KERNEL32 ref: 02C51E6E
      • Part of subcall function 02C51E00: lstrlenW.KERNEL32 ref: 02C51E77
      • Part of subcall function 02C51E00: WriteFile.KERNEL32 ref: 02C51E95
      • Part of subcall function 02C51E00: CloseHandle.KERNEL32 ref: 02C51E9E
      • Part of subcall function 02C51E00: ReleaseMutex.KERNEL32 ref: 02C51EAB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: File$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
    • String ID: [
    • API String ID: 3163932117-4056885943
    • Opcode ID: bd11379160462120774f09f7b187f9a014c50a8c89d2790cda105e9129980a75
    • Instruction ID: 4bdc8986435c0d3837db2832f945bfeab7ac1d918eec5df6c382a805f9b006ee
    • Opcode Fuzzy Hash: bd11379160462120774f09f7b187f9a014c50a8c89d2790cda105e9129980a75
    • Instruction Fuzzy Hash: 53317C71218A51C2F710DF22F858B6EF3A5F784744F50802AE98E42A68EF7CC599CF90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: 338a92123b176fe84b8433c97561ad7ed6b063f42bea373834fe5852735bb2e8
    • Instruction ID: c9a7d59efe3a8286ae646ec277fae46d9931c28d1184d9e3487ab1935bf6f3b6
    • Opcode Fuzzy Hash: 338a92123b176fe84b8433c97561ad7ed6b063f42bea373834fe5852735bb2e8
    • Instruction Fuzzy Hash: B111E732710AC056D7056F269DCC33C6A53A781FA1F5A5769EA2A0B7D4CB78C8C1CB28
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_close_nolock_errno
    • String ID:
    • API String ID: 186997739-0
    • Opcode ID: bda87b43c9d570eecaee3d7bd9474c424701c106e53aae398468428abc392862
    • Instruction ID: 802fed0c4fa3055a49f3d8f58e8705b7ddbf3ef15f1a7472d1c0502f08ed45c9
    • Opcode Fuzzy Hash: bda87b43c9d570eecaee3d7bd9474c424701c106e53aae398468428abc392862
    • Instruction Fuzzy Hash: 2C11D522E0858241F7057B65988927CE650AF84765FD94938E53F0F2CACE7CA440A3B8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 871f355d671030dc6432d9a23ab7b6e38f30107320b972de84d7d94d25281080
    • Instruction ID: 01f861e1eb8e57e93e667816a25392fa042406df735ed5f9acc1fbec4aa619c6
    • Opcode Fuzzy Hash: 871f355d671030dc6432d9a23ab7b6e38f30107320b972de84d7d94d25281080
    • Instruction Fuzzy Hash: 4B119A72520BE0CADB206F92948833976A1F794FD0F884025DF941B785CB78C581CB55
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: 4e5a875947b43d510ab27010ab14576f87d5b69a94ba14807e221e2687d3d606
    • Instruction ID: b27578be5fdcc7d13d8b41b6962616a85d0e168c44a7f93841c898119dfbb885
    • Opcode Fuzzy Hash: 4e5a875947b43d510ab27010ab14576f87d5b69a94ba14807e221e2687d3d606
    • Instruction Fuzzy Hash: 9B119732410BA08AC7206B62D40032936A0FB98FD4F999016CFA40B745CB3CC6C1DB69
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$write_char
    • String ID:
    • API String ID: 1772936973-0
    • Opcode ID: c1d3ccc9aad43bc67af73f482cb02ec735a242584822cbb9a96a93b359dba97b
    • Instruction ID: d40da5b1859e87c15ad4d93403d033c900a2d35f0364dfc7ca029d916d74ae12
    • Opcode Fuzzy Hash: c1d3ccc9aad43bc67af73f482cb02ec735a242584822cbb9a96a93b359dba97b
    • Instruction Fuzzy Hash: C5118426C0878186E7147B61940536DF6A0BFD8B98F958030DB78077CADE3CE855F7A5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
    • String ID:
    • API String ID: 3421218197-3916222277
    • Opcode ID: ee7650ada655a41ad3d8abafd2266b15cab2f850138d348df1a1cd45a91815c4
    • Instruction ID: 106aa7c3fb548dcdf33109a510c9377ef5f6ab7dc6d395e32528a2077167c8c1
    • Opcode Fuzzy Hash: ee7650ada655a41ad3d8abafd2266b15cab2f850138d348df1a1cd45a91815c4
    • Instruction Fuzzy Hash: 2701EC32218B8582EB608B64F89DB4EB7A4F784794F50552AE68E43F68DF7CC1498B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
    • String ID:
    • API String ID: 4202892810-0
    • Opcode ID: e7892ef0c60a8620ab59d393f68777d807ece2b1662eb29eea33fc2896f8ec93
    • Instruction ID: 7d3c84da43799379a48f270b5e812027e08d63130e2337ccbd20c94cdf21d0d4
    • Opcode Fuzzy Hash: e7892ef0c60a8620ab59d393f68777d807ece2b1662eb29eea33fc2896f8ec93
    • Instruction Fuzzy Hash: 0A11F772218A4082F7108B62F95CB6E7760F788BB8F544214DA6A43FA4CFBCC5498B00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Value$CloseDeleteOpen
    • String ID: Console$IpDatespecial
    • API String ID: 3183427449-1840232981
    • Opcode ID: 1998c3c541e6b13509c0f1d0a8d7f92d98846318bf4c898897b1f07a1e6dd135
    • Instruction ID: 1bace6f2951a6460ce24f8b618d8bb28d798938640f0e7dd2067df0421dea9d5
    • Opcode Fuzzy Hash: 1998c3c541e6b13509c0f1d0a8d7f92d98846318bf4c898897b1f07a1e6dd135
    • Instruction Fuzzy Hash: AB012C7631AA40C6FB61CB25F858B9D3774F785BA8F405116CE9E03A94CF38C189CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: MOC$RCC$csm
    • API String ID: 3186804695-2671469338
    • Opcode ID: c0c4974f66a59b65bac263467e6f357672968b2de2412f4b3a6b23e22f229d42
    • Instruction ID: 01139a159f199b143787d4667b621675abf3a1fe285c7b979d4eb823a9522fdb
    • Opcode Fuzzy Hash: c0c4974f66a59b65bac263467e6f357672968b2de2412f4b3a6b23e22f229d42
    • Instruction Fuzzy Hash: ACE01A34514206CEEB277BB980883A43EA1FF1830AF8A60E185548B2F4D7BC56D08E63
    APIs
    • _getptd.LIBCMT ref: 02C58C37
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
      • Part of subcall function 02C626F8: _getptd.LIBCMT ref: 02C626FC
    • _getptd.LIBCMT ref: 02C58C49
    • _getptd.LIBCMT ref: 02C58C57
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$_amsg_exit
    • String ID: MOC$RCC$csm
    • API String ID: 2610988583-2671469338
    • Opcode ID: e672e4323665b16ea60b3fb528af4179eb2c0c48703903788b3e2e50e937f095
    • Instruction ID: 6681058e4568344d3cd62666df817e1605df3d5e84e7995e7bdf673bc9f5a87e
    • Opcode Fuzzy Hash: e672e4323665b16ea60b3fb528af4179eb2c0c48703903788b3e2e50e937f095
    • Instruction Fuzzy Hash: 71E01A36912624CEC7292B6580443AC36A2F7D8B0AF86E6B58A454A324C7BDD6C49F16
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$_amsg_exit
    • String ID: MOC$RCC$csm
    • API String ID: 2610988583-2671469338
    • Opcode ID: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
    • Instruction ID: 66fe3faa8aa634e28b8fbe637d6ec92f0a0b51348eeaa44ca88805a6087e74ba
    • Opcode Fuzzy Hash: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
    • Instruction Fuzzy Hash: 4DF0303990910289E7553B1580063B8F190EFAC707FC99974C6B9423C28FBD68C5AAAA
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno_getptd$_lockmalloc
    • String ID:
    • API String ID: 1369581901-0
    • Opcode ID: 52e10ac28cf1521ad55669061b4910638148c623c9a1a3d4419c5e910fa0e778
    • Instruction ID: 2ae8e1aa9c4c5724beb703bfd21b1d800f57e665c20f57c76aba141498a8798d
    • Opcode Fuzzy Hash: 52e10ac28cf1521ad55669061b4910638148c623c9a1a3d4419c5e910fa0e778
    • Instruction Fuzzy Hash: 7151D430A18A044FDB56EF6894C07697BE2FB9C314F1449EDC89AC72D2DB34D842CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocCurrentFreeThread
    • String ID:
    • API String ID: 1155560630-0
    • Opcode ID: cd68a7855d9bff61e79928e65f9b1f850c339330868a212f2d92ce5f7b1a21b2
    • Instruction ID: 1726210e6cc23208d87a3d7f4b1ec38237a9a0171c42b8179d15dfb6f7995e7b
    • Opcode Fuzzy Hash: cd68a7855d9bff61e79928e65f9b1f850c339330868a212f2d92ce5f7b1a21b2
    • Instruction Fuzzy Hash: 3A719B32718A8197E75DAB25E540369F3A4FB48B80F804134EB7E87688DF38F165E794
    APIs
    • malloc.LIBCMT ref: 02AF1296
    • malloc.LIBCMT ref: 02AF1302
      • Part of subcall function 02B04D91: _FF_MSGBANNER.LIBCMT ref: 02B04DC1
      • Part of subcall function 02B04D91: _callnewh.LIBCMT ref: 02B04DFF
      • Part of subcall function 02B04D91: _errno.LIBCMT ref: 02B04E0A
      • Part of subcall function 02B04D91: _errno.LIBCMT ref: 02B04E15
    • free.LIBCMT ref: 02AF132B
      • Part of subcall function 02B04D51: _errno.LIBCMT ref: 02B04D71
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$malloc$_callnewhfree
    • String ID: d$d$d
    • API String ID: 1789327305-1898527202
    • Opcode ID: 70b3e7089cd65712a9534c09ee8e6c2d3456621b9bb361a7b1ae5f1627f20bce
    • Instruction ID: 8ff3793feff5287dfc3e917a8e113632915e57d95365f0c214492b0fdd684185
    • Opcode Fuzzy Hash: 70b3e7089cd65712a9534c09ee8e6c2d3456621b9bb361a7b1ae5f1627f20bce
    • Instruction Fuzzy Hash: 1451C3B0414A59CFDBD1DF58D088B957BE4FB18704F5542EAA90CCB26ADB74C884CFA1
    APIs
    • _getptd.LIBCMT ref: 02C5EE0F
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
      • Part of subcall function 02C5EA2C: _getptd.LIBCMT ref: 02C5EA36
      • Part of subcall function 02C5EA2C: _amsg_exit.LIBCMT ref: 02C5EAD3
      • Part of subcall function 02C5EAE8: GetOEMCP.KERNEL32 ref: 02C5EB12
      • Part of subcall function 02C5A7E0: malloc.LIBCMT ref: 02C5A80B
      • Part of subcall function 02C5A7E0: Sleep.KERNEL32 ref: 02C5A81E
    • free.LIBCMT ref: 02C5EE9A
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    • _lock.LIBCMT ref: 02C5EECA
    • free.LIBCMT ref: 02C5EF6D
    • free.LIBCMT ref: 02C5EF99
    • _errno.LIBCMT ref: 02C5EF9E
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
    • String ID:
    • API String ID: 3894533514-0
    • Opcode ID: 2854a5756f7ba83f048a3981276ffac91aab162a3a0ca66450eb40d5492f030e
    • Instruction ID: b63a50c389be50d9e90e02b6e6bdba697dbf50c08f09918f47b144069b145010
    • Opcode Fuzzy Hash: 2854a5756f7ba83f048a3981276ffac91aab162a3a0ca66450eb40d5492f030e
    • Instruction Fuzzy Hash: AD412636200AA086E714DF25E44036EBBA6F7C4B98F544216DE9A47398CF7DC6C2CB48
    APIs
    • _getptd.LIBCMT ref: 00007FF7F8DFF34F
      • Part of subcall function 00007FF7F8DFBA34: _amsg_exit.LIBCMT ref: 00007FF7F8DFBA4A
      • Part of subcall function 00007FF7F8DFEF6C: _getptd.LIBCMT ref: 00007FF7F8DFEF76
      • Part of subcall function 00007FF7F8DFEF6C: _amsg_exit.LIBCMT ref: 00007FF7F8DFF013
      • Part of subcall function 00007FF7F8DFF028: GetOEMCP.KERNEL32 ref: 00007FF7F8DFF052
      • Part of subcall function 00007FF7F8DFC020: malloc.LIBCMT ref: 00007FF7F8DFC04B
      • Part of subcall function 00007FF7F8DFC020: Sleep.KERNEL32(?,?,ceil,00007FF7F8DFD951,?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951,?,?,00000000,00007FF7F8DFBA08), ref: 00007FF7F8DFC05E
    • free.LIBCMT ref: 00007FF7F8DFF3DA
      • Part of subcall function 00007FF7F8DF9030: HeapFree.KERNEL32(?,?,00000000,00007FF7F8DFBA1C,?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE), ref: 00007FF7F8DF9046
      • Part of subcall function 00007FF7F8DF9030: _errno.LIBCMT ref: 00007FF7F8DF9050
      • Part of subcall function 00007FF7F8DF9030: GetLastError.KERNEL32(?,?,00000000,00007FF7F8DFBA1C,?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE), ref: 00007FF7F8DF9058
    • _lock.LIBCMT ref: 00007FF7F8DFF40A
    • free.LIBCMT ref: 00007FF7F8DFF4AD
    • free.LIBCMT ref: 00007FF7F8DFF4D9
    • _errno.LIBCMT ref: 00007FF7F8DFF4DE
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
    • String ID:
    • API String ID: 3894533514-0
    • Opcode ID: de94af9eb20aff71365a2e79f7747a0a6ec5dd64a421ced7859fa65583d8f430
    • Instruction ID: 9d244d9cf3f3bf4fa15db17863086d993858848f6268082260a6be5450434769
    • Opcode Fuzzy Hash: de94af9eb20aff71365a2e79f7747a0a6ec5dd64a421ced7859fa65583d8f430
    • Instruction Fuzzy Hash: 1D51B522A0868241E754BB25944027DF7A1BF88B44F944136D97E573DECF3CE445F7A8
    APIs
    • malloc.LIBCMT ref: 02C417C5
    • malloc.LIBCMT ref: 02C41831
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • free.LIBCMT ref: 02C4185A
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$Heapmalloc$AllocErrorFreeLast_callnewhfree
    • String ID: d$d$d
    • API String ID: 161857241-1898527202
    • Opcode ID: cfde20c8cbbf88260583b06dcbb63c88aa0b5bb1562ef053c57e5ef22d106b36
    • Instruction ID: 38121dfd1170cfcddec0be9d7ca82c892d6013c409fc93f6d7dacfb48685ee9e
    • Opcode Fuzzy Hash: cfde20c8cbbf88260583b06dcbb63c88aa0b5bb1562ef053c57e5ef22d106b36
    • Instruction Fuzzy Hash: AF41C472111B90C9E7418F65E94438E3BA9F748F88F59813ADB8C47758EFB9C494CB60
    APIs
    • malloc.LIBCMT ref: 00007FF7F8DF17F5
    • malloc.LIBCMT ref: 00007FF7F8DF1861
      • Part of subcall function 00007FF7F8DF9070: _FF_MSGBANNER.LIBCMT ref: 00007FF7F8DF90A0
      • Part of subcall function 00007FF7F8DF9070: HeapAlloc.KERNEL32(?,?,0001939100000000,00007FF7F8DFC050,?,?,ceil,00007FF7F8DFD951,?,?,?,00007FF7F8DFD9FB,?,?,00000000,00007FF7F8DFB951), ref: 00007FF7F8DF90C5
      • Part of subcall function 00007FF7F8DF9070: _callnewh.LIBCMT ref: 00007FF7F8DF90DE
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90E9
      • Part of subcall function 00007FF7F8DF9070: _errno.LIBCMT ref: 00007FF7F8DF90F4
    • free.LIBCMT ref: 00007FF7F8DF188A
      • Part of subcall function 00007FF7F8DF9030: HeapFree.KERNEL32(?,?,00000000,00007FF7F8DFBA1C,?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE), ref: 00007FF7F8DF9046
      • Part of subcall function 00007FF7F8DF9030: _errno.LIBCMT ref: 00007FF7F8DF9050
      • Part of subcall function 00007FF7F8DF9030: GetLastError.KERNEL32(?,?,00000000,00007FF7F8DFBA1C,?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE), ref: 00007FF7F8DF9058
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$Heapmalloc$AllocErrorFreeLast_callnewhfree
    • String ID: d$d$d
    • API String ID: 161857241-1898527202
    • Opcode ID: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
    • Instruction ID: f2b5ad29e2e4f5aac6a226148f48f5c20aa4e0dbeb3a8b201bf9bd3539dac5f0
    • Opcode Fuzzy Hash: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
    • Instruction Fuzzy Hash: D4414832515B91C5E7819F20E400399BBE8FB48F98F49813ADAAC07788DF78C458DBA4
    APIs
    • _FF_MSGBANNER.LIBCMT ref: 02B126CC
      • Part of subcall function 02B0BC0D: _set_error_mode.LIBCMT ref: 02B0BC16
      • Part of subcall function 02B0BC0D: _set_error_mode.LIBCMT ref: 02B0BC25
      • Part of subcall function 02B0B9AD: _set_error_mode.LIBCMT ref: 02B0B9F2
      • Part of subcall function 02B0B9AD: _set_error_mode.LIBCMT ref: 02B0BA03
      • Part of subcall function 02B0A2B1: malloc.LIBCMT ref: 02B0A2DC
    • _errno.LIBCMT ref: 02B1270E
    • _lock.LIBCMT ref: 02B12722
    • free.LIBCMT ref: 02B12745
    • _errno.LIBCMT ref: 02B1274A
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _set_error_mode$_errno$_lockfreemalloc
    • String ID:
    • API String ID: 360200360-0
    • Opcode ID: 28551705450076a4a106e3a2148232d355b3dfe6427a5f876cea8b9f49252f81
    • Instruction ID: 189f9636b53e88d43c8e698786571ad5668b0388c354632b5af90b9abd6301da
    • Opcode Fuzzy Hash: 28551705450076a4a106e3a2148232d355b3dfe6427a5f876cea8b9f49252f81
    • Instruction Fuzzy Hash: 8C219330619A198FEB65BFA4D49476A77E1FF88314F9045B8980AC31E0DF789C41CF82
    APIs
    • GetEnvironmentStringsW.KERNEL32 ref: 02C623C9
    • WideCharToMultiByte.KERNEL32 ref: 02C62420
    • WideCharToMultiByte.KERNEL32 ref: 02C6245B
    • free.LIBCMT ref: 02C62468
    • FreeEnvironmentStringsW.KERNEL32 ref: 02C62473
    • FreeEnvironmentStringsW.KERNEL32 ref: 02C62481
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
    • String ID:
    • API String ID: 517548149-0
    • Opcode ID: 5115370a6637f46d455a6b6ed31cd9b9a6bc26a856794a30b061c6b7729e81b1
    • Instruction ID: f689e453431b008f542f847a3687be4ce13b4abf4d755fb91f34b7d95b1eb268
    • Opcode Fuzzy Hash: 5115370a6637f46d455a6b6ed31cd9b9a6bc26a856794a30b061c6b7729e81b1
    • Instruction Fuzzy Hash: BA215C72609B8086DB249F62B48876EB7A5F788BC4F4C4028DE8A07F18EF38D151C745
    APIs
    • ResetEvent.KERNEL32 ref: 02C4530C
    • ResetEvent.KERNEL32 ref: 02C45319
    • timeGetTime.WINMM ref: 02C4531F
    • WaitForSingleObject.KERNEL32 ref: 02C45373
    • ResetEvent.KERNEL32 ref: 02C45390
      • Part of subcall function 02C44D20: GetCurrentThreadId.KERNEL32 ref: 02C44D2D
    • ResetEvent.KERNEL32 ref: 02C453B7
      • Part of subcall function 02C5576C: _errno.LIBCMT ref: 02C55797
      • Part of subcall function 02C5576C: _invalid_parameter_noinfo.LIBCMT ref: 02C557A2
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EventReset$CurrentObjectSingleThreadTimeWait_errno_invalid_parameter_noinfotime
    • String ID:
    • API String ID: 2543248268-0
    • Opcode ID: 492e06cf4619c2e6ba0829753654616a12db9333c9bbbb47ed89defe3f5a3c1e
    • Instruction ID: 2ffcfd8c1a9247152cc4f7beca2ed7467710d5fa79bf8cb7d89877c500b57fb9
    • Opcode Fuzzy Hash: 492e06cf4619c2e6ba0829753654616a12db9333c9bbbb47ed89defe3f5a3c1e
    • Instruction Fuzzy Hash: 5D212876204A9086EB51CF35F84836EB3A4FB88F98F585525DE4E97B68DF38C582C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EventReset$CurrentObjectSingleThreadTimeWait_errno_invalid_parameter_noinfotime
    • String ID:
    • API String ID: 2543248268-0
    • Opcode ID: c78a28b176580af9311e331f57aa8b083a8a6ec56fce78c484d13ed2a8b23dc4
    • Instruction ID: 13621b32d43d538188eaa1bbebad17f4fba83064f7a5d0daf05ab7d27b7665e8
    • Opcode Fuzzy Hash: c78a28b176580af9311e331f57aa8b083a8a6ec56fce78c484d13ed2a8b23dc4
    • Instruction Fuzzy Hash: 03217F36608A9186E740DF25EC4016DF3A4FF49B94F584531DE6D877A8CF38C485D7A4
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 02C44D2D
      • Part of subcall function 02C44100: SwitchToThread.KERNEL32 ref: 02C4413E
      • Part of subcall function 02C44100: SetLastError.KERNEL32 ref: 02C44185
    • send.WS2_32 ref: 02C44D79
    • SetEvent.KERNEL32 ref: 02C44D97
    • WSACloseEvent.WS2_32 ref: 02C44DAB
    • shutdown.WS2_32 ref: 02C44DC4
    • closesocket.WS2_32 ref: 02C44DCE
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EventThread$CloseCurrentErrorLastSwitchclosesocketsendshutdown
    • String ID:
    • API String ID: 779811758-0
    • Opcode ID: b4979450ec0c19de12122228c918dce67c8ffdc185b34bad9865e685935668f6
    • Instruction ID: 77fc770a3e1441d6f37327acb004ac71ec2b857fe09e6e83e995c281b3c622aa
    • Opcode Fuzzy Hash: b4979450ec0c19de12122228c918dce67c8ffdc185b34bad9865e685935668f6
    • Instruction Fuzzy Hash: C321063260064186EB249F39F85872E7361FBC4FA8F545325DE3A47A98DF34C485C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EventThread$CloseCurrentErrorLastSwitchclosesocketsendshutdown
    • String ID:
    • API String ID: 779811758-0
    • Opcode ID: 2fa192ee69b06f1eeb25edd6ab0f4da1fe6a6614d325027052db3e123256aa8b
    • Instruction ID: 11da27fc881071a099b98ac9a266675e80e4e6433ce1760b63ce42265ae357d3
    • Opcode Fuzzy Hash: 2fa192ee69b06f1eeb25edd6ab0f4da1fe6a6614d325027052db3e123256aa8b
    • Instruction Fuzzy Hash: 29210331A0464282EB54BF25E850129F362FF88B64F944231DA3E476D9DE3CD889A7A4
    APIs
    • GetLastError.KERNEL32 ref: 02C5DF16
    • FlsGetValue.KERNEL32 ref: 02C5DF24
    • SetLastError.KERNEL32 ref: 02C5DF7C
      • Part of subcall function 02C5A860: Sleep.KERNEL32 ref: 02C5A8A5
    • FlsSetValue.KERNEL32 ref: 02C5DF50
    • free.LIBCMT ref: 02C5DF73
      • Part of subcall function 02C5DE54: _lock.LIBCMT ref: 02C5DEA8
      • Part of subcall function 02C5DE54: _lock.LIBCMT ref: 02C5DEC7
    • GetCurrentThreadId.KERNEL32 ref: 02C5DF64
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
    • String ID:
    • API String ID: 3106088686-0
    • Opcode ID: ad1fb755669453110f52bd1be8a0bd03a16cf7015427440e3a7436090f7943d3
    • Instruction ID: 7928cae498c3ca831fcd4a1ab09db3c9fb8b608ed483a7dc94dd1756ca7b0777
    • Opcode Fuzzy Hash: ad1fb755669453110f52bd1be8a0bd03a16cf7015427440e3a7436090f7943d3
    • Instruction Fuzzy Hash: 1501672120470286FB059FA5E45C76C72A1BB88BA4F088338CD2703B94EF3CC445C624
    APIs
    • GetLastError.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9BA
    • FlsGetValue.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9C8
    • SetLastError.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFBA20
      • Part of subcall function 00007FF7F8DFC0A0: Sleep.KERNEL32(?,?,ceil,00007FF7F8DFB9E3,?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE), ref: 00007FF7F8DFC0E5
    • FlsSetValue.KERNEL32(?,?,?,00007FF7F8DF938D,?,?,?,?,00007FF7F8E04BEE,?,?,?,?,00007FF7F8E02ED1), ref: 00007FF7F8DFB9F4
    • free.LIBCMT ref: 00007FF7F8DFBA17
    • GetCurrentThreadId.KERNEL32 ref: 00007FF7F8DFBA08
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
    • String ID:
    • API String ID: 3106088686-0
    • Opcode ID: 4213d91c3c88d15f51b7cb7809fe6c775b8414f6b8c9181202556ccbea47a494
    • Instruction ID: 38cb537b8113429278d919e4e20d0dec5c2886ce8a47fa6448d252c1a4a25db5
    • Opcode Fuzzy Hash: 4213d91c3c88d15f51b7cb7809fe6c775b8414f6b8c9181202556ccbea47a494
    • Instruction Fuzzy Hash: 99017520B09B4382FB547B76A845538E251AF8C750F984634C97E063D9EE3CE449B668
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno
    • String ID:
    • API String ID: 2288870239-0
    • Opcode ID: 2bb762fc8d6a2aa6e0dae91371418eab7fad8568fe1f05a2c8ea6e1ff1f75f6a
    • Instruction ID: f9783bdd21d11fc4b55b41fb78d0499f60a162e0b48aed1e9d41502e598a6d95
    • Opcode Fuzzy Hash: 2bb762fc8d6a2aa6e0dae91371418eab7fad8568fe1f05a2c8ea6e1ff1f75f6a
    • Instruction Fuzzy Hash: CF914AB1506A49CFCB99EFACC0D4B29BBE0FF59304B14459DE14EDB222CB75A841CB51
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CallTranslator
    • String ID: MOC$RCC
    • API String ID: 3569367362-2084237596
    • Opcode ID: 06f64b386012e0fa286528623832c74f46424b3a0b49e4bb78a2cd9779033b58
    • Instruction ID: 5e7a0e6db1dc3a7b84acfcafafe9c48bf534cfd793f8f8b501319441795bbc6a
    • Opcode Fuzzy Hash: 06f64b386012e0fa286528623832c74f46424b3a0b49e4bb78a2cd9779033b58
    • Instruction Fuzzy Hash: 5561D230118F0A9FD765FF58C484BA6B7E1FB80714F604AAEC049C3596EBB4A591CB82
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: 39caf3c37a47655031c94e0de5774d4aa99865a29994b72ed535d303bf2608d5
    • Instruction ID: 000ab779071b2089ae49d05de2cf80be4944d5dee6decbb9a660eef711ae6f40
    • Opcode Fuzzy Hash: 39caf3c37a47655031c94e0de5774d4aa99865a29994b72ed535d303bf2608d5
    • Instruction Fuzzy Hash: 53713F72606B8181DB55AF69E0506ADF7A4EF58B80F989035CB6E03349CF38E455E368
    APIs
    • _getptd.LIBCMT ref: 02C5950D
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    • _getptd.LIBCMT ref: 02C5952B
    • _CallSETranslator.LIBCMT ref: 02C59573
      • Part of subcall function 02C577B4: _getptd.LIBCMT ref: 02C577DB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CallTranslator_amsg_exit
    • String ID: MOC$RCC
    • API String ID: 1374396951-2084237596
    • Opcode ID: af59dbc463a79ad219f14499a5ba5a340a132d3c24739908f5f8128250e8645e
    • Instruction ID: 0726801acec97c8d2b092fffbcb8a095236626700e9bf624d49c24919bfb406e
    • Opcode Fuzzy Hash: af59dbc463a79ad219f14499a5ba5a340a132d3c24739908f5f8128250e8645e
    • Instruction Fuzzy Hash: E5519D72604AE0D5CF20DB15E0907ADB3A1FBC1B88F494666DF9E47618DF78C299CB44
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$CallTranslator_amsg_exit
    • String ID: MOC$RCC
    • API String ID: 1374396951-2084237596
    • Opcode ID: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
    • Instruction ID: dd27df37af83cb61966684dee5a4306002c5d29fe094a444afd47272ecd80b14
    • Opcode Fuzzy Hash: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
    • Instruction Fuzzy Hash: A6618D32A08A8295DB20EB05D4803A9F3A0FB94B88F844A36DB6E47699DF7CD151D764
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free
    • String ID:
    • API String ID: 1294909896-0
    • Opcode ID: b55e574dcef07286ea42fa4fc00e6fe334b5dcd76448c2a0d4ff0b76fb3ee2ea
    • Instruction ID: f2741a11ccad39090a0c619fd1495cfbdcb673d768605cc63f393975db4e2153
    • Opcode Fuzzy Hash: b55e574dcef07286ea42fa4fc00e6fe334b5dcd76448c2a0d4ff0b76fb3ee2ea
    • Instruction Fuzzy Hash: EA510336242B8485CB54DF5AE9803AEB365F758BC4F5C9012CB8E47710DF78E5A1C328
    APIs
    • _fileno.LIBCMT ref: 02B079A5
      • Part of subcall function 02B12459: _errno.LIBCMT ref: 02B12462
      • Part of subcall function 02B12459: _invalid_parameter_noinfo.LIBCMT ref: 02B1246D
    • _errno.LIBCMT ref: 02B07A0E
    • _invalid_parameter_noinfo.LIBCMT ref: 02B07A19
    • _getbuf.LIBCMT ref: 02B07A4D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno_getbuf
    • String ID: @
    • API String ID: 3036866907-2766056989
    • Opcode ID: a62dc664b4561913de13bcb02bd6d15c63cfabe7648b8378b28b5a7a84a82d76
    • Instruction ID: ad06b589da12697acad0ca3dfbd5e77b948c45c69336b99722debd29fb810f5c
    • Opcode Fuzzy Hash: a62dc664b4561913de13bcb02bd6d15c63cfabe7648b8378b28b5a7a84a82d76
    • Instruction Fuzzy Hash: 1A31B830128A484EDB1E9F2D88C9334FA91FB45329F7816D8DC76CA1E6DB34D586D680
    APIs
    • _fileno.LIBCMT ref: 02C57ED4
      • Part of subcall function 02C62988: _errno.LIBCMT ref: 02C62991
      • Part of subcall function 02C62988: _invalid_parameter_noinfo.LIBCMT ref: 02C6299C
    • _errno.LIBCMT ref: 02C57F3D
    • _invalid_parameter_noinfo.LIBCMT ref: 02C57F48
    • _getbuf.LIBCMT ref: 02C57F7C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_fileno_getbuf
    • String ID: @
    • API String ID: 3036866907-2766056989
    • Opcode ID: 92bb1f8a3983eb5cf48ea023ccb70438d663d5b0186222f9965649d0791287cf
    • Instruction ID: c7ebc37d6458296ebc39aab03cfc20028d9544acc11f8bdaabf1927d54d88352
    • Opcode Fuzzy Hash: 92bb1f8a3983eb5cf48ea023ccb70438d663d5b0186222f9965649d0791287cf
    • Instruction Fuzzy Hash: 3D31D863210B6485CF29CF38D484328B651E791BACF585305DE6A063E5CB79C6D9C399
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$ExceptionRaise_amsg_exit
    • String ID: csm
    • API String ID: 4155239085-1018135373
    • Opcode ID: 553b0e037f61d14c01cc02cf9b2f8149e3dae0138a7a1939c678450fe90a323b
    • Instruction ID: d290296363ebff59fdb7379d7d2250f1e0006fe71bac21539dd8fd37a8072d6b
    • Opcode Fuzzy Hash: 553b0e037f61d14c01cc02cf9b2f8149e3dae0138a7a1939c678450fe90a323b
    • Instruction Fuzzy Hash: BA217A362046A1C7CB30DF12E44875EB361F788BA9F044226DF9A07B54CB3AD5C6DB98
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$ExceptionRaise_amsg_exit
    • String ID: csm
    • API String ID: 4155239085-1018135373
    • Opcode ID: 9353493ea25706b6dc90e2ff27a29bc00a94e76970d53f38476d2ffead27e1f6
    • Instruction ID: 27edc80167fc9f32b92255eb4c7304d33c707432405b24effb6d3eb7be187d00
    • Opcode Fuzzy Hash: 9353493ea25706b6dc90e2ff27a29bc00a94e76970d53f38476d2ffead27e1f6
    • Instruction Fuzzy Hash: FF317C3690864182E770EB11A00426EF361FB98761F840636DEBE07BC5CF3DE886DB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseDeleteOpenValue
    • String ID: Console$IpDatespecial
    • API String ID: 849931509-1840232981
    • Opcode ID: fe9ff08b8168959544f01ab8a0301821abe9536671df0fbfa079717db41a1f95
    • Instruction ID: 6ac58b361892e54530fd82614f56dfd696fbc305cd05089bedc164eee2294523
    • Opcode Fuzzy Hash: fe9ff08b8168959544f01ab8a0301821abe9536671df0fbfa079717db41a1f95
    • Instruction Fuzzy Hash: 1BF03A36719941C6FB609B65F808B8DB334F780BA8F000111CE5D13A58DF38C189C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$__free_lconv_num
    • String ID:
    • API String ID: 1547021563-0
    • Opcode ID: 3af7023e6504110db29df3efcdcc5bcf3b4445538e5297c523f39fa9476b72f6
    • Instruction ID: 6c627e4e8edc87b1cd3b267b03f7f941263cc815d7568fcd06c12652c1bcaf63
    • Opcode Fuzzy Hash: 3af7023e6504110db29df3efcdcc5bcf3b4445538e5297c523f39fa9476b72f6
    • Instruction Fuzzy Hash: 2D51A136305B848ADB64DF66E4847AA77A1F788BC4FA44526DF8E47714DF78C142CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2808128820-0
    • Opcode ID: cb3401b7405edd736d784c14bb35cdc20514f24c2d99efe4cf03950fa75836cc
    • Instruction ID: af101a5f3c0e3669eb3453653c422f5775f39c77c9b9b94901b3b979cef5652a
    • Opcode Fuzzy Hash: cb3401b7405edd736d784c14bb35cdc20514f24c2d99efe4cf03950fa75836cc
    • Instruction Fuzzy Hash: 8141D630618A098FE75AFF2898C1B7A3BD2FB98304F1445ADCC4EC72D5DF2498428B95
    APIs
    • _fileno.LIBCMT ref: 02B0C126
      • Part of subcall function 02B12459: _errno.LIBCMT ref: 02B12462
      • Part of subcall function 02B12459: _invalid_parameter_noinfo.LIBCMT ref: 02B1246D
    • _errno.LIBCMT ref: 02B0C136
    • _errno.LIBCMT ref: 02B0C152
    • _isatty.LIBCMT ref: 02B0C1B3
    • _getbuf.LIBCMT ref: 02B0C1BF
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: b0bc0c9142d5973b4dcc80f3b9ad44c2a45490a3144f2f0b8ff6434852647ff4
    • Instruction ID: 12a221545888de2adf2197eb17014ce7fd900b4739a56f5ba3520a91f5b0bd00
    • Opcode Fuzzy Hash: b0bc0c9142d5973b4dcc80f3b9ad44c2a45490a3144f2f0b8ff6434852647ff4
    • Instruction Fuzzy Hash: 7141BB30214A088FCB5AAF6CC4D176A7FA1FB59310B5447DAD86ACB2DAD734C981CBC1
    APIs
    • _fileno.LIBCMT ref: 02C5C655
      • Part of subcall function 02C62988: _errno.LIBCMT ref: 02C62991
      • Part of subcall function 02C62988: _invalid_parameter_noinfo.LIBCMT ref: 02C6299C
    • _errno.LIBCMT ref: 02C5C665
    • _errno.LIBCMT ref: 02C5C681
    • _isatty.LIBCMT ref: 02C5C6E2
    • _getbuf.LIBCMT ref: 02C5C6EE
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: 954e8c99a8900c331c29789858b1bedd508e20dff7a8ac605596c6e7a6fc1fdf
    • Instruction ID: 539b6ee711e62d690dc4ed513276f04d06e836268e69eed8a0cfeb73b1f8e566
    • Opcode Fuzzy Hash: 954e8c99a8900c331c29789858b1bedd508e20dff7a8ac605596c6e7a6fc1fdf
    • Instruction Fuzzy Hash: 8E41CF72610B648ADB189F39C49032D76A0E7C4FA8F145216CE6A477D8EF78C7D1CB84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
    • String ID:
    • API String ID: 2574049805-0
    • Opcode ID: 4f60cfe29fde747d4f6edf3b98704d3458481cfd96a237e93bfce69436bb82ae
    • Instruction ID: e21934b03af3069a22f7f2bd58eda9a55664198bb479098176f21a1333e9c34f
    • Opcode Fuzzy Hash: 4f60cfe29fde747d4f6edf3b98704d3458481cfd96a237e93bfce69436bb82ae
    • Instruction Fuzzy Hash: 7541D672A0860645E718AF29C042238F391EF88B98F944235DA7D073C9DE3CE859B7E4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID: Main
    • API String ID: 1452528299-521822810
    • Opcode ID: b2a94ced38afb3e22c07dba05b3cc46be14585edf82a77f9e8eff251cf469d4b
    • Instruction ID: 44efd2830f00aec93b4372f6332082881cd39e535aff7fa5091b8bab4dacc6e5
    • Opcode Fuzzy Hash: b2a94ced38afb3e22c07dba05b3cc46be14585edf82a77f9e8eff251cf469d4b
    • Instruction Fuzzy Hash: A0415B76704A60CBDB14CF15E45872D73A1F788B88F494129DF8D47B48DBB8E592CB48
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLastRead$mallocrealloc
    • String ID:
    • API String ID: 3638135368-0
    • Opcode ID: 10d6ceea749d552203bf34d92a345c17516fdb6c7073bfd954073bc12734bd9a
    • Instruction ID: 7d75235427d8099b4fa2e1fac196e05ace1efabf728fcba365ce4d9f9a9465df
    • Opcode Fuzzy Hash: 10d6ceea749d552203bf34d92a345c17516fdb6c7073bfd954073bc12734bd9a
    • Instruction Fuzzy Hash: 0A415D36205B94C7DB24CF16F8547AAB7A0FB88B98F484429DF8A47B14DF78E185C704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2808128820-0
    • Opcode ID: 87a3bca82977cd9d54f1f39a71e6bafcd63422e4aa423f7f8be8756c9ddb47b7
    • Instruction ID: d776d72d9535efab67774a0c599331fe16cb698b0a460ea6033721046dcf103d
    • Opcode Fuzzy Hash: 87a3bca82977cd9d54f1f39a71e6bafcd63422e4aa423f7f8be8756c9ddb47b7
    • Instruction Fuzzy Hash: 2441C535205BA585FB08EB22D944B7E7792FB85BC8F044129CE4E07798DF78C581CB59
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWide$StringTypefreemalloc
    • String ID:
    • API String ID: 307345228-0
    • Opcode ID: 82f0262a8cecbef224ca61b156e5a0f0d612a4380812b26c100bd67c1e5a9d7b
    • Instruction ID: abfe908f429489859bfdd645a01ca4cb7df15540ab1c40e0755598ce13519fca
    • Opcode Fuzzy Hash: 82f0262a8cecbef224ca61b156e5a0f0d612a4380812b26c100bd67c1e5a9d7b
    • Instruction Fuzzy Hash: 0031A272300B808ADB209F26D84476973A5FB88FF8F584266EE2D47BD4DF39C1418740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ByteCharMultiWide$StringTypefreemalloc
    • String ID:
    • API String ID: 307345228-0
    • Opcode ID: e70f9f49b4bf10f7c9a397bbad2514da52a9a5bda9101d0c48d23cf0e55f0220
    • Instruction ID: 036ee910853bc08b93459291cf0127cfdf8d31c1c8eba368dcf37a0934fea711
    • Opcode Fuzzy Hash: e70f9f49b4bf10f7c9a397bbad2514da52a9a5bda9101d0c48d23cf0e55f0220
    • Instruction Fuzzy Hash: 95418622B04B8185FF10AF6598005A9E395FF84BA8F984635EE7E477D9DF3CD4019394
    APIs
    • malloc.LIBCMT ref: 02C4C703
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • free.LIBCMT ref: 02C4C72B
    • CreateDIBSection.GDI32 ref: 02C4C797
    • free.LIBCMT ref: 02C4C7B6
      • Part of subcall function 02C4D020: GetObjectW.GDI32 ref: 02C4D052
    • free.LIBCMT ref: 02C4C7F6
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno$AllocCreateHeapObjectSection_callnewhmalloc
    • String ID:
    • API String ID: 2034203143-0
    • Opcode ID: 909639d14f8662df755ceb05cb6a705d2a69ecb05bda05ce9b7b934898073f82
    • Instruction ID: 8cc7586a2617f70e6037f4d565ef5d0a9a52c2f79f7649771954602e3579b2c5
    • Opcode Fuzzy Hash: 909639d14f8662df755ceb05cb6a705d2a69ecb05bda05ce9b7b934898073f82
    • Instruction Fuzzy Hash: D331543230579087DB259F22D44076BB6A5FB88BC8F4C8426DF4957B25EF78D251CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast$recv
    • String ID:
    • API String ID: 316788870-0
    • Opcode ID: be8605be28e57c5448ca43f127e085b1cff2f5d855780fd9c761576df26d9ebe
    • Instruction ID: 26906d4966a3caf024df32c1d5cc2f28011b7763c7483575ffdfb59866cfa4c8
    • Opcode Fuzzy Hash: be8605be28e57c5448ca43f127e085b1cff2f5d855780fd9c761576df26d9ebe
    • Instruction Fuzzy Hash: 7A31A372304A80C6EB349F39E44835E37A5F789B98F645526CF1987B98DF39C584DB01
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorLast$recv
    • String ID:
    • API String ID: 316788870-0
    • Opcode ID: e4f8957da8d65f30d38b13d09da8badb50e03e5984e11ac3259b2f877bd45eac
    • Instruction ID: 7639d7b5f127766544803782d7e2fc2e77acc218b91b180ee0950f2d85d137fc
    • Opcode Fuzzy Hash: e4f8957da8d65f30d38b13d09da8badb50e03e5984e11ac3259b2f877bd45eac
    • Instruction Fuzzy Hash: 3841B432B08A4185E750AF29E44436DF3A1EF49B98F944535CA3D836DCDF3DD488A7A8
    APIs
    • _ctrlfp.LIBCMT ref: 02C6CC31
    • _exception_enabled.LIBCMT ref: 02C6CC54
      • Part of subcall function 02C6CB34: _set_statfp.LIBCMT ref: 02C6CB5B
      • Part of subcall function 02C6CB34: _set_statfp.LIBCMT ref: 02C6CBCE
    • _raise_exc.LIBCMT ref: 02C6CCA0
    • _ctrlfp.LIBCMT ref: 02C6CCE0
    • _ctrlfp.LIBCMT ref: 02C6CD11
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
    • String ID:
    • API String ID: 3456427917-0
    • Opcode ID: 6d0b5b3ad2c709662f382e20db8cab413169064652d1349d93ce4c8a5f060bc7
    • Instruction ID: d404a26b2e712276ea566c94f1e15c744067b1d933cc3d3a353604c5637c3866
    • Opcode Fuzzy Hash: 6d0b5b3ad2c709662f382e20db8cab413169064652d1349d93ce4c8a5f060bc7
    • Instruction Fuzzy Hash: 1B318032614E848AD711DF25E88876FB772FBC9398F001216EE8A1BA18DF38C546DB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
    • String ID:
    • API String ID: 3456427917-0
    • Opcode ID: ec85eac3057d4a959c5fd9faad8141c4a2bc6fb97e23b1e6474f11119bd41e60
    • Instruction ID: 6f2e83bbeefa02f0341dd32f91aead8ac0f2154fff16b71a143de1fc28cc7855
    • Opcode Fuzzy Hash: ec85eac3057d4a959c5fd9faad8141c4a2bc6fb97e23b1e6474f11119bd41e60
    • Instruction Fuzzy Hash: 3631C732A18A8586E751EF24E4402ABF7B1FB85388F400635FE6E46A98DF3CD446DB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
    • String ID:
    • API String ID: 513674450-0
    • Opcode ID: 1024e802668d761e8f9f1b2b79f1ec6faa9c774cb7cb2bbf6b7d463fff73795d
    • Instruction ID: 4d7f738fbcb070e3f3e24a5591176f1c334efc0a453db5be0556920d56220498
    • Opcode Fuzzy Hash: 1024e802668d761e8f9f1b2b79f1ec6faa9c774cb7cb2bbf6b7d463fff73795d
    • Instruction Fuzzy Hash: F7314D36350A959AEB24CF31E8547D933A8F748B88F98512ADE4A87B48DF38D685C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$__doserrno
    • String ID:
    • API String ID: 2614100947-0
    • Opcode ID: 3d5f5cb3f3e87b5f5a4fe1073c9aff760d558992757afad4ef30a6b939e44645
    • Instruction ID: d35338e321c7870ae8322c2697c1982b31ba7f3037eae2a724cb18eddee5269e
    • Opcode Fuzzy Hash: 3d5f5cb3f3e87b5f5a4fe1073c9aff760d558992757afad4ef30a6b939e44645
    • Instruction Fuzzy Hash: 2C21E730A086448FD725AF68E8D932D7AD1EB85314F9506DDD516C72D1EFB88880CB96
    APIs
    • DecodePointer.KERNEL32 ref: 02C5590D
    • DecodePointer.KERNEL32 ref: 02C5591D
    • EncodePointer.KERNEL32 ref: 02C5599B
      • Part of subcall function 02C5A8E4: realloc.LIBCMT ref: 02C5A90F
      • Part of subcall function 02C5A8E4: Sleep.KERNEL32 ref: 02C5A92B
    • EncodePointer.KERNEL32 ref: 02C559AB
    • EncodePointer.KERNEL32 ref: 02C559B8
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Pointer$Encode$Decode$Sleeprealloc
    • String ID:
    • API String ID: 1601076685-0
    • Opcode ID: 41bb2ee92579e29bb048e88261e2f5d15513c2e40ba12b19a60fef79da225d25
    • Instruction ID: 31839853e9185e8a4b5bc5ddeeff0a4ba394f2dbc7b6375a165e59660cbaa173
    • Opcode Fuzzy Hash: 41bb2ee92579e29bb048e88261e2f5d15513c2e40ba12b19a60fef79da225d25
    • Instruction Fuzzy Hash: 0421A125302B6481EA109F62F94835DB3A1F789BD5F84582ADE5E47B28EF7CC4C6C309
    APIs
    • DecodePointer.KERNEL32(?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DF9645
    • DecodePointer.KERNEL32(?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DF9655
      • Part of subcall function 00007FF7F8DFC1B4: _errno.LIBCMT ref: 00007FF7F8DFC1BD
      • Part of subcall function 00007FF7F8DFC1B4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F8DFC1C8
    • EncodePointer.KERNEL32(?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DF96D3
      • Part of subcall function 00007FF7F8DFC124: realloc.LIBCMT ref: 00007FF7F8DFC14F
      • Part of subcall function 00007FF7F8DFC124: Sleep.KERNEL32(?,?,00000000,00007FF7F8DF96C3,?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DFC16B
    • EncodePointer.KERNEL32(?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DF96E3
    • EncodePointer.KERNEL32(?,?,00000000,00007FF7F8DF9731,?,?,?,?,00007FF7F8DF91A3), ref: 00007FF7F8DF96F0
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
    • String ID:
    • API String ID: 1909145217-0
    • Opcode ID: ecada074d5a0a7123039d1954c0b31d342863ec9009fb92d5d2dea83d0352a09
    • Instruction ID: 08def028f106934c16faf148dab220e5760a27e7805ae01180af40114934d05f
    • Opcode Fuzzy Hash: ecada074d5a0a7123039d1954c0b31d342863ec9009fb92d5d2dea83d0352a09
    • Instruction Fuzzy Hash: F0217E21B09B5291EB00BB11E948079E291BF48BD5F844835D93E077ECEF3CE099E398
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ObjectSelect$ColorCompatibleCreateDeleteTable
    • String ID:
    • API String ID: 3899591553-0
    • Opcode ID: 25bca2b50bd8d51f8858a6c8eb88d856bb50887b8d04bad872bb72e688f53c5b
    • Instruction ID: 87f149b1661b3fac09b33a10f5b75ab9b9fc358bb11eae64af9373d5b9529cd6
    • Opcode Fuzzy Hash: 25bca2b50bd8d51f8858a6c8eb88d856bb50887b8d04bad872bb72e688f53c5b
    • Instruction Fuzzy Hash: E0119D35205A00C9EB14CF25F498B1E3364FB98F98F10A12ADE4B53B18CF3AC585C380
    APIs
    • OpenProcess.KERNEL32 ref: 02C4A762
    • malloc.LIBCMT ref: 02C4A770
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • GetCurrentProcessId.KERNEL32 ref: 02C4A7A7
    • free.LIBCMT ref: 02C4A7C3
    • CloseHandle.KERNEL32 ref: 02C4A7CB
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process_errno$AllocCloseCurrentHandleHeapOpen_callnewhfreemalloc
    • String ID:
    • API String ID: 1715275611-0
    • Opcode ID: 6199685c681e89abc964dfd2cc35e6f96c4d0bea44aa1d2d8b5656ebf405cfb4
    • Instruction ID: de26cf84b3ef28f7d8f68aaa3cbd2b5defcf5e43083306020cf51291a936ed9b
    • Opcode Fuzzy Hash: 6199685c681e89abc964dfd2cc35e6f96c4d0bea44aa1d2d8b5656ebf405cfb4
    • Instruction Fuzzy Hash: 11116D32744A4086EB609B16F824B5EB771F788BC4F884125DF9A07B59CF38D5818B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_fileno_freebuf_invalid_parameter_noinfo
    • String ID:
    • API String ID: 228234209-0
    • Opcode ID: f43d49cfcced33ca48b0956694c389fd8da178487179c29bcf048a6776a6e2be
    • Instruction ID: 3d4cb7b7e251ccd7a74491fd92ecca4405f55878adc45ac9f9a7301e5c59f9ee
    • Opcode Fuzzy Hash: f43d49cfcced33ca48b0956694c389fd8da178487179c29bcf048a6776a6e2be
    • Instruction Fuzzy Hash: D2018630614A094BDF5AAB7D44D433D29D2FB98339F5807EC8855C71D6DE78C941CB85
    APIs
    • EnterCriticalSection.KERNEL32 ref: 02C45DE5
    • EnterCriticalSection.KERNEL32 ref: 02C45DEF
    • LeaveCriticalSection.KERNEL32 ref: 02C45DFF
    • LeaveCriticalSection.KERNEL32 ref: 02C45E09
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 44c292e90eb37e2d7492bf557040c1a2ec22a7d7a39af7b405922077d069d486
    • Instruction ID: 9a36e372e5b3bebadaab67018081604826825f4f043f9fd3e84ab3216e936b6a
    • Opcode Fuzzy Hash: 44c292e90eb37e2d7492bf557040c1a2ec22a7d7a39af7b405922077d069d486
    • Instruction Fuzzy Hash: A9111C32624A8483EB649B62F8987AE7360F798795F841025DBDB43E60DF3CD5CAC700
    APIs
    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7F8DF4E7E,?,?,00000000,00007FF7F8DF4E44), ref: 00007FF7F8DF5E35
    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF7F8DF4E7E,?,?,00000000,00007FF7F8DF4E44), ref: 00007FF7F8DF5E3F
    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7F8DF4E7E,?,?,00000000,00007FF7F8DF4E44), ref: 00007FF7F8DF5E4F
    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF7F8DF4E7E,?,?,00000000,00007FF7F8DF4E44), ref: 00007FF7F8DF5E59
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: d0535108d2faffde62c4ad6e510cb9d391b63625fe126b8c96127d7e5368dc19
    • Instruction ID: 453c65e679cdfd378e335090ab884cd29339d48022adabf2aa5daf25b342eb42
    • Opcode Fuzzy Hash: d0535108d2faffde62c4ad6e510cb9d391b63625fe126b8c96127d7e5368dc19
    • Instruction Fuzzy Hash: C0116632A2495183EB90AB21F8443AAE360FF44750F845031DBAF42A94CF3CE88AD744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: e08fed2e94f443f408e55be9e8533d4e9701da3b5c4c3ef9c418aa34cc1ee15c
    • Instruction ID: 0c974154e0ab6e44354353fb403a4369dd5adc7646a60ed74249257bc755d472
    • Opcode Fuzzy Hash: e08fed2e94f443f408e55be9e8533d4e9701da3b5c4c3ef9c418aa34cc1ee15c
    • Instruction Fuzzy Hash: C6F062301249094FD72AAB64CCA476ABA91FF1532AFD686D8D00AC75E1DF784480CF61
    APIs
    • GetSystemTimeAsFileTime.KERNEL32 ref: 02C6254B
    • GetCurrentProcessId.KERNEL32 ref: 02C62556
    • GetCurrentThreadId.KERNEL32 ref: 02C62562
    • GetTickCount.KERNEL32 ref: 02C6256E
    • QueryPerformanceCounter.KERNEL32 ref: 02C6257F
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 97ad835b81cb6df91117922e019d69de1d0eaff2d601c02b2c415f9bb153aa1b
    • Instruction ID: 62db2287d5e965d06955d51e27abcddd659844e24de4b5bbb918ea23a162a6b8
    • Opcode Fuzzy Hash: 97ad835b81cb6df91117922e019d69de1d0eaff2d601c02b2c415f9bb153aa1b
    • Instruction Fuzzy Hash: 2401B121269B0582FB50CF21F89D7597360F749BA2F443625EE6F47BA0DB3CC9858700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
    • String ID:
    • API String ID: 1445889803-0
    • Opcode ID: 98e16b1ec0ad293c89ca25142769c411a4e3d743e8d3f271fefc4cf6040d5f50
    • Instruction ID: b913d7345579e604113fb012c07696de111fb566f37c8d1fca941aa522a2b76f
    • Opcode Fuzzy Hash: 98e16b1ec0ad293c89ca25142769c411a4e3d743e8d3f271fefc4cf6040d5f50
    • Instruction Fuzzy Hash: A1016521718E0281E7809F21F840265E360FB49B91F842A30EEBF477E4DF3CD99593A4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
    • String ID:
    • API String ID: 1513102227-0
    • Opcode ID: d4542beb37d90f8ad3c0edd15d75e9a44333cb729b96ee7ae577a21e01d114c8
    • Instruction ID: 7ae568c0a2d456d1b09c402d476a6e886724884613e6a52397eb0d9ed61f2f86
    • Opcode Fuzzy Hash: d4542beb37d90f8ad3c0edd15d75e9a44333cb729b96ee7ae577a21e01d114c8
    • Instruction Fuzzy Hash: 1E11C931201B06C1FA289F65F85CBAD3374FB68B28F649219C56E43AB0DF39C196C750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: b090733ce00a7d6ef75ad3e43b7a98ae415e30c3fad73d63844ff4cd7894af6a
    • Instruction ID: 39092df20750b88ae13bf2b39eaf83d3b80cd4602fc7b0b4b972cb84b3998433
    • Opcode Fuzzy Hash: b090733ce00a7d6ef75ad3e43b7a98ae415e30c3fad73d63844ff4cd7894af6a
    • Instruction Fuzzy Hash: DDF0BBB2611A9485DE056B55CCCC33C76A29BA0B76F92C742CA3D0B3D0DF7D848ADB25
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: __doserrno_errno
    • String ID:
    • API String ID: 921712934-0
    • Opcode ID: b2568e6a52513f616cc9bf7babecad4815ad7cdb92447009d9c431ea0fd75076
    • Instruction ID: 96ed88e81491e8b063f31edc9c6028c3d8afc8c0aed5759a9f7bcaeeaa852246
    • Opcode Fuzzy Hash: b2568e6a52513f616cc9bf7babecad4815ad7cdb92447009d9c431ea0fd75076
    • Instruction Fuzzy Hash: CC01AD62E0864684EF043B64888537CE1A19F94B3AFD24735D53E063DACF3C6445B2B8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandleObjectSingleWait$CurrentSleepThread
    • String ID:
    • API String ID: 570250148-0
    • Opcode ID: 892c36502c9aa2b1c275c7a3c19491e1c66a3c365f8122baa1cd80770b25c1c6
    • Instruction ID: 2139c6b82a22bc41b8db3bd590d659b34374f1a767f473b3b6cbd0b069aaf3a9
    • Opcode Fuzzy Hash: 892c36502c9aa2b1c275c7a3c19491e1c66a3c365f8122baa1cd80770b25c1c6
    • Instruction Fuzzy Hash: F0F03126A0498582F745AF31EC14138B320FB89F65F584630CD3F462D4CF389885A3A4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EnumErrorEventEventsLastNetworkReset
    • String ID:
    • API String ID: 1050048411-3916222277
    • Opcode ID: de254dcb7ccf77805dc610188d48849fc80be153bc30c80741740ae0a985eb5d
    • Instruction ID: 74524796b37da2379caef81cf3834331fc0e2636a84d5fe961f9b850fe86a5c4
    • Opcode Fuzzy Hash: de254dcb7ccf77805dc610188d48849fc80be153bc30c80741740ae0a985eb5d
    • Instruction Fuzzy Hash: BF414A7210478486E7388F2AD408B5E7BE2F7C5B9CF250119DE5987758EFB9CA46CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: EnumErrorEventEventsLastNetworkReset
    • String ID:
    • API String ID: 1050048411-3916222277
    • Opcode ID: 828e8a55efaf8f4e93ed5acb76a083e09fbb0b5487182bc448ae793a037f2d46
    • Instruction ID: 85df59e7b82b2bf0b78dd382ce9afcf86d83bc784b2895d947961918f9ab278f
    • Opcode Fuzzy Hash: 828e8a55efaf8f4e93ed5acb76a083e09fbb0b5487182bc448ae793a037f2d46
    • Instruction Fuzzy Hash: 2451B33290868286E7209F25D404329F3E2EF88B58F950135DA7D472CCEF7DE848AB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: f99e8c1cb84ec6d509ec4885998de6e49d4c04b99b6fcfd991d807847ab0c01c
    • Instruction ID: ff9af11a40ca9cf450fe20078de1282c05e354e54f7f1ea84e931d880c54d316
    • Opcode Fuzzy Hash: f99e8c1cb84ec6d509ec4885998de6e49d4c04b99b6fcfd991d807847ab0c01c
    • Instruction Fuzzy Hash: 23314F70118B048FCB39EF58D49176ABBE1FB58310F54069DD48A83692DB31F942CB86
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_fltout2_invalid_parameter_noinfo
    • String ID: -
    • API String ID: 485257318-2547889144
    • Opcode ID: 02bff1a59af1fa515b6cbdd793a19a9d5db4cd0daae80a934fe287ecd89124cf
    • Instruction ID: 2926b0ade76a852391941cd2f5f80c4cbc8feb181480e2d4dfe685169e121683
    • Opcode Fuzzy Hash: 02bff1a59af1fa515b6cbdd793a19a9d5db4cd0daae80a934fe287ecd89124cf
    • Instruction Fuzzy Hash: 9731092230468085DB219F26B88876EB761EB85BE4F144222DF8D17B94DF3DC545CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_fltout2_invalid_parameter_noinfo
    • String ID: -
    • API String ID: 485257318-2547889144
    • Opcode ID: 618538ce884b31deba6e1646cd0d9800068b1e888b6e4428242c9665014ee262
    • Instruction ID: ed52d8be4102d4d756322d16fc3f5be65be66eb7dffa0f09ee4e7d95a3b21f8f
    • Opcode Fuzzy Hash: 618538ce884b31deba6e1646cd0d9800068b1e888b6e4428242c9665014ee262
    • Instruction Fuzzy Hash: 02313B2270868241EB22AF21A44036AFBE0EF857D4F944531DEBE47BC9DE3CD405DB64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID: 1
    • API String ID: 2819658684-2212294583
    • Opcode ID: 6b53c2dcc294edf9728eab1c0bef983e4baecdb5bea7ed18be76febd96b6e3f9
    • Instruction ID: 3df3675905682841d7b2504871a65a0faca01acb6d2d07c8caef5223c5384ef8
    • Opcode Fuzzy Hash: 6b53c2dcc294edf9728eab1c0bef983e4baecdb5bea7ed18be76febd96b6e3f9
    • Instruction Fuzzy Hash: 641129622197D096EB178F3994FC33C6A75EB95B84F89D061CB461B312DB2ECA81CB11
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID: 1
    • API String ID: 2819658684-2212294583
    • Opcode ID: c24aa144a5a2c35a8fdb484c0746f0b94e6cfc09c221b34de806f61d68da000b
    • Instruction ID: bfda50c9db8c5f5202587e9a01ab95fea073673e61547a7ac9f52f45e46af454
    • Opcode Fuzzy Hash: c24aa144a5a2c35a8fdb484c0746f0b94e6cfc09c221b34de806f61d68da000b
    • Instruction Fuzzy Hash: 8321F412D1D2C285F716BB24A21423CDA909F4474CFC98831C67B062C7EE3EA808E7B4
    APIs
    • _callnewh.LIBCMT ref: 02C55386
    • malloc.LIBCMT ref: 02C55392
      • Part of subcall function 02C552C0: _FF_MSGBANNER.LIBCMT ref: 02C552F0
      • Part of subcall function 02C552C0: HeapAlloc.KERNEL32 ref: 02C55315
      • Part of subcall function 02C552C0: _callnewh.LIBCMT ref: 02C5532E
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55339
      • Part of subcall function 02C552C0: _errno.LIBCMT ref: 02C55344
    • std::exception::exception.LIBCMT ref: 02C553FF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
    • String ID: bad allocation
    • API String ID: 2837191506-2104205924
    • Opcode ID: 2789b863962101d94b643c399cf47e2269a7bf3f296a5f660e329cf77ed2a842
    • Instruction ID: c15d287d37bf6057934e8c8abdd24c434b23e8ac26b601478cb84e7af61bb0a6
    • Opcode Fuzzy Hash: 2789b863962101d94b643c399cf47e2269a7bf3f296a5f660e329cf77ed2a842
    • Instruction Fuzzy Hash: 33017C61215B2691FF24EF20F884B9D2365FB843C4FC844269D8E47A60EF7CC288DB04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 1646373207-1276376045
    • Opcode ID: 825098e7262f08d60cb7bdb3c3f67da28a0895d5aeadfa1fb81c8a544a304b7a
    • Instruction ID: 517c1aa02d1d9339b48516a57021fb431f1bd32b308607e0ecd3906e4a96e0a6
    • Opcode Fuzzy Hash: 825098e7262f08d60cb7bdb3c3f67da28a0895d5aeadfa1fb81c8a544a304b7a
    • Instruction Fuzzy Hash: B7D01710706A0082FE199BA0B88CB2C13505F88758F48102D881F06354EF68CBCA8700
    APIs
    • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FF7F8DF9F69,?,?,00000028,00007FF7F8DF90B9,?,?,0001939100000000,00007FF7F8DFC050,?,?,ceil,00007FF7F8DFD951), ref: 00007FF7F8DF9F2F
    • GetProcAddress.KERNEL32(?,?,000000FF,00007FF7F8DF9F69,?,?,00000028,00007FF7F8DF90B9,?,?,0001939100000000,00007FF7F8DFC050,?,?,ceil,00007FF7F8DFD951), ref: 00007FF7F8DF9F44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 1646373207-1276376045
    • Opcode ID: 8532fc609fad59ffe6e62cafeae73a037ed505a12b62afac9e0faec1dfd416e1
    • Instruction ID: fd0993e474bf30bd73b052e09afbd1fc64187a4a94210ad382e8461f088d60b4
    • Opcode Fuzzy Hash: 8532fc609fad59ffe6e62cafeae73a037ed505a12b62afac9e0faec1dfd416e1
    • Instruction Fuzzy Hash: 58E01210F29A12D2FF197B90AC58234E3906F4C711BC85839C43F463D5EE7CA948A3A8
    APIs
      • Part of subcall function 02C5A7E0: malloc.LIBCMT ref: 02C5A80B
      • Part of subcall function 02C5A7E0: Sleep.KERNEL32 ref: 02C5A81E
    • free.LIBCMT ref: 02C5ADD0
    • free.LIBCMT ref: 02C5ADEC
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$Sleepmalloc
    • String ID:
    • API String ID: 1995388493-0
    • Opcode ID: 937ab413b08246a84f5eda74101b413cfd46f5463a50d76eaf4660d41468c8d6
    • Instruction ID: 2003471786483bb1456f7d86a514a1ce4a9e91b05a402f0508d1b6a2f3f4031a
    • Opcode Fuzzy Hash: 937ab413b08246a84f5eda74101b413cfd46f5463a50d76eaf4660d41468c8d6
    • Instruction Fuzzy Hash: 3A417832301B9497DB15DF66E99035A33A4F788B94F844225DF8D47B10DF38E6A2CB48
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$Heap$FreeProcess
    • String ID:
    • API String ID: 3493288988-0
    • Opcode ID: 6c013b565ca14f6815c43c194a3a20116d2b7f974b210a047db512b5b65b0d71
    • Instruction ID: 4b194ed59f21dcd611c6cf407b271e62b5a92de917291a1bf5cf19805d0d15ac
    • Opcode Fuzzy Hash: 6c013b565ca14f6815c43c194a3a20116d2b7f974b210a047db512b5b65b0d71
    • Instruction Fuzzy Hash: 1A317626711A6087DB28DB66E54876D6360FB88FC4F889025DF4A03F04CF38D1A2CB44
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: 48b5d1fb032df118254534afb501ea6332d357762480b1233715014adb78efda
    • Instruction ID: 549529b5866b91fa3b6a1d9de61836c3de87b0b664da620a25d0145760bc6fec
    • Opcode Fuzzy Hash: 48b5d1fb032df118254534afb501ea6332d357762480b1233715014adb78efda
    • Instruction Fuzzy Hash: 5B514971C047294AEB3E1A5998C13763BCDFB45364F2402EBDE92C75C0FB60E4624A9A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: 600b5e1a0884fd86083a6c40ec30f50f7914204e96c09ac3a2eb1a49d6991a14
    • Instruction ID: 7d6acd4c5ea56fcc84870f99d4a4494b951025d2b5555af222933cd7d33d9826
    • Opcode Fuzzy Hash: 600b5e1a0884fd86083a6c40ec30f50f7914204e96c09ac3a2eb1a49d6991a14
    • Instruction Fuzzy Hash: FB415863A015B044EF345A2BD84537F619EBBC0BA8FF54912CE9247280EBB9D6C1C31E
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfoiswctype
    • String ID:
    • API String ID: 248606491-0
    • Opcode ID: 94b972fa06678f78d860e6f5b723ba573def77772fbd1e0a4943df1ed3bb4a81
    • Instruction ID: dc2ae492185648e2f0099e2eae421ec7049f90fafbd591e42c6b7a237f70e9e5
    • Opcode Fuzzy Hash: 94b972fa06678f78d860e6f5b723ba573def77772fbd1e0a4943df1ed3bb4a81
    • Instruction Fuzzy Hash: 6451DF22D0817345FB743729A80137EE0C1AF48BE4F954131DE79424C9EE2CA8ADB6A9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
    • String ID:
    • API String ID: 27599310-0
    • Opcode ID: 7363268150c92f0dc87d915cd02ac402206b057223f311218893b197a08f2757
    • Instruction ID: 7bf8142e4772ee3e6bf5dba17811afbc482763c7972b81ce72b9163c12e53ed9
    • Opcode Fuzzy Hash: 7363268150c92f0dc87d915cd02ac402206b057223f311218893b197a08f2757
    • Instruction Fuzzy Hash: E351D072204B6086EB29CF65A88473A6762F7C4788F98811BDE9B43714CF78C7C1C609
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BaseImage
    • String ID:
    • API String ID: 2482573191-0
    • Opcode ID: 66b23e2ea7d051c300e668afda3cb2caa1ce51f53109746541cc28e20bde209e
    • Instruction ID: b521f144b828cf602069ff5a81ee6a57ee08249478aae9f438ab9652a4db968b
    • Opcode Fuzzy Hash: 66b23e2ea7d051c300e668afda3cb2caa1ce51f53109746541cc28e20bde209e
    • Instruction Fuzzy Hash: 55412B71114B044FD31ABB7CD8859B87AD2FB84314F6486EEC056C32E5EB34F9828A45
    APIs
      • Part of subcall function 02C55AD8: _getptd.LIBCMT ref: 02C55AEA
    • _errno.LIBCMT ref: 02C6A0BE
    • _invalid_parameter_noinfo.LIBCMT ref: 02C6A0C8
    • _errno.LIBCMT ref: 02C6A0EC
    • _invalid_parameter_noinfo.LIBCMT ref: 02C6A0F6
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_getptd
    • String ID:
    • API String ID: 1297830140-0
    • Opcode ID: a1b2e992952563b09da4c9b68e1145a5c931054a8e89e35b43f293698d4bcdd3
    • Instruction ID: e7cba933d47de105a49fa7acdcf084c0290bc7f83c74726d7a58459404570bc2
    • Opcode Fuzzy Hash: a1b2e992952563b09da4c9b68e1145a5c931054a8e89e35b43f293698d4bcdd3
    • Instruction Fuzzy Hash: 8C41CF22218B90C6DB21DF25D9D827E7BA1F784BD0F548122DF8A57B64DB38C586CB04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: ad50882e94ecf0e1b6f9d85136d38adbeace3bb9bfc4826b079521771091c6d8
    • Instruction ID: 21a0f0c61a57a1c6ce85f3aafe99dab4c06e1cc35ca6045d310b0465275c6af1
    • Opcode Fuzzy Hash: ad50882e94ecf0e1b6f9d85136d38adbeace3bb9bfc4826b079521771091c6d8
    • Instruction Fuzzy Hash: 71315C2061CECD4BE70D5A2C948C739BBC2FB66305FA842FED087C7693DE6188418751
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo$_getptd
    • String ID:
    • API String ID: 1297830140-0
    • Opcode ID: 9ca92d5bb05e79156cbab85d98cd5049689c098bd46746ebc4bd1871a1c2f17d
    • Instruction ID: 2e6b017f658f760fc88b8a1aa7e186de073776bac68bb7f47c2c6926502c14a2
    • Opcode Fuzzy Hash: 9ca92d5bb05e79156cbab85d98cd5049689c098bd46746ebc4bd1871a1c2f17d
    • Instruction Fuzzy Hash: B0419122A0878586E752AB55C18426DFBA0EF44BD0F854131DB7E07BDACF3CE445E7A8
    APIs
      • Part of subcall function 02C57574: _getptd.LIBCMT ref: 02C57578
    • _getptd.LIBCMT ref: 02C58CAB
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    • _SetImageBase.LIBCMT ref: 02C58D7E
    • _getptd.LIBCMT ref: 02C58DAC
    • _getptd.LIBCMT ref: 02C58DBA
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BaseImage_amsg_exit
    • String ID:
    • API String ID: 2306399499-0
    • Opcode ID: a02dd388b7b7f0f696520ad480e8c452745dcea769bd20a0fc531c877679dfad
    • Instruction ID: 3ed664e632e8590c95556f6708f0f8ac806e2e745cefd99f6c377a8b3b552c1b
    • Opcode Fuzzy Hash: a02dd388b7b7f0f696520ad480e8c452745dcea769bd20a0fc531c877679dfad
    • Instruction Fuzzy Hash: 2231E332600A6285CE21EB16D48423DA7A2FF90FD8F598321CE1A437B0DB38C1C6DB09
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd$BaseImage_amsg_exit
    • String ID:
    • API String ID: 2306399499-0
    • Opcode ID: b5c06598e24a17d2af3d260348e39d1b732e80aecbaef9a16b5b1eba258a06ea
    • Instruction ID: 5319200fc63eedec29ae806981f45c77b6f7bc19b5ad79bbf53ad09f36533606
    • Opcode Fuzzy Hash: b5c06598e24a17d2af3d260348e39d1b732e80aecbaef9a16b5b1eba258a06ea
    • Instruction Fuzzy Hash: 81411822E0C64381EB20B715D4811BDE6A0AF55B98F958931DA3F473E2DF3CE542E2A4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_getptd_invalid_parameter_noinfofree
    • String ID:
    • API String ID: 4053972703-0
    • Opcode ID: b646e29ab2c53f8803bcd8bcad2b692ff3ac37afc93ff11cc83c8059a5de3bdc
    • Instruction ID: 1f939f981bc05111ca474a402e74f79ae342935c925966680cd10a16133ee56e
    • Opcode Fuzzy Hash: b646e29ab2c53f8803bcd8bcad2b692ff3ac37afc93ff11cc83c8059a5de3bdc
    • Instruction Fuzzy Hash: BA219530608F098FDB55FBA9989563A7BD1FB98310F40467ED45EC36A1DF60D8418F92
    APIs
    Strings
    • |p1:8.218.163.62|o1:6666|t1:1|p2:8.218.163.62|o2:6666|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:, xrefs: 00007FF7F8DF72E6
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: lstrlen
    • String ID: |p1:8.218.163.62|o1:6666|t1:1|p2:8.218.163.62|o2:6666|t2:1|p3:127.0.0.1|o3:80|t3:1|dd:1|cl:1|fz:
    • API String ID: 1659193697-3768091544
    • Opcode ID: 32b2e33b096677a599e1476ba1b417f22cd16269792abd837077c77c15f759a6
    • Instruction ID: dcee9c3e238a06619cb6901e6d5821e036920b3a4f621ac1f1dfc4ad9d32a362
    • Opcode Fuzzy Hash: 32b2e33b096677a599e1476ba1b417f22cd16269792abd837077c77c15f759a6
    • Instruction Fuzzy Hash: 4C310625E0869695EB18EB11A8005FDF3E1FF8CB84B84C030DD3A063D9DE3CE545A398
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
    • String ID:
    • API String ID: 420147892-0
    • Opcode ID: 9e68473edadeaf557d43ee5db64da582385d685932b15406e045d27e9c0fbed8
    • Instruction ID: 19f4b6d277d71687cd1fce8423552c401ceb5c6d32f47c8b4cdec109cd34366e
    • Opcode Fuzzy Hash: 9e68473edadeaf557d43ee5db64da582385d685932b15406e045d27e9c0fbed8
    • Instruction Fuzzy Hash: AC318336644B4082EF24CF2AE46836B77A1F7C9B98F558229DE5E43754DF39C145CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno$_invalid_parameter_noinfo
    • String ID:
    • API String ID: 2819658684-0
    • Opcode ID: c5488cea8a7420608f6a60d82c2d4936388b921319a0c2fb7a5c91bb596e3c00
    • Instruction ID: 4524df15588d7e04d4e300d109bf7656a2ee5bee90726f0965352ab1c69965fc
    • Opcode Fuzzy Hash: c5488cea8a7420608f6a60d82c2d4936388b921319a0c2fb7a5c91bb596e3c00
    • Instruction Fuzzy Hash: E92168B27183D08AFB05CAB9D4E837D2B93D3A5384F488623DB4287742EB69C54DCB15
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorEventLastSelect
    • String ID:
    • API String ID: 1135597009-0
    • Opcode ID: 956be7d5d60204c7e3c068f76d48fbfab2fb49e91de88ae288d2e3ac1e2e7a30
    • Instruction ID: 56260cc9cecf36b4b19fef922242a073cebd3da078ecfed29fb315253a67dea4
    • Opcode Fuzzy Hash: 956be7d5d60204c7e3c068f76d48fbfab2fb49e91de88ae288d2e3ac1e2e7a30
    • Instruction Fuzzy Hash: 4A218EB361068087E710CF7AE44875E37A2FB88B98F641119CB19C7A94DF7AC4C6DB10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: ErrorEventLastSelect
    • String ID:
    • API String ID: 1135597009-0
    • Opcode ID: 0be878fb768bf08b0c5fb6e885e8fe2ab6ec24c45cef932c45ab1ad02d861857
    • Instruction ID: 9216afad0d6f0e86a2590e83c532ce50190344545728e9ad8b1bb057e7b736d2
    • Opcode Fuzzy Hash: 0be878fb768bf08b0c5fb6e885e8fe2ab6ec24c45cef932c45ab1ad02d861857
    • Instruction Fuzzy Hash: 7421D3B2A0054186E740EF35D44436CB3A1FF48B58F944134DA3D8B6D4DF79C88AEBA4
    APIs
    • EnterCriticalSection.KERNEL32 ref: 02C4506C
    • LeaveCriticalSection.KERNEL32 ref: 02C45085
    • LeaveCriticalSection.KERNEL32 ref: 02C45105
    • SetEvent.KERNEL32 ref: 02C45125
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterEvent
    • String ID:
    • API String ID: 3394196147-0
    • Opcode ID: 21dc35a79e7d153aa5f527a3c9f68bbfba85f83a73de9e7e0ee8fccda7220007
    • Instruction ID: 92b2d46f49d621d0ac8db3014df4026ad537fa902894e52f8ac83744884d0634
    • Opcode Fuzzy Hash: 21dc35a79e7d153aa5f527a3c9f68bbfba85f83a73de9e7e0ee8fccda7220007
    • Instruction Fuzzy Hash: E3211936314B8493D748CF26F5847AEB364F788B90F545129EBAA43B24DF38E9A1C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterEvent
    • String ID:
    • API String ID: 3394196147-0
    • Opcode ID: 03f9e94784ee446fcc446a6b9a97075121abf68d5be1871662565671ac975166
    • Instruction ID: 3fcc654035f8de1bbd4a157d6dbfebf54fc7af61d827b7bd13ea4c5607d58a41
    • Opcode Fuzzy Hash: 03f9e94784ee446fcc446a6b9a97075121abf68d5be1871662565671ac975166
    • Instruction Fuzzy Hash: 47213932704B8592D758DB16E9802A9F3A4FB48B80F548135EB7E43364CF38E8A5D784
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
    • String ID:
    • API String ID: 594724896-0
    • Opcode ID: 1af19892bbc03468291f82b11de21fd6e6f481048af7f94286d8aedfc065ae7b
    • Instruction ID: 1a388a022254261aa938b6695e0082438e79c97055891ca8c4d41a1f38971d4f
    • Opcode Fuzzy Hash: 1af19892bbc03468291f82b11de21fd6e6f481048af7f94286d8aedfc065ae7b
    • Instruction Fuzzy Hash: 13119E3655074086E7208B19E4D876DB361F7C4B88F649216DE9E43B75DF36C482D705
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit$_getptd_lockfree
    • String ID:
    • API String ID: 2148533958-0
    • Opcode ID: 5d29ed1caa0daea5f5dbfe864c41203751b69c3e2a73dd0d7e20f9917cc7433e
    • Instruction ID: a4199736f210340dc1e22c97cf1a5b4a7ecdb61d81ef2d2d82ca0a382f0a2d3c
    • Opcode Fuzzy Hash: 5d29ed1caa0daea5f5dbfe864c41203751b69c3e2a73dd0d7e20f9917cc7433e
    • Instruction Fuzzy Hash: D5117C36226B9086EB949B21E480B6D7762F788B84F4C4026EF1E03359DF38C690CB05
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalDeleteSection$Freefree
    • String ID:
    • API String ID: 1250194111-0
    • Opcode ID: 3824737ec1521a2d4d93bf8402f796ef870551e1c1bfc4249913134d5e986940
    • Instruction ID: dc977cefa27b31730dcad40f7e72cba90d2fa2a72d98cecafd9bdc4a2f7ce51a
    • Opcode Fuzzy Hash: 3824737ec1521a2d4d93bf8402f796ef870551e1c1bfc4249913134d5e986940
    • Instruction Fuzzy Hash: 88118232A05A41C6EB14DF25F88C72C7360F7C4BA4F585215DE9B06A64CB38C181CB02
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
    • String ID:
    • API String ID: 594724896-0
    • Opcode ID: 78db43efc7c8f8b6f2111a7d5b2742e6ce96985b6946986547e2f26360c46e23
    • Instruction ID: a27a121a8089602908ae9b476793339cf1f3393b66c92756b77aa819c8c52877
    • Opcode Fuzzy Hash: 78db43efc7c8f8b6f2111a7d5b2742e6ce96985b6946986547e2f26360c46e23
    • Instruction Fuzzy Hash: FA116325908A4292EB10AB15E48037CF761FF84B54F904635DA7F473EACF3DE446E6A8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit$_getptd_lockfree
    • String ID:
    • API String ID: 2148533958-0
    • Opcode ID: 7d7c657d20a7dd2b4e75e9e7dc412b9cbf1c6d67fe2fb29e532279fb9e9c9193
    • Instruction ID: b91e08b791b0da4955c42083934ea560dbc8d0aaf20ef48d317920fc2875849b
    • Opcode Fuzzy Hash: 7d7c657d20a7dd2b4e75e9e7dc412b9cbf1c6d67fe2fb29e532279fb9e9c9193
    • Instruction Fuzzy Hash: 54111522A1968285EB94AB11D441779F360FF48744F884435DA7E073DACF3CE458F7A9
    APIs
    • FlsFree.KERNEL32(?,?,?,?,00007FF7F8DFBC45,?,?,00000000,00007FF7F8DF9984), ref: 00007FF7F8DFB8DF
    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8DFBC45), ref: 00007FF7F8DFD883
    • free.LIBCMT ref: 00007FF7F8DFD88C
    • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F8DFBC45), ref: 00007FF7F8DFD8B3
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CriticalDeleteSection$Freefree
    • String ID:
    • API String ID: 1250194111-0
    • Opcode ID: c67542cc3d2d698b88e45379a5442c15c18af80ec950ad7c34deb963a0871383
    • Instruction ID: e3edb920aa119d229ca72e7c79dca8b36b1dca060a85f1ccd918e939e3fa32ec
    • Opcode Fuzzy Hash: c67542cc3d2d698b88e45379a5442c15c18af80ec950ad7c34deb963a0871383
    • Instruction Fuzzy Hash: E9112131E09542C6F755AF11A844278E360EF49B64F984A30D6BE062E9CF3CD895E6E8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Thread$CurrentErrorExitLast_freefls
    • String ID:
    • API String ID: 217443660-0
    • Opcode ID: cbffd315a96faa497177c600e0cbd82371ea40a3f718517a673364916740c137
    • Instruction ID: 702954451fd8d899362391b301607d2d3e136cf3fc2a12107b4e954526a4e6c6
    • Opcode Fuzzy Hash: cbffd315a96faa497177c600e0cbd82371ea40a3f718517a673364916740c137
    • Instruction Fuzzy Hash: 88F01721711BA585EF14AFB2A44C72C22A6BB18BC8F984438CE4E87711EE79C8949719
    APIs
      • Part of subcall function 02C41510: HeapFree.KERNEL32 ref: 02C41556
      • Part of subcall function 02C41510: free.LIBCMT ref: 02C41582
    • HeapDestroy.KERNEL32 ref: 02C5004E
    • HeapCreate.KERNEL32 ref: 02C5005F
    • free.LIBCMT ref: 02C50071
    • HeapDestroy.KERNEL32 ref: 02C50094
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Heap$Destroyfree$CreateFree
    • String ID:
    • API String ID: 3907340440-0
    • Opcode ID: c96b4cbec601b2cff9b4cd5d9c6a714dd82caa753ffdd010ae51052e50cdef96
    • Instruction ID: cf9a82518c9c5bc82ae1b14e8092bb845ff2d386c70d0e235dad1fb49e8e5f24
    • Opcode Fuzzy Hash: c96b4cbec601b2cff9b4cd5d9c6a714dd82caa753ffdd010ae51052e50cdef96
    • Instruction Fuzzy Hash: 57F01476212A8097EB489FA2E69472D3360FB88B84F04A419DF2A03E10DF34D4B08744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: Heap$Destroyfree$CreateFree
    • String ID:
    • API String ID: 3907340440-0
    • Opcode ID: fcaa257793e5fadcfc70eac2341b6a548630f635855dc52f12f0612825e35ef9
    • Instruction ID: e8626cbbe71246cf65fc6b15448751cb1a4abf95addb8e26ff9d440a2a6049e2
    • Opcode Fuzzy Hash: fcaa257793e5fadcfc70eac2341b6a548630f635855dc52f12f0612825e35ef9
    • Instruction Fuzzy Hash: 81014F36715A4196EB44AF62D690128F374FF48780B409435DF3E03A94CF38E4B4A764
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit_getptd$_lock
    • String ID:
    • API String ID: 3670291111-0
    • Opcode ID: 6302b35e9a68ce893cca802b5f5e7a01f98d2e1d4d6a3a5cf8f19790a7114949
    • Instruction ID: e1a74241fa86765506ff50e175cec23030868489db4e9e354bcc5c45cd3e60a5
    • Opcode Fuzzy Hash: 6302b35e9a68ce893cca802b5f5e7a01f98d2e1d4d6a3a5cf8f19790a7114949
    • Instruction Fuzzy Hash: C1F0F861612550C6FB1CAB61C894BBD2762EB89B48F0D027CDE4E0B794DF28C9C1EB19
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit_getptd$_lock
    • String ID:
    • API String ID: 3670291111-0
    • Opcode ID: 41071648471df9d3322a353edf5a3ab4de664c8de62a61506e4f03b2c3d18dde
    • Instruction ID: 58f7040378d86d0baa5f864c773e55200eb971c4a1b4247c3fe43c4960c989c6
    • Opcode Fuzzy Hash: 41071648471df9d3322a353edf5a3ab4de664c8de62a61506e4f03b2c3d18dde
    • Instruction Fuzzy Hash: 61F06251A0A04281FB54BB519841BB8D260EF4C740FC80135D93D473DACF2CA449F3B8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: 0df6008082723f72913e9ff3e2182e95254e93b920ee907ecb979fe633f15503
    • Instruction ID: 2abf2996a3a2ce6fcfdd584cf8cfd3d4d3c11c48a960b9eea5d1ed4808b75484
    • Opcode Fuzzy Hash: 0df6008082723f72913e9ff3e2182e95254e93b920ee907ecb979fe633f15503
    • Instruction Fuzzy Hash: 75519231608F088FCB6ADE2884C47297BD5FB48B54F5446ADD49EC7396D730E881CB86
    APIs
    • _getptd.LIBCMT ref: 02C59C2C
      • Part of subcall function 02C5DF90: _amsg_exit.LIBCMT ref: 02C5DFA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit_getptd
    • String ID: csm$csm
    • API String ID: 4217099735-3733052814
    • Opcode ID: 0ebafe53c79dd1dc7c4b2410e29de92a4e8939059e6c475d33d2247252ee921c
    • Instruction ID: 8ec788857c981922b10e721aacdfbcc248110a41fdbb6aa40ff31b3593307252
    • Opcode Fuzzy Hash: 0ebafe53c79dd1dc7c4b2410e29de92a4e8939059e6c475d33d2247252ee921c
    • Instruction Fuzzy Hash: 9E5116322047A0CACB34CF26D58476DB7A0F785BC8F488165DE8A47B54CB38E5E0DB89
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _amsg_exit_getptd
    • String ID: csm$csm
    • API String ID: 4217099735-3733052814
    • Opcode ID: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
    • Instruction ID: 25e6c8e651eafd9d76fd3ab9ea94ea7d18245df2be897cbf1af53aa54921d0d4
    • Opcode Fuzzy Hash: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
    • Instruction Fuzzy Hash: 2B51C432A0824186EB60AF61914037DF6A4FB45B8CF844535DA7E47BC5CF3CE494EB99
    APIs
      • Part of subcall function 02C55378: malloc.LIBCMT ref: 02C55392
    • wsprintfW.USER32 ref: 02C4DA98
    • CloseHandle.KERNEL32 ref: 02C4DC0B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: CloseHandlemallocwsprintf
    • String ID: %s_bin
    • API String ID: 2399101171-2665034546
    • Opcode ID: 8cd04662d7078cabdf984b15f4d60648459fd27a36f456a8367ae7b316583ac3
    • Instruction ID: 2747c85db140a9b3532286a4668414b40db7695a575ef1ebb7e0ccfac7dee288
    • Opcode Fuzzy Hash: 8cd04662d7078cabdf984b15f4d60648459fd27a36f456a8367ae7b316583ac3
    • Instruction Fuzzy Hash: BF41AA26714A6481EB24EF62E418B6E7369FBC5F98F448126CE1E07744DF39C284C705
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 97277b288e6e1178be426116e7f1b01626121072449bb72ff7d68c702eebc816
    • Instruction ID: 31c75d4948f6f58edaf86a2aaec65b1d2c2d67712bc7e2dacd68679af606ac4b
    • Opcode Fuzzy Hash: 97277b288e6e1178be426116e7f1b01626121072449bb72ff7d68c702eebc816
    • Instruction Fuzzy Hash: 7621C330218B488FC755EF6D84C461ABBE1FB98324F5047AEA55EC7291DF74D940CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: ec373591011a08efc2e4d5585c5127ff4a6d92287ffccaae23c44f6cffdad71c
    • Instruction ID: 81f4508c2c0d33e46f3a0c31da6faf4ceaeeedda3b6c07820c381cd29ee0f55a
    • Opcode Fuzzy Hash: ec373591011a08efc2e4d5585c5127ff4a6d92287ffccaae23c44f6cffdad71c
    • Instruction Fuzzy Hash: 0E118F30618B484FC754EF5CD485766BBD2FB98324F5047AEA059C32A0DF78D984CB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: 008a1cef3fd956798f7d73ea4517d52a7d073b0e4720bf3f8ed94ca8c68e0db9
    • Instruction ID: 9bec07ae4eeff4319ebaa706d6b96bc5c37915bc62c213b4c1ec073f235a7a03
    • Opcode Fuzzy Hash: 008a1cef3fd956798f7d73ea4517d52a7d073b0e4720bf3f8ed94ca8c68e0db9
    • Instruction Fuzzy Hash: F92183B7600654CADB208F66C4887A83B75F398BADF8A1255EA4E0BF18CB75C5C1C784
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm$csm
    • API String ID: 3186804695-3733052814
    • Opcode ID: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
    • Instruction ID: 2b64c55bd32b36ed08610236f3e378694ea6353b016b4b143a218318fc611932
    • Opcode Fuzzy Hash: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
    • Instruction Fuzzy Hash: 51314F33504704CAEB609F65C44026C7B71F758B9CF861234EA5E0BB94CB79D890D798
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: d9f8633fb066bb926e08558761ed9d779cc0cbf5af2a47bf39fdd692a1c5aced
    • Instruction ID: 83871d50e681a6bd8fba8a4ddaa16446fc754b05f5fd356d711f0813c4bc2c03
    • Opcode Fuzzy Hash: d9f8633fb066bb926e08558761ed9d779cc0cbf5af2a47bf39fdd692a1c5aced
    • Instruction Fuzzy Hash: 3B11307221479086DB209F16E440259B7A2F798BE4F984225EF9D57B54CF38C685CF08
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145760930.00007FF7F8DF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8DF0000, based on PE: true
    • Associated: 00000000.00000002.4145742589.00007FF7F8DF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145785140.00007FF7F8E08000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145805218.00007FF7F8E0E000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4145823094.00007FF7F8E15000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff7f8df0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 9b4439fc7c8faf101ecdfea0264f82894208d5a38c9186357c889f9d5f545f4f
    • Instruction ID: 50624e4646f7a727880d5586871a4e636d2af4ce231038575c3da44364630590
    • Opcode Fuzzy Hash: 9b4439fc7c8faf101ecdfea0264f82894208d5a38c9186357c889f9d5f545f4f
    • Instruction Fuzzy Hash: 44119372A0874196EB20AB15944426DF6A0FF8CB98FD44231EBBC07BDDCE3CD544AA54
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _errno_invalid_parameter_noinfo
    • String ID: B
    • API String ID: 2959964966-1255198513
    • Opcode ID: 0ab59116831bbe62dcdadced444a5e6377d12d240e7c680d2d1bd855e87776a3
    • Instruction ID: 6dbd8fa32445c7cd4993e4c45439ade9b281aa7c9a04d0747ac2ed9ff2d590a9
    • Opcode Fuzzy Hash: 0ab59116831bbe62dcdadced444a5e6377d12d240e7c680d2d1bd855e87776a3
    • Instruction Fuzzy Hash: 6D0180B2614B5486DB10DF12E4447A9B665F798FE4FA88321EF5C07B98CF38C285CB08
    APIs
      • Part of subcall function 02C579AC: _getptd.LIBCMT ref: 02C579B9
      • Part of subcall function 02C579AC: _getptd.LIBCMT ref: 02C579CC
    • _getptd.LIBCMT ref: 02C6D688
    • _getptd.LIBCMT ref: 02C6D69B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: _getptd
    • String ID: csm
    • API String ID: 3186804695-1018135373
    • Opcode ID: 433e7348067b57c19063a6e5e3819906beb9ca32c691c09114a4435d6686f511
    • Instruction ID: 021c60415ad8fb51fc0c13a6d38c0d43a52d70a2244bf62721453f1fb4ddce8e
    • Opcode Fuzzy Hash: 433e7348067b57c19063a6e5e3819906beb9ca32c691c09114a4435d6686f511
    • Instruction Fuzzy Hash: 35014F72641741C9CF30AF32E8843BC2375E799B59F490625CE0E0B618CB31C6C5DB55
    APIs
    • malloc.LIBCMT ref: 02AFC1D4
      • Part of subcall function 02B04D91: _FF_MSGBANNER.LIBCMT ref: 02B04DC1
      • Part of subcall function 02B04D91: _callnewh.LIBCMT ref: 02B04DFF
      • Part of subcall function 02B04D91: _errno.LIBCMT ref: 02B04E0A
      • Part of subcall function 02B04D91: _errno.LIBCMT ref: 02B04E15
    • free.LIBCMT ref: 02AFC1FC
    • free.LIBCMT ref: 02AFC287
    • free.LIBCMT ref: 02AFC2C7
    Memory Dump Source
    • Source File: 00000000.00000002.4145270202.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 02AF0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2af0000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$_errno$_callnewhmalloc
    • String ID:
    • API String ID: 2761444284-0
    • Opcode ID: 05004e69f0d03603166f5012c8d6d757e19186f86f24b119b2e0ef74532bd915
    • Instruction ID: 516f0b42b5f1fc57f0014cae323d0200636d737f57019266f1e68c93ea5af704
    • Opcode Fuzzy Hash: 05004e69f0d03603166f5012c8d6d757e19186f86f24b119b2e0ef74532bd915
    • Instruction Fuzzy Hash: 7341E870618B0E4FD799EF9E84D1336B7D6FB58720F00456EAA9AC3211DF74E8068B85
    APIs
    • free.LIBCMT ref: 02C52F31
      • Part of subcall function 02C55280: HeapFree.KERNEL32 ref: 02C55296
      • Part of subcall function 02C55280: _errno.LIBCMT ref: 02C552A0
      • Part of subcall function 02C55280: GetLastError.KERNEL32 ref: 02C552A8
    • free.LIBCMT ref: 02C52F44
    • free.LIBCMT ref: 02C52F57
    • free.LIBCMT ref: 02C52F6A
    Memory Dump Source
    • Source File: 00000000.00000002.4145314646.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C40000, based on PE: true
    • Associated: 00000000.00000002.4145314646.0000000002C89000.00000040.00001000.00020000.00000000.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2c40000_EpCAySF1G6.jbxd
    Similarity
    • API ID: free$ErrorFreeHeapLast_errno
    • String ID:
    • API String ID: 1012874770-0
    • Opcode ID: f0a32442132290b978abf0824dadd0382e9fcad70a2f2925c0411fa04f225afc
    • Instruction ID: 5254d0b9fe37aaaa648c06c9cba7cde3b1adfaaa5fadc423c3c0dd154bc472ff
    • Opcode Fuzzy Hash: f0a32442132290b978abf0824dadd0382e9fcad70a2f2925c0411fa04f225afc
    • Instruction Fuzzy Hash: 2DF0681261272048DF64DFA0D0A47391360DB94FBCF580714CE6609184CF39C4C0D799